Withdrawal fees are as low ---- 0.00005 Btc, with an average confirmation time of just 5 minutes.
However, after electrum officials said in early 19th that some security mechanisms should be put in place to prevent this "update phishing", many users of Electrum are still in the old version.
Oh, and when you want to use the money that's in your paper wallet now or for years to come, don't forget your current BTC and BTU! (Electrum and Blockchain)
Cryptocurrencies Wallet Electrum has lost nearly 250 bitcoins (approximately $914,000) as a result of the new phishing attack. Electrum has confirmed the authenticity of the attack. An attacker could induce a user to provide password information by creating a fake wallet.
(Malware, Attack) Electrum DDoS botnet reaches 152,000 infected hosts.
According to Bleeping Computer, the Bitcoin wallet app Electrom was on GitHub on May 9th, accusing a phishing product called Electrum Pro of stealing a user's seed key and registering a domain name called electrum without Electrum's permission. The Electrum team noted that there was a piece of code indicating that the counterfeit product might have taken the user's seed key and uploaded it to the electrum. Affected users should transfer funds from Bitcoin URLs managed by Eletrum Pro.
Another upgrade under study is the release of a new version of the Electrum-LTC desktop wallet. Electrum-LTC is an SPV wallet that can be used in Windows, Linux, and OS X operating systems.
Bitcoin Wallet Electrum confirms a phishing attack against its users, reminding them not to download Electrum Wallet software from any channel other than the official website. Earlier media reports said Electrum users had maliciously stolen millions of dollars worth of cryptocurrencies. Hackers create Electrum wallet software with malicious code, induce users to download, and trick users into providing login information such as passwords to commit theft.
Electrum wallets were attacked by phishing and about 245 BTCs were stolen.
Coinpath ® also provides the Paths API, which you can use to get all intermediate transactions from source to destination. Let's take a look at, for example, how hackers transfer stolen funds to Bity.