Users are still unaware of the true cause despite the announcement being the wallet provider’s first significant update since the exploit in early June.
Despite the publication of a comprehensive “event statement” addressing the June exploit, users of Atomic Wallet continue to ask questions and demand answers. Losses from the exploit could have reached $100 million, according to estimates.
Atomic Wallet revealed that following the initial claims of the hack, no additional confirmed examples of the hack had been reported. They reaffirmed the widely disputed claim that fewer than 0.1% of app users were impacted.
Although Atomic Wallet could not give precise information regarding the origin of the exploit, it did list four “probable” explanations, including malware code injection, infrastructure breaches, man-in-the-middle assaults, and infected user devices. None of these hypotheses, however, has been proven to be the actual cause of the breach.
In response to the issue, Atomic Wallet’s security architecture was changed, and they are currently working on a security-enhancing software update. External auditors have confirmed the impending update, however their identities and supporting documentation have not been made public.
Concerns have been expressed about Atomic Wallet’s mentioned external auditors’ lack of transparency. Access to their statements and greater information are priorities for users.
Atomic Wallet has come under fire from some users for offering a wide range of probability without clearly articulating how the exploit actually happened. This has caused some people to question how far along the investigation into the breach’s cause has gone.
The possibility of user funds being mixed and laundered as a result of the exploit has been acknowledged by Atomic Wallet. To look into the issue, they have engaged the aid of blockchain analytics companies like Chainalysis and Crystal Blockchain. The inquiry is still being conducted.
Despite the publication of the event statement, users are still looking for explanations and a thorough understanding of the exploit, its effects, and the measures taken to stop similar situations in the future.