A silent, systematic sweep of legacy Ethereum wallets exposes a massive structural vulnerability in the digital asset sector. Attackers drained 572 addresses inactive for years, proving that early storage practices now serve as the primary point of failure for institutional and retail crypto assets.
- Attackers drain 572 legacy Ethereum wallets using compromised private keys from the 2018 era.
- The perpetrator funnels 324.741 ETH worth $760,000 into the THORChain network for conversion to Bitcoin.
- Legacy storage methods lack modern hardware security, creating massive systemic risks for long-term cryptocurrency holders.
The Anatomy of a Key Compromise
Evidence indicated that the incident did not involve a sophisticated software exploit or a protocol-level breach. The perpetrator utilized direct private key access to move funds across hundreds of accounts in a single, coordinated wave. Security researchers confirmed that the thief targeted addresses that remained largely untouched since 2018.
Specter, a blockchain security analyst, noted that the age of the targeted wallets served as the primary selection criteria. Investigators verified that few affected wallets existed for less than five years. The perpetrator funneled roughly 324.741 ETH into the THORChain network, where the funds transitioned into Bitcoin, effectively stripping away the ability for centralized platforms to track the capital.
The Fragility of Legacy Storage
The incident underscored the systemic risk inherent in early storage habits. Users often generated private keys on desktop environments that lacked modern hardware security modules or robust offline air-gapping. Cryptographers argued that these older security setups frequently suffered from slow-burn leaks, where databases from defunct wallet providers or early cloud backups surfaced in dark-web dumps years later.
Wazz, a prominent on-chain investigator, documented the initial wave of activity from these long-dormant addresses. A victim identified as “Capitulation.eth” confirmed that funds departed the wallet to a drainer address without any clear software vulnerability or contract interaction.
Genuine News Deserves Honest Attention.
High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.
👉 Submit Your PRThe attacker utilized the following addresses to facilitate the theft:
- Ethereum: 0xA707034429c8E4E01df056C0CbCf478F0FBeFAd7 (Etherscan)
- Ethereum: 0xEAD93Ad9e8004d9dd25589f7a5702f5813A4d7cd
- Bitcoin: bc1qtyqax7zt6mwfhg4fxfw9nsuz4h6xhxezzyjw
Chain Street’s Take
The $760,000 drain matters less for the dollar figure and more for what it reveals about the rot inside legacy storage. We are watching the expiration of the 2018-era security model. If private keys sat on an old laptop or a weak storage setup, those assets possess far less protection than the owner assumes.
The attacker required no sophisticated hack, only access to old, vulnerable keys. This event proves that blockchain immutability cuts both ways: the ledger remains permanent, but the keys to those ledger entries degrade over time. If a holder has not audited “cold storage” since the last bull run, they are not holding an asset—they are holding a security risk. The only remedy involves generating new keys on modern, hardware-certified devices.
Activate Intelligence Layer
Institutional-grade structural analysis for this article.





