Edge Wallet, a popular digital crypto asset, announced a hacking activity that disclosed more than 2000 private keys. The Edge community tweeted on February 22, alerting the user of the malicious attack. The tweet urged Edge users to download a new version of the digital wallets.
According to the tweet Edge has engaged security personnel to probe the matter.
Hackers Eyeing Crypto Firms
On February 22, Edge management issued an urgent update concerning suspicious activity that exposed over 2000 private keys to the public. The notice disclosed that the 2000 private keys constituted 0.01% of the number of keys generated by the platform.
The malicious attack failed to access the Edge log servers that hold a substantial amount of investors’ assets. After thoroughly reviewing the affected private key, the Edge team revealed that the user funds remain intact. This implies that the malicious attack on the Edge system failed to progress to its advanced stage, which will be associated with fund-draining activities.
Scope of Edge Malicious Attack
The Edge community explained that the suspicious attack was launched on February 20 after an investor lost all his Bitcoin assets. The victim of the unauthorized crypto transaction reported the case to Edge management to scrutinize the matter. The affected trader lamented that the hackers targeted the Bitcoin assets only.
In response to the victim, case Edge confirmed that the firm invested in developing unique master private keys that are complex to navigate. Edge confessed that the company deployed innovative system security to safeguard the user account from exploitation.
In addition, Edge reported receiving minimal complaints from investors concerning lost assets users. Edge concluded that the hacking activity was aimed at exploiting the user.
Subsequently, the Edge technical team joined forces to identify the system vulnerability that undermined the firm’s security. The team identified key areas that are prone to hacking. The technical team assessed the buy and sell category and the logs features to identify system weaknesses.
Meanwhile, the probing of the matter continues to evaluate the malware used to conduct the cyber attack.
At Tokenhell, we help over 5,000 crypto companies amplify their content reach—and you can join them! For inquiries, reach out to us at info@tokenhell.com. Please remember, cryptocurrencies are highly volatile assets. Always conduct thorough research before making any investment decisions. Some content on this website, including posts under Crypto Cable, Sponsored Articles, and Press Releases, is provided by guest contributors or paid sponsors. The views expressed in these posts do not necessarily represent the opinions of Tokenhell. We are not responsible for the accuracy, quality, or reliability of any third-party content, advertisements, products, or banners featured on this site. For more details, please review our full terms and conditions / disclaimer.