{"id":8795,"date":"2026-05-01T15:23:50","date_gmt":"2026-05-01T15:23:50","guid":{"rendered":"https:\/\/cryptonews.uk.com\/?p=8795"},"modified":"2026-05-01T15:23:50","modified_gmt":"2026-05-01T15:23:50","slug":"someone-just-drained-long-forgotten-dormant-ethereum-wallets-and-the-cause-may-trace-back-years","status":"publish","type":"post","link":"https:\/\/cryptonews.uk.com\/?p=8795","title":{"rendered":"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years"},"content":{"rendered":"<p><\/p>\n<div>\n<div class=\"post-box__preferred-source\">  <span class=\"cs-preferred-google-badge__text\">Make<\/span> <span class=\"cs-preferred-google-badge__brand\" aria-hidden=\"true\"> <img class=\"cs-preferred-google-badge__brand-mark\" src=\"https:\/\/cryptoslate.com\/wp-content\/themes\/cryptoslate-2020\/images\/cryptoslate-icon.jpg\" alt=\"\" width=\"16\" height=\"16\" decoding=\"async\"\/><img class=\"lazyload cs-preferred-google-badge__brand-mark\" src=\"https:\/\/cryptoslate.com\/wp-content\/themes\/cryptoslate-2020\/images\/cryptoslate-icon.jpg\" alt=\"\" width=\"16\" height=\"16\" decoding=\"async\"\/> <span class=\"cs-preferred-google-badge__brand-name\">CryptoSlate<\/span> <\/span> <span class=\"cs-preferred-google-badge__text\">preferred on<\/span> <img class=\"cs-preferred-google-badge__google-wordmark\" src=\"https:\/\/cryptoslate.com\/wp-content\/themes\/cryptoslate-2020\/images\/google-logo.svg\" alt=\"\" width=\"48\" height=\"16\" decoding=\"async\" aria-hidden=\"true\"\/><img loading=\"lazy\" class=\"lazyload cs-preferred-google-badge__google-wordmark\" src=\"https:\/\/cryptoslate.com\/wp-content\/themes\/cryptoslate-2020\/images\/google-logo.svg\" alt=\"\" width=\"48\" height=\"16\" decoding=\"async\" aria-hidden=\"true\"\/> <\/div>\n<p><em>Hundreds of Ethereum wallets that had sat untouched for years were drained into the same tagged address, turning old key exposure into this week\u2019s sharpest crypto security warning.<\/em><\/p>\n<p>On Apr. 30, <a href=\"https:\/\/twitter.com\/WazzCrypto\/status\/2049873991737786723\">WazzCrypto flagged<\/a> the incident affecting mainnet wallets on X, and their warning spread quickly because the affected accounts did not appear to be freshly baited hot wallets. They were old wallets with quiet histories, some tied to assets and tooling from an earlier Ethereum era.<\/p>\n<p>Over 260 ETH, roughly $600,000, was drained from hundreds of dormant wallets. More than 500 wallets appear to be affected, with losses totaling roughly $800,000, and many wallets have been idle for four to eight years. The related Etherscan address is labeled<code>Fake_Phishing2831105<\/code>, and shows 596 transactions, and records a 324.741 ETH movement to THORChain Router v4.1.1 around the Apr. 30 window.<\/p>\n<p>The constant across them is more important for now: long-idle wallets have been moved to a common destination, while the compromise path remains unresolved.<\/p>\n<p>That unresolved vector makes the drain the strongest warning this week, following a surge in DeFi hacks. Protocol exploits usually give investigators a contract, a function call, or a privileged transaction to inspect.<\/p>\n<p>Here, the central question sits at the wallet layer. Did someone obtain old seed phrases, crack weakly generated keys, use leaked private-key material, abuse a tool that once handled keys, or exploit another path that has yet to surface?<\/p>\n<p>Public discussion has produced theories including weak entropy in legacy wallet tools, compromised mnemonics, trading-bot key handling, and LastPass-era seed storage. One affected user personally raised the LastPass theory.<\/p>\n<p>The practical advice for users is limited but urgent. Idleness does not mitigate private-key risk. A wallet with value depends on the full history of the key, the seed phrase, the device that generated it, the software that touched it, and every place that secret may have been stored.<\/p>\n<p>For users, the response is probably to inventory high-value old wallets, move funds only after setting up fresh key material through trusted hardware or modern wallet software, and avoid entering old seeds into checkers, scripts, or unfamiliar recovery tools. Revoking approvals helps for protocol exposure, including Wasabi&#8217;s user warning, but a direct wallet drain points first to key security rather than token approvals.<\/p>\n<h2>April widened the control surface<\/h2>\n<p>The wallet cluster landed amid April&#8217;s crypto exploit tally, which was already elevated. DefiLlama-linked reporting put April at roughly 28 to 30 incidents and more than $625 million in stolen funds. As of May 1, the live DefiLlama API showed 28 April incidents totaling $635,241,950.<\/p>\n<p>A May 1 market thread captured the pressure point: this week&#8217;s wallet drains, Wasabi Protocol&#8217;s admin-key exploit, and April&#8217;s larger DeFi losses all hit control surfaces that ordinary users rarely inspect. The link across the month is architectural rather than attributional.<\/p>\n<p><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-534175 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49c096bd08191be09d89c104bd258.jpeg\" alt=\"Timeline infographic showing April 2026 Drift, KelpDAO, Wasabi, and dormant Ethereum wallet incidents with loss amounts and hidden control points.\" width=\"1024\" height=\"1536\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49c096bd08191be09d89c104bd258.jpeg 1024w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49c096bd08191be09d89c104bd258-200x300.jpeg 200w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49c096bd08191be09d89c104bd258-683x1024.jpeg 683w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49c096bd08191be09d89c104bd258-768x1152.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"\/><\/p>\n<div class=\"cs-article-embed\">\n<div class=\"cs-article-embed__media\"> <img loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/north-korea-exploit-team-1024x576.webp\" alt=\"North Korea hit crypto for $500M+ this month \u2014 and the $6.75 billion threat is not over yet\" loading=\"lazy\" decoding=\"async\"\/><img loading=\"lazy\" class=\"lazyload\" width=\"1024\" height=\"576\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/north-korea-exploit-team-1024x576.webp\" alt=\"North Korea hit crypto for $500M+ this month \u2014 and the $6.75 billion threat is not over yet\" loading=\"lazy\" decoding=\"async\"\/><\/div>\n<div class=\"cs-article-embed__body\"> <span class=\"cs-article-embed__related-reading\">Related Reading<\/span><\/p>\n<h3 class=\"cs-article-embed__title\">North Korea hit crypto for $500M+ this month \u2014 and the $6.75 billion threat is not over yet<\/h3>\n<p>Drift Protocol and KelpDAO were hit for roughly $286 million and $290 million as attackers targeted peripheral infrastructure.<\/p>\n<p> <span class=\"cs-article-embed__meta-item\">Apr 21, 2026<\/span> <span class=\"cs-article-embed__meta-divider\">\u00b7<\/span> <span class=\"cs-article-embed__meta-item\">Oluwapelumi Adejumo<\/span><\/p>\n<\/div><\/div>\n<h2>Admin paths became attack paths<\/h2>\n<p>Wasabi Protocol supplies the clearest recent protocol example. The Apr. 30 exploit reportedly drained roughly $4.5 million to $5.5 million after an attacker gained deployer\/admin authority, granted <code>ADMIN_ROLE<\/code> to attacker-controlled contracts, and used UUPS proxy upgrades to drain vaults and pools across Ethereum, Base, and Blast. <a href=\"https:\/\/twitter.com\/blockaid_\/status\/2049768426181104095\">Early security alerts<\/a> flagged the admin-upgrade pattern as the attack unfolded.<\/p>\n<p>The reported mechanics put key management at the center of the incident. Upgradeability can be normal maintenance infrastructure. Concentrated upgrade authority turns that maintenance path into a high-value target. If one deployer or privileged account can change implementation logic across chains, the boundary around an audited contract can vanish once that authority is compromised.<\/p>\n<p>That is the user-facing problem hidden inside many DeFi interfaces. A protocol can present open contracts, public front ends, and decentralization language while critical upgrade power still sits in a small set of operational keys.<\/p>\n<h2>Signers and verifiers carried the largest losses<\/h2>\n<p>Drift pushed the same control problem into signer workflow. Chainalysis described social engineering, durable nonce transactions, fake collateral, oracle manipulation, and a zero-timelock 2-of-5 Security Council migration. Blockaid put the loss around $285 million and argued that transaction simulation and stricter co-signer policies could have changed the outcome.<\/p>\n<p>The Drift case matters here because the path did not depend on a simple public-function bug. It depended on a workflow where valid signatures and fast governance machinery could be turned toward a hostile migration. A signer process became the control surface.<\/p>\n<div class=\"cs-article-embed\">\n<div class=\"cs-article-embed__media\"> <img loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/north-korean-hacker-1024x683.jpg\" alt=\"Compromised developers lying dormant within crypto projects risks next major crypto exploit\" loading=\"lazy\" decoding=\"async\"\/><img loading=\"lazy\" class=\"lazyload\" width=\"1024\" height=\"683\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/north-korean-hacker-1024x683.jpg\" alt=\"Compromised developers lying dormant within crypto projects risks next major crypto exploit\" loading=\"lazy\" decoding=\"async\"\/><\/div>\n<div class=\"cs-article-embed__body\"> <span class=\"cs-article-embed__related-reading\">Related Reading<\/span><\/p>\n<h3 class=\"cs-article-embed__title\">Compromised developers lying dormant within crypto projects risks next major crypto exploit<\/h3>\n<p>The bigger risk after Drift may be the access attackers gain before a protocol knows it has a problem.<\/p>\n<p> <span class=\"cs-article-embed__meta-item\">Apr 8, 2026<\/span> <span class=\"cs-article-embed__meta-divider\">\u00b7<\/span> <span class=\"cs-article-embed__meta-item\">Gino Matos<\/span><\/p>\n<\/div><\/div>\n<p>KelpDAO moved the stress test into cross-chain verification. The incident statement described a bridge configuration in which the rsETH route used LayerZero Labs as the sole DVN verifier. Forensic reviews described compromised RPC nodes and DDoS pressure feeding false data to a single-point verification path.<\/p>\n<div id=\"cs-inline-newsletter-69f4c1cccdbaa\" class=\"cs-inline-newsletter\" data-inline-newsletter=\"\">\n<div class=\"cs-inline-newsletter__inner\">\n<div class=\"cs-inline-newsletter__content\"> <span class=\"cs-inline-newsletter__eyebrow\">CryptoSlate Daily Brief<\/span><\/p>\n<h3 class=\"cs-inline-newsletter__title\">Daily signals, zero noise.<\/h3>\n<p class=\"cs-inline-newsletter__copy\">Market-moving headlines and context delivered every morning in one tight read.<\/p>\n<p> <span><i class=\"fa-regular fa-bolt\" aria-hidden=\"true\"\/> 5-minute digest<\/span> <span><i class=\"fa-regular fa-star\" aria-hidden=\"true\"\/> 100k+ readers<\/span><\/p>\n<\/div>\n<div class=\"cs-inline-newsletter__form-shell\">\n<p class=\"cs-inline-newsletter__privacy\">Free. No spam. Unsubscribe any time.<\/p>\n<p> <i class=\"fa-regular fa-circle-xmark\" aria-hidden=\"true\"\/> <span>Whoops, looks like there was a problem. Please try again.<\/span><\/p>\n<p> <i class=\"fa-regular fa-circle-check\" aria-hidden=\"true\"\/> <span>You\u2019re subscribed. Welcome aboard.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>The result, according to Chainalysis, was 116,500 rsETH, worth roughly $292 million, released against a non-existent burn. The token contract could remain intact while the bridge accepted a false premise. That is why a verifier failure can become a market-structure problem once the bridged asset sits inside lending markets and liquidity pools.<\/p>\n<div class=\"cs-article-embed\">\n<div class=\"cs-article-embed__media\"> <img loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/defi-united-kepdao-1024x576.jpg\" alt=\"DeFi lost $13B this month as the KelpDAO rescue shows both the best and worst of DeFi\" loading=\"lazy\" decoding=\"async\"\/><img loading=\"lazy\" class=\"lazyload\" width=\"1024\" height=\"576\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/04\/defi-united-kepdao-1024x576.jpg\" alt=\"DeFi lost $13B this month as the KelpDAO rescue shows both the best and worst of DeFi\" loading=\"lazy\" decoding=\"async\"\/><\/div>\n<div class=\"cs-article-embed__body\"> <span class=\"cs-article-embed__related-reading\">Related Reading<\/span><\/p>\n<h3 class=\"cs-article-embed__title\">DeFi lost $13B this month as the KelpDAO rescue shows both the best and worst of DeFi<\/h3>\n<p>The rescue effort that has already lined up tens of thousands of ETH also exposes the uncomfortable reality that DeFi\u2019s biggest crises still depend on multiple factors.<\/p>\n<p> <span class=\"cs-article-embed__meta-item\">Apr 26, 2026<\/span> <span class=\"cs-article-embed__meta-divider\">\u00b7<\/span> <span class=\"cs-article-embed__meta-item\">Gino Matos<\/span><\/p>\n<\/div><\/div>\n<h2>AI belongs in the speed discussion<\/h2>\n<p>I think Project Glasswing deserves a special mention here for context, separate from causation. Anthropic says Claude Mythos Preview found thousands of high-severity software vulnerabilities and shows how AI can compress vulnerability discovery. That raises the bar for defenders, but the causal record in these crypto incidents points to keys, signers, admin powers, bridge verification, RPC dependencies, and unresolved wallet exposure.<\/p>\n<p>The security implications are still serious. Faster discovery gives attackers and defenders more parallel surface to work through. It also makes old operational shortcuts more expensive because dormant secrets, privileged keys, and single-verifier paths can be tested faster than teams can manually review them.<\/p>\n<h2>The repair list is operational<\/h2>\n<p>The controls that follow from April sit above and around the codebase.<\/p>\n<table>\n<thead>\n<tr>\n<th>Incident<\/th>\n<th>Hidden control point<\/th>\n<th>Failure mode<\/th>\n<th>Practical control<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Dormant Ethereum wallets<\/td>\n<td>Old wallet material<\/td>\n<td>Funds moved from long-idle wallets into a tagged address while the vector remains unresolved<\/td>\n<td>Fresh key generation for valuable dormant funds, cautious migration, and no seed entry into unknown tools<\/td>\n<\/tr>\n<tr>\n<td>Wasabi<\/td>\n<td>Admin and upgrade authority<\/td>\n<td>Privileged role grants and UUPS upgrades enabled vault and pool drains<\/td>\n<td>Key rotation, stronger thresholds, bounded admin powers, timelocks, and independent monitoring of upgrade actions<\/td>\n<\/tr>\n<tr>\n<td>Drift<\/td>\n<td>Security Council signer workflow<\/td>\n<td>Pre-signed durable nonce transactions and zero-delay governance enabled fast admin takeover<\/td>\n<td>Higher thresholds, delay windows, transaction simulation, and policy-enforced co-signing<\/td>\n<\/tr>\n<tr>\n<td>KelpDAO<\/td>\n<td>Bridge verification path<\/td>\n<td>RPC poisoning and a 1-of-1 DVN route allowed a false cross-chain message to pass<\/td>\n<td>Multi-DVN verification, cross-chain invariant monitoring, and independent checks outside the same verifier path<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-534176 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4.jpeg\" alt=\"Control map infographic showing admin keys, signer workflows, bridge verifiers, and old wallet material with operational defenses and user checks.\" width=\"1000\" height=\"1573\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4.jpeg 1000w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-191x300.jpeg 191w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-651x1024.jpeg 651w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-768x1208.jpeg 768w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-976x1536.jpeg 976w\" sizes=\"(max-width: 1000px) 100vw, 1000px\"\/><img loading=\"lazy\" decoding=\"async\" class=\"lazyload aligncenter wp-image-534176 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4.jpeg\" alt=\"Control map infographic showing admin keys, signer workflows, bridge verifiers, and old wallet material with operational defenses and user checks.\" width=\"1000\" height=\"1573\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4.jpeg 1000w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-191x300.jpeg 191w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-651x1024.jpeg 651w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-768x1208.jpeg 768w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/05\/ig_0a471476ce2b829c0169f49b5222ec8191b42ce41ce50a24a4-976x1536.jpeg 976w\" data-sizes=\"(max-width: 1000px) 100vw, 1000px\"\/><\/p>\n<p>For protocols, the priority is to reduce the amount that any single authority can do at once. That means time locks on admin operations, stronger and more stable signer thresholds, monitored privileged-transaction queues, explicit limits on parameter changes, and co-signing systems that simulate transaction effects before humans approve them.<\/p>\n<p>For bridges, the priority is independent verification and invariant checks. A cross-chain message should be tested against the economic fact it claims to represent. If rsETH leaves one side, the system should verify the corresponding state change on the other side before the destination side releases value. That monitoring needs to exist outside the same path that signs the message.<\/p>\n<p>For users, the repair list is smaller. Move valuable old funds to fresh keys through a process you already trust. Separate that action from protocol-specific approval cleanup. Treat every claim about the wallet-drain root cause as provisional until forensic work identifies a common tool, storage path, or exposure source.<\/p>\n<h2>The next test<\/h2>\n<p>April proved that the average user&#8217;s security checklist is likely incomplete. Audits, public contracts, and decentralized interfaces can coexist with concentrated admin authority, weak signer procedures, brittle bridge verification, and old wallet secrets.<\/p>\n<p>The next quarter will reward proof over decentralization language: constrained upgrade powers, visible timelocks, independent verifier paths, transaction simulation for privileged actions, disciplined access controls, and documented key rotation.<\/p>\n<p>The dormant-wallet drains show the uncomfortable user-side version of the same problem. A system can look quiet while an old control failure waits in the background. April&#8217;s exploit wave exposed that layer above the code; the next phase will show which teams treat it as core security before funds move.<\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>DeFi,Featured,Hacks,Market,Wallets#drained #longforgotten #dormant #Ethereum #wallets #trace #years1777649030<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Make CryptoSlate preferred on Hundreds of Ethereum wallets that had sat untouched for years were drained into the same tagged address, turning old key exposure into this week\u2019s sharpest crypto security warning. On Apr. 30, WazzCrypto flagged the incident affecting mainnet wallets on X, and their warning spread quickly because the affected accounts did not<\/p>\n","protected":false},"author":1,"featured_media":8796,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[4304,2090,31,4303,2647,35,742],"class_list":{"0":"post-8795","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-dormant","9":"tag-drained","10":"tag-ethereum","11":"tag-longforgotten","12":"tag-trace","13":"tag-wallets","14":"tag-years"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years - Crypto News: Latest Cryptocurrency News and Analysis<\/title>\n<meta name=\"description\" content=\"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptonews.uk.com\/?p=8795\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years\" \/>\n<meta property=\"og:description\" content=\"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptonews.uk.com\/?p=8795\" \/>\n<meta property=\"og:site_name\" content=\"Crypto News: Latest Cryptocurrency News and Analysis\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T15:23:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u884c\u653f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u884c\u653f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795\",\"url\":\"https:\/\/cryptonews.uk.com\/?p=8795\",\"name\":\"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years - Crypto News: Latest Cryptocurrency News and Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg\",\"datePublished\":\"2026-05-01T15:23:50+00:00\",\"author\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\"},\"description\":\"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptonews.uk.com\/?p=8795\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage\",\"url\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg\",\"contentUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=8795#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptonews.uk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptonews.uk.com\/#website\",\"url\":\"https:\/\/cryptonews.uk.com\/\",\"name\":\"Crypto News: Latest Cryptocurrency News and Analysis\",\"description\":\"Latest Crypto &amp; Bitcoin News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cryptonews.uk.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\",\"name\":\"\u884c\u653f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"caption\":\"\u884c\u653f\"},\"sameAs\":[\"http:\/\/demo3.aiwalls.com\/coinbase\"],\"url\":\"https:\/\/cryptonews.uk.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years - Crypto News: Latest Cryptocurrency News and Analysis","description":"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptonews.uk.com\/?p=8795","og_locale":"en_US","og_type":"article","og_title":"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years","og_description":"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.","og_url":"https:\/\/cryptonews.uk.com\/?p=8795","og_site_name":"Crypto News: Latest Cryptocurrency News and Analysis","article_published_time":"2026-05-01T15:23:50+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg","type":"image\/jpeg"}],"author":"\u884c\u653f","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u884c\u653f","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cryptonews.uk.com\/?p=8795","url":"https:\/\/cryptonews.uk.com\/?p=8795","name":"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years - Crypto News: Latest Cryptocurrency News and Analysis","isPartOf":{"@id":"https:\/\/cryptonews.uk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage"},"image":{"@id":"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage"},"thumbnailUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg","datePublished":"2026-05-01T15:23:50+00:00","author":{"@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf"},"description":"Hundreds of dormant Ethereum wallets were drained as April&#039;s crypto exploit wave exposed risks around old keys, admin powers, and bridges.","breadcrumb":{"@id":"https:\/\/cryptonews.uk.com\/?p=8795#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptonews.uk.com\/?p=8795"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/?p=8795#primaryimage","url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg","contentUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/05\/dormant-ethereum-wallet-drained.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/cryptonews.uk.com\/?p=8795#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptonews.uk.com\/"},{"@type":"ListItem","position":2,"name":"Someone just drained long-forgotten dormant Ethereum wallets, and the cause may trace back years"}]},{"@type":"WebSite","@id":"https:\/\/cryptonews.uk.com\/#website","url":"https:\/\/cryptonews.uk.com\/","name":"Crypto News: Latest Cryptocurrency News and Analysis","description":"Latest Crypto &amp; Bitcoin News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptonews.uk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf","name":"\u884c\u653f","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","caption":"\u884c\u653f"},"sameAs":["http:\/\/demo3.aiwalls.com\/coinbase"],"url":"https:\/\/cryptonews.uk.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/8795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8795"}],"version-history":[{"count":0,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/8795\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/media\/8796"}],"wp:attachment":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}