The hacker accumulated as much as $90 million worth of crypto from wallets with weak private keys during a six-year thieving spree.
A hacker called "blockchain robber" finally woke up from six years of silence and quickly transferred his money.
According to the information of Chainalysis, since 2016, about US $90 million of digital currency stolen from the continuous "process theft" of cyber attacks has gradually shifted in the past week.
It mainly includes 51000 Ethereum (ETH) and 470BTC (BTC) - the use value is about 90 million US dollars - leaving the latest address of the robber. Chain analysis emphasizes:
"Everyone suspects that the robbers have transferred assets due to the recent price rise."
This hacker is called "blockchain robber" because she can clear the Ethereum wallet protected by weak private key in a process called "Ethereum sorting"
Since the first siege six years ago, the whole process of "process theft" of cyber attacks has gradually drained more than 10000 wallets from people around the world.
In 2019, CoinTelegram reported that the blockchain robbers had successfully mastered nearly 45000 ETH by guessing the weak private key based on their success.
A security analyst said that she accidentally discovered a hacker when she formed a private key for scientific research. At that time, he stressed that hackers had already established a connection point and would automatically steal assets from addresses containing weak keys.
The researchers confirmed 732 weak private keys related to 49060 transactions. However, it is not clear how many of them were used by bandits.
He said at the time: "There was a man with a detailed address. He walked around and sucked money from some keys they could get.".
Chainalysis has drawn a data chart describing the capital inflow, but it does not have a specific overall target detailed address, and only marks it as "the middle detailed address"
In order to prevent weak private keys, Chainalysis proposes that users use well-known and reliable wallets. If many digital currencies are involved, it is necessary to transfer funds to hardware configuration wallets.
Especially in 2019, an electronic computer researcher discovered a vulnerability in the wallet system, which sent the same key pair to several customers.