04/01
2022

verge electrum server list, Verge electrum tegnebog ikke tilsluttet - Afbrudt fra serveren (fast)

According to security firm Slow Fog, the current latest version of Bitcoin Light Wallet Electrum is 3.3.8, while previous versions of 3.3.4 are known to have "message defects" that allow attackers to send "update prompts" over a malicious ElectrumX server. This "update tip" is very confusing to the user, and if you follow the prompt to download the so-called new version of Electrum, you may be tricked. User feedback because of this attack, stolen bitcoins in more than four digits.

As you can see from the website monitoring, Bitcoin's electrum server currently has only 210 nodes online.

Chain News, lightweight Bitcoin Wallet Electrum announced that the next version will support Lightning network payment, implemented using Python, Electrum as a Lightning network node, wallet users do not need to run lightning network nodes to make payments, electrum lightning network nodes have been merged into the Electrum master branch.

Hackers have launched a denial-of-service (DoS) attack on a well-known wallet Electrum server, according to Johnwick.io. Hackers used a botnet of more than 140,000 computers to attack Electrum's nodes and simultaneously deployed malicious nodes. When a user connects to these malicious nodes and sends a transaction using an older version of Electrum, the user is prompted to update the Backdoor Client. If the user installs the client as prompted, the private key is stolen and all digital assets are lost. Millions of dollars of digital currency have been stolen, according to Electrum officials.

Qtum Electrum light wallet server maintenance

Qtum Electrum light wallet server maintenance

This update prompt is not an official act of Electrum, but a phishing attack by an attacker that exploits a message flaw on the Electrum client and the ElectrumX server, which requires the attacker to deploy the malicious ElectrumX server in advance, and the malicious server is localized by the user's Electrum client (because the Electrum client is a light wallet and the user needs the ElectrumX server to broadcast the transaction). At the time of the madness, malicious ElectrumX servers accounted for as many as 71% of the total, and according to incomplete statistics, hundreds of bitcoins have been stolen in this phishing attack over the past year or so.

Electrum is a popular software wallet that works by connecting to a dedicated server. These servers receive a hash of the Bitcoin address in the wallet and reply with transaction information. Electrum wallets are fast and have few resources, but by default, it connects to these servers and can easily monitor users. In addition to Electrum, some other software uses public Electrum servers. By 2019, it is a faster and better alternative to BIP37.

By default, electrum wallets are randomly connected to a set of Electrum servers. From a privacy perspective, this is not a good thing because it discloses your wallet address and balance to unknown third parties. And unfortunately, many public Electrum servers are run by individuals or groups of blockchain analytics companies or worse. Therefore, if you are using an Electrum wallet, it is generally recommended that you run your own Electrum server and then connect the wallet to that server.

Electrum (Ready)

Electrum (Ready)

2017-12-25 Verge (XVG) added 2 electrum servers to ensure smooth operation.

In a blog post, Malwarebytes, an antimalware software company, said the number of infected Electrum Bitcoin wallets had reached 152,000 after the server was attacked by DoS, Cointegraph reported. Malwarebytes found that the number of infected machines in botnets had reached 152,000, and the total amount of stolen funds had risen to $4.6 million. The company identified a loader called Trojan.BeamWinHTTP, which also involved downloading previously detected Electrum DoSMiner.

In an April 29 blog post, Malwarebytes, an antimalware software company, said the number of infected Electrum Bitcoin wallets had reached 152,000 after the server was attacked by DoS. Malwarebytes found that the number of infected machines in botnets had reached 152,000, and the total amount of stolen funds had risen to $4.6 million. The company identified a loader called Trojan.BeamWinHTTP, which also involved downloading previously detected Electrum DoSMiner. The largest botnets are reported to be concentrated in asia-Pacific, Brazil and Peru, and botnets attacking Electrum infrastructure are growing. (Cointelegraph)

CME Group, the second global exchange to list Bitcoin (BTC) futures, is on the verge of its biggest month of trading volume for BTC futures.

Shunto touch melon, open the github of the electrum, we find the following code in the electrum/electrum/ecc.py.

Although we recommend that individual users set up their own Electrum server, you can also use the official Blockstream Electrum server if you prefer, and the table below contains details of the connection. The server operates on the same principle as Blockstream Explorer: no logs, no traceability, and Tor support.

In December 2018, for the first time, we discovered and alerted an attacker to a messaging flaw that exploited the Electrum Wallet client to force an "update prompt" to pop up when a user transfers money, inducing the user to update the download malware and then carry out a currency theft attack. This "update tip" is not an official act of Electrum, but a phishing attack by an attacker that exploits a message flaw on the Electrum client and the ElectrumX server, which requires the attacker to deploy the malicious ElectrumX server in advance, and the malicious server is localized by the user's Electrum client (because the Electrum client is a light wallet and the user needs the ElectrumX server to broadcast the transaction). At the time of the madness, malicious ElectrumX servers accounted for as many as 71% of the total, and the show doesn't fully count that hundreds of bitcoins have been stolen in this phishing attack over the past year or so. Although in early 2019 Electrum officials said they would adopt some security mechanisms to prevent this kind of "update fishing", such as: 1. Patch Electrum client does not display rich text, does not allow arbitrary messages, only strict messages; Patch ElectrumX server implementation detects Sybil Attack (i.e. witch attacks, malicious servers that send phishing messages) and no longer broadcasts them to clients; Implement blacklisting logic to alert malicious servers outside the Electrum client view; Promote social networking sites, websites, and all forms of communication that exist with users, who should always run the latest version and always only install from official sources (electrum.org), access through security protocols (https), and verify GPG signatures in advance. However, many users of Electrum are still in the older version (less than 3.3.4), and the older version is still under threat. However, we do not rule out a similar threat to the new version. Recently, slow fog technology anti-money laundering (AML) system through continuous tracking found that one of the attackers wallet address bc1qcygs9dl4pqw6atc4yqurzd76p3r9cp6xp2kny has stolen more than 30 BTC, the crime lasted six months, and recently is still active. We would like to remind Electrum users that the new version of Electrum in this Update Tip is likely to be false and that if installed, transfer Bitcoin out in another security environment in a timely manner. At the same time, we call on the vast number of cryptocurrencies exchanges, wallets and other platforms of the AML wind control system black and monitor such as the above Bitcoin address. Finally, identify electrum's official web address.