π¨ EMERGENCY ALERT π¨
bitstoday.medium.com/f78fd54063ec
Last week, 30+ BitClout accounts were compromised and ~$30,000 in funds were misappropriated. The manner in which a bad actor was able to compromise these accounts has now been *fully identified*.
The executable versions of the applications @cloutspy and @bitwatcher both include malware that can extract your seed phrase, allowing their developer to access your BitClout account. If you use these applications and / or still have them on your computer, stop using them and delete them *immediately*.
For FULL DETAILS and important next steps on how to secure your account if compromised, please read the special edition in full. A @BitCloutPulse stage with additional information and discussion will also be live soon: discord.gg/bitclout
Myriad thanks to @tijn, @dgsus, @smartalec, @automatic, @BitCloutPulse, @HunterPaulson, and @PaulBurke for spearheading this investigation.
