<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>seed phrase Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/seed-phrase/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/seed-phrase/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 20 Nov 2025 07:18:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>seed phrase Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/seed-phrase/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Is the WLFI Network at Risk? User Wallets Secured</title>
		<link>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/</link>
					<comments>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 10:00:30 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain safety]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[fund security]]></category>
		<category><![CDATA[kyc verification]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[user wallets]]></category>
		<category><![CDATA[WLFI]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=57438</guid>

					<description><![CDATA[<p>World Liberty Financial WLFI announced that before the platform’s launch, a small number of user wallets were compromised due to phishing attacks or exposed seed phrases. The platform froze affected wallets and required users to complete identity verification. In addition, WLFI developed new smart contract logic to securely reallocate user funds. Prioritizing User Fund Security</p>
<p>The post <a href="https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/">Is the WLFI Network at Risk? User Wallets Secured</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="265" data-end="610"><a href="https://coinengineer.net/blog/world-liberty-financial-wlfi-rewards/"><strong>World Liberty Financial</strong></a> WLFI announced that before the platform’s launch, a small number of user wallets were compromised due to phishing attacks or exposed seed phrases. The platform froze affected wallets and required users to complete identity verification. In addition, <strong>WLFI</strong> developed new smart contract logic to securely reallocate user funds.</p>
<h2 data-start="617" data-end="653">Prioritizing User Fund Security</h2>
<p data-start="655" data-end="945">WLFI emphasized that the security breaches were not caused by the platform or its smart contracts. Attackers accessed wallets through third-party security failures. In September, impacted wallets were frozen and owners were asked to re-complete <a href="https://x.com/worldlibertyfi/status/1991243561715519933?s=20">KYC</a> verification to confirm their identity.</p>
<p data-start="947" data-end="1168">Throughout the process, protecting user funds remained the top priority. The team tested new smart contract logic to ensure safe reallocation of funds. While the procedure took time, security was prioritized over speed.</p>
<h2 data-start="1175" data-end="1221">New Smart Contracts and Fund Reallocation</h2>
<p data-start="1223" data-end="1548">The new smart contract logic was specifically designed for bulk fund reallocation. Users who complete the required KYC verification will be able to securely access their funds. Wallets of users who have not yet completed the verification process remain frozen, but they can initiate verification through WLFI’s help center.</p>
<p data-start="1550" data-end="1771">By implementing these measures, WLFI ensures both regulatory compliance and maximum protection for user funds. The platform reiterated that the attacks stemmed from external vulnerabilities, not the WLFI network itself.</p>
<h2 data-start="1778" data-end="1814">Important Information for Users</h2>
<ul data-start="1816" data-end="2091">
<li data-start="1816" data-end="1912">
<p data-start="1818" data-end="1912">Affected users will have funds reallocated to new wallets after completing KYC verification.</p>
</li>
<li data-start="1913" data-end="2005">
<p data-start="1915" data-end="2005">Users who have not verified their identity can start the process via the support center.</p>
</li>
<li data-start="2006" data-end="2091">
<p data-start="2008" data-end="2091">The new smart contracts ensure secure bulk fund transfers for all verified users.</p>
</li>
</ul>
<p data-start="2093" data-end="2208">WLFI continues to update users and prioritize platform security while maintaining trust and regulatory standards.</p>
<p data-start="2093" data-end="2208"><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for </em><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/">Is the WLFI Network at Risk? User Wallets Secured</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/rezerv_ce-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/rezerv_ce-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crocodilus Malware Expands to Crypto Wallets</title>
		<link>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/</link>
					<comments>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 17:00:43 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[amlbot]]></category>
		<category><![CDATA[Android 13]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[Crocodilus]]></category>
		<category><![CDATA[crypto drainers]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[Facebook ad scam]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[mobile malware]]></category>
		<category><![CDATA[mobile threat]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[private keys]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[South America]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43731</guid>

					<description><![CDATA[<p>Malicious mobile software continues to evolve—sometimes faster than defenses. One recent threat, Crocodilus, has shifted its focus beyond banking apps to now infiltrate cryptocurrency wallets across multiple continents. First seen in Turkey in March 2025, Crocodilus is now active in countries like Poland, Spain, Brazil, Argentina, India, Indonesia, and the U.S., signaling a global expansion</p>
<p>The post <a href="https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/">Crocodilus Malware Expands to Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="2835" data-end="3062">Malicious mobile software continues to evolve—sometimes faster than defenses. One recent threat, <strong data-start="2932" data-end="2946">Crocodilus</strong>, has shifted its focus beyond banking apps to now infiltrate cryptocurrency wallets across multiple continents.</p>
<p data-start="3064" data-end="3288">First seen in Turkey in March 2025, <strong>Crocodilus</strong> is now active in countries like Poland, Spain, Brazil, Argentina, India, Indonesia, and the U.S., signaling a global expansion that concerns both banks and crypto holders alike.</p>
<h2 data-start="3295" data-end="3325">Fake Apps, Real Intrusions</h2>
<p data-start="3327" data-end="3599">In Poland, attackers used <strong data-start="3353" data-end="3369">Facebook </strong>ads to lure users with bogus loyalty app promotions. These ads—targeted at users over 35—redirected victims to malware-hosting sites. Once installed, the Trojan bypassed <strong data-start="3536" data-end="3550">Android 13</strong> restrictions and deployed its attack mechanisms.</p>
<hr />
<p data-start="3601" data-end="3889"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></span></em></p>
<hr />
<p data-start="3601" data-end="3889">In Spain, <strong>Crocodilus</strong> disguised itself as a browser update. Once on a device, it overlays fake login pages on top of real banking and crypto apps, harvesting sensitive credentials. It even inserts fake “Bank Support” contacts into user phonebooks to aid social engineering efforts.</p>
<p data-start="3601" data-end="3889"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-157595 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/06/crocodilus-1024x575.png" alt="crocodilus" width="814" height="457" /></p>
<h2 data-start="3896" data-end="3934">Crypto Wallets Under Direct Attack</h2>
<p data-start="3936" data-end="4182">The most alarming upgrade is <strong>Crocodilus</strong>’ new ability to automatically extract seed phrases and private keys from infected devices. Equipped with advanced parsing modules, the malware can quickly hijack wallet access with remarkable precision.</p>
<p data-start="4184" data-end="4371">To avoid detection, the latest variant uses deep obfuscation techniques like XOR encryption and intentionally complex logic, making reverse engineering a challenge for security teams.</p>
<p data-start="4373" data-end="4529">Smaller campaigns have also been seen targeting crypto mining apps and digital banks in Europe—highlighting the malware&#8217;s growing focus on crypto users.</p>
<hr />
<p data-start="4373" data-end="4529"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/">Crocodilus Malware Expands to Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Retired Artist Loses $2M in Crypto to Fake Coinbase Site</title>
		<link>https://coinengineer.net/blog/retired-artist-loses-2m-in-crypto-to-fake-coinbase-site/</link>
					<comments>https://coinengineer.net/blog/retired-artist-loses-2m-in-crypto-to-fake-coinbase-site/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 18 May 2025 12:00:48 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[coinbase]]></category>
		<category><![CDATA[Coinbase impersonation]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[crypto investor]]></category>
		<category><![CDATA[crypto loss]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[Crypto Support]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[hardware wallet]]></category>
		<category><![CDATA[Jeff Koons]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Trezor]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42624</guid>

					<description><![CDATA[<p>Even the most security-conscious crypto users can fall victim to well-executed scams. A heartbreaking story from earlier this year reveals how a retired artist lost his entire digital fortune — worth $2 million — to criminals impersonating Coinbase support. Seed Phrase Trap: Social Engineering at Its Worst Ed Suman, a 67-year-old former fabricator for top</p>
<p>The post <a href="https://coinengineer.net/blog/retired-artist-loses-2m-in-crypto-to-fake-coinbase-site/">Retired Artist Loses $2M in Crypto to Fake Coinbase Site</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3135" data-end="3400">Even the most security-conscious crypto users can fall victim to well-executed scams. A heartbreaking story from earlier this year reveals how a retired artist lost his entire digital fortune — worth <strong data-start="3335" data-end="3349">$2 million</strong> — to criminals impersonating <strong data-start="3379" data-end="3391">Coinbase</strong> support.</p>
<h2 data-start="3402" data-end="3455">Seed Phrase Trap: Social Engineering at Its Worst</h2>
<p class="" data-start="3457" data-end="3803">Ed Suman, a 67-year-old former fabricator for top artists like <strong data-start="3520" data-end="3534">Jeff Koons</strong>, spent decades in the art world before shifting his focus to <strong data-start="3596" data-end="3624">cryptocurrency investing</strong>. Over time, he amassed 17.5 <strong data-start="3653" data-end="3664">Bitcoin</strong> (<strong data-start="3666" data-end="3673">BTC</strong>) and 225 <strong data-start="3683" data-end="3695">Ethereum</strong> (<strong data-start="3697" data-end="3704">ETH</strong>) — the core of his retirement portfolio — stored safely in a <strong data-start="3766" data-end="3786">Trezor Model One</strong> hardware wallet.</p>
<p class="" data-start="3805" data-end="4036">But in March, he received a text message that appeared to be from <strong data-start="3871" data-end="3883">Coinbase</strong>, alerting him to suspicious account activity. He replied, and shortly afterward, a man calling himself “Brett Miller from Coinbase security” called him.</p>
<hr />
<p data-start="4038" data-end="4301"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="4038" data-end="4301">The caller seemed legitimate, even referencing Suman’s use of a hardware wallet. Over the phone, he walked Suman through a supposed &#8220;security procedure,&#8221; which required him to enter his <strong data-start="4224" data-end="4239">seed phrase</strong> into a site that perfectly mimicked <strong data-start="4276" data-end="4290">Coinbase’s</strong> interface.</p>
<p class="" data-start="4303" data-end="4415">A second scam call came nine days later. After following the same process again, all of Suman’s crypto was gone.</p>
<p data-start="4303" data-end="4415"><img decoding="async" class="aligncenter wp-image-156224 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/coinbase-993x1024.jpg" alt="coinbase" width="765" height="789" /></p>
<h2 data-start="4417" data-end="4463">Real Data Breach at Coinbase Raises Alarms</h2>
<p class="" data-start="4465" data-end="4688">Coincidentally or not, <strong data-start="4488" data-end="4500">Coinbase</strong> recently disclosed a <strong data-start="4522" data-end="4537">data breach</strong> where attackers bribed Indian customer support contractors to access private user data — including names, account balances, and transaction histories.</p>
<p class="" data-start="4690" data-end="4921">Roughly <strong data-start="4698" data-end="4704">1%</strong> of monthly users were affected, including Sequoia Capital’s managing partner <strong data-start="4782" data-end="4798">Roelof Botha</strong>. While no funds were confirmed stolen from him, the incident highlights growing concerns over third-party vulnerabilities.</p>
<p class="" data-start="4923" data-end="5077">Coinbase has since fired the compromised contractors and is planning to compensate affected users with a budget between <strong data-start="5043" data-end="5076">$180 million and $400 million</strong>.</p>
<h2 data-start="5079" data-end="5117">Hardware Wallets Are Not Foolproof</h2>
<p class="" data-start="5119" data-end="5338">Suman’s tragic loss is a painful reminder: <strong data-start="5162" data-end="5178">Seed phrases</strong> should never be entered into any website, regardless of how authentic it looks. The biggest threat in crypto isn’t always technology — it’s human manipulation.</p>
<hr />
<p data-start="5119" data-end="5338"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/retired-artist-loses-2m-in-crypto-to-fake-coinbase-site/">Retired Artist Loses $2M in Crypto to Fake Coinbase Site</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/retired-artist-loses-2m-in-crypto-to-fake-coinbase-site/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-47.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-47.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
