UXLINK suffers $11M loss after multi-signature wallet breach. Explore the details and market impact.UXLINK suffers $11M loss after multi-signature wallet breach. Explore the details and market impact.

UXLINK Faces $11M Loss After Security Breach

2025/12/09 19:00
UXLINK Security Breach: A $11M Loss - Summary and Impact
Key Points:
  • Main security breach led to $11M cryptocurrency loss.
  • Unauthorized minting of UXLINK tokens occurred.
  • Law enforcement engaged for asset recovery.

UXLINK suffered over $11 million in asset theft due to a multi-signature wallet breach. This security incident involved token minting and was exacerbated by a deepfake video-conferencing attack, leading to significant unauthorized transfers and exchanges’ asset freezing efforts.

UXLINK suffered a $11M loss after an external attack exploited a vulnerability in their multi-signature wallet, confirmed on September 22, 2025.

Security Breach Overview

On September 22, 2025, UXLINK reported a serious security breach in their multi-signature wallet, which resulted in more than $11 million in stolen assets. The breach prompted an immediate analysis by security teams.

The attack exploited administrative vulnerabilities in the wallet, allowing unauthorized minting of UXLINK tokens. Security and law enforcement are now involved in efforts to track and recover the stolen assets.

Market Impact and Response

The breach had widespread effects, causing a 70% drop in UXLINK token price and significant market instability. Major cryptocurrency exchanges halted trading to prevent further losses. This incident emphasized the need for robust security measures in the digital finance industry, showcasing potential vulnerabilities in crypto infrastructure.

UXLINK’s response involved collaborating with exchanges to halt trading and freeze compromised funds. Investigations are ongoing to fully understand the scope and prevent future attacks.

Historical data suggests that multi-signature breaches in the crypto industry result in significant financial losses. Enhanced security protocols are necessary to protect against such vulnerabilities and restore user confidence.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31