Hundreds of long-dormant Ethereum wallets were recently drained into a single tagged address, sparking one of the most pressing crypto security warnings of the week. The incident, first flagged by WazzCrypto on April 30, involved wallets that had remained untouched for years—some dating back to Ethereum’s early era.
Over 260 ETH (approximately $600,000) was stolen from these accounts, with total losses exceeding $800,000 across more than 500 wallets. Many of these wallets had been idle for four to eight years, making the breach particularly alarming.
The drained funds were consolidated into the Etherscan address Fake_Phishing2831105, which has recorded 596 transactions. Notably, 324.741 ETH was transferred to the THORChain Router v4.1.1 around the time of the incident.
The critical question remains: How were these wallets compromised? Investigators have not yet identified the attack vector, leaving multiple theories under discussion:
- Weak entropy in legacy wallet tools
- Compromised mnemonics or seed phrases
- Trading-bot key mismanagement
- Exposure during the LastPass breach era
- Exploitation of outdated key-handling tools
One affected user publicly suggested that the LastPass breach may have played a role in the wallet drain.
This incident underscores a key security principle: idle wallets are not safe wallets. The risk depends on the entire history of the private key, including its generation, storage, and any software or services that handled it. Users are advised to:
- Inventory high-value old wallets
- Transfer funds only after securing new key material via trusted hardware or modern wallet software
- Avoid entering old seed phrases into recovery tools or unfamiliar scripts
- Revoke token approvals to mitigate protocol-level exposure
The wallet drain occurred amid a surge in crypto exploits in April, which saw 28 to 30 incidents and losses exceeding $625 million. As of May 1, DefiLlama reported $635,241,950 in stolen funds for the month. Security experts warn that these incidents highlight vulnerabilities in control surfaces that most users rarely inspect.
While the incidents are not directly linked, they collectively expose weaknesses in key management and protocol security. The broader crypto community is now urged to reassess wallet security practices to prevent similar breaches in the future.