BlockBeats News, March 15, OKX founder and CEO Star responded to the "Wuhan Anjun Technology team's hacker attack using a plugin vulnerability," stating, "The OKX Wallet security team has completed its investigation and described it as an 'OKX Wallet Vulnerability,' which is not accurate. Two points need to be clarified:
· This incident is not a security vulnerability of the OKX Web3 Wallet. The attack method involved hackers taking control of users' devices through trojan horse software, injecting hooks by tampering with webpage JS code, or monitoring keyboard input to steal locally stored encrypted files and passwords.
· The OKX Web3 Wallet is a 100% self-hosted wallet. Private keys and passwords only exist on users' own devices, and OKX cannot access or control user assets. However, if a user's device has already been compromised by hackers, then no wallet—including MetaMask—can guarantee security. It's as if a thief can already operate your computer and see all your keystrokes.
Users are advised to avoid installing software or plugins from unknown sources, regularly check device security, and properly protect their mnemonic phrases and private keys."
It is reported that the Wuhan Anjun Technology team stole mnemonic phrases by controlling a large number of user terminals and remotely transferred digital assets, involving a total amount of $7 million.
