Crypto News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Crypto Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CryptoNews'Hundreds' Of EVM Wallets Drained in Mysterious Attack: ZachXBT
'Hundreds' Of EVM Wallets Drained in Mysterious Attack: ZachXBT
Crypto

'Hundreds' Of EVM Wallets Drained in Mysterious Attack: ZachXBT

•January 2, 2026
0
Cointelegraph
Cointelegraph•Jan 2, 2026

Companies Mentioned

Binance

Binance

GitHub

GitHub

Why It Matters

The incident underscores the persistent vulnerability of crypto users to phishing and supply‑chain attacks, prompting immediate security actions across the DeFi ecosystem.

Key Takeaways

  • •Hundreds of EVM wallets drained, each loss under $2k.
  • •Spoofed MetaMask email likely delivered phishing payload.
  • •Attack spans multiple EVM‑compatible networks, not isolated.
  • •Potential link to Trust Wallet’s supply‑chain breach.
  • •Experts urge revoking approvals and monitoring wallet activity.

Pulse Analysis

The recent wave of EVM wallet drains illustrates how a simple phishing email can cascade into a multi‑chain theft. Researchers traced the vector to a counterfeit MetaMask notification that lured recipients into authorizing malicious smart contracts. Because the message mimicked official branding, even seasoned users granted permissions, allowing an automated script to siphon up to $2,000 from each address. Such low‑value, high‑volume exploits are attractive to attackers seeking to stay under radar thresholds while amassing sizable total gains across hundreds of wallets.

The operation bears striking resemblance to the Trust Wallet breach that unfolded on Christmas, where a supply‑chain compromise of the “Sha1‑Hulud” npm package injected malicious code into the Chrome extension. That incident compromised 2,596 wallets and resulted in $7 million losses, raising concerns about insider knowledge and code‑base integrity. Analysts now suspect the same threat actor or toolkit is being repurposed for the broader EVM attack, highlighting how vulnerabilities in one wallet ecosystem can quickly propagate to others that share similar development pipelines.

Defenders recommend immediate revocation of all smart‑contract approvals, especially for high‑risk protocols, and continuous monitoring through on‑chain analytics tools. Users are also urged to adopt hardware wallets for long‑term storage and verify email sources before clicking links. For developers, rigorous code audits, reproducible builds, and signed package distribution are essential to thwart supply‑chain infiltration. As the crypto sector grapples with these layered threats, regulatory scrutiny and industry‑wide best‑practice frameworks are likely to tighten, aiming to restore confidence among investors and custodians alike.

'Hundreds' of EVM wallets drained in mysterious attack: ZachXBT

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...