The exchange announced that hack began on June 2 and so far.
It has affected over 1% of the Atomic Wallet users according to the company’s Twitter posts during the early hours of Monday.
Unfortunately, verified hacked Twitter accounts to imitate Atomic Wallet and spread phishing links with the claims of helping users.
Whereas, what they are doing is taking advantage of the chaos and hacking into their accounts to make personal benefits.
How did the Scam Go Down?
The first scam report was revealed on Twitter by @ZachXBT, a Pseudonymous on-Chain researcher.
According to the researcher’s statement, he assisted one victim of the hack to recover $1 million although the recovered fund hasn’t been revealed yet.
READ ALSO: The National Bank of Georgia Set to Inspect Crypto Firms
@ZachXBT Twitter thread disclosed that the tokens included in the stolen funds are BTC (Bitcoin), USDT (Tether), BNB (BNB Coin), Litecoin (LTC), and Polygon (MATIC).
In addition, going by revealed transactions, it seems that the most affected in the scam are the tokens on Tron.
According to the sleuth researcher’s discovery, Tron lost up to 7.95 million USD through the hack.
Earlier today, the platform twitted that “confirmation of the last scammed account came up about 40 hours ago”.
Meanwhile, the social is flooded with victims who claim to have lost their cryptocurrency savings.
It seems that the effect of this scam is likely to become larger than was reported.
The community has called up Atomic Wallet for trying to dilute the actual impact of the scam.
More Details of the Hack So Far
On the official Telegram Channel of Atomic Wallet, users claim that the hack came about after the platform’s recent software upgrade.
In contrast, some users claim that their funds were siphoned even though they haven’t updated to the recent software update.
So far, there haven’t been any official specifics from the wallet.
This means, apart from the disclosure from @ZachXBT and the Twitter posts from Atomic Wallet that said the company is investigating the matter and analyzing the scam.
In the meantime, victims of the hack are to send in their information on a Google Docs form which the company will use during the going on investigations.