The cryptocurrency project “Pi Network,” which has been attracting attention in recent years, has seen a series of reports of frequent theft incidents after the mainnet migration. This article provides a detailed explanation of the current reported damage, its causes, and the measures users should take.
What are the Theft Incidents Occurring on Pi Network?
On Pi Network, after the mainnet migration, there has been a global surge in reports from some users on community sites and Pi app chats stating that “funds were moved from my wallet without my knowledge.” Specifically, cases where funds are sent to suspicious addresses immediately after unlocking the wallet or appearing in transaction history are frequent.
“Even though I didn’t touch my wallet, all my coins disappeared overnight.” (Victim’s Voice)
For example, in December 2024, a user reported that all their coins disappeared overnight, even though they did not recall clicking on any suspicious links.
Possible Causes of the Damage
The main causes considered at this time are as follows:
- Passphrase Leakage: Some suggest the possibility of information leakage from the iPhone’s Notes app. However, this theory remains a rumor and has not been confirmed.
- Access to Suspicious Sites: There have also been reports of cases where a small amount of Pi was sent to a Pi wallet without the user’s knowledge, and the user accessed a link provided there and entered their passphrase.
- Insufficient Security Settings: The lack of additional security features such as two-factor authentication in the Pi wallet is also considered an issue.
- Blockchain Transparency: Since the wallet unlock time is publicly available on the blockchain, there is a possibility that attackers may exploit this.
Measures to Prevent Theft
The measures proposed by the Pi Network community and moderators are as follows:
1. Create a New Wallet
If there is a possibility that the passphrase for your existing wallet has been leaked, it is recommended to create a new wallet and set a new passphrase. It is also important not to access suspicious links. If you put Pi back into a leaked wallet, it is highly likely to be stolen again. Be sure to create a new one and store your Pi there.
2. Utilize the Lockup Feature
After the mainnet migration, you can prevent unauthorized transfers by locking up assets within your wallet. After the lockup period ends, quickly send the funds to a new, secure address.
Pi Wallet’s New On-Chain Lockup: Boost Your Mining Rate!
3. Migration to External Wallets
Moving assets to a trusted external wallet or exchange is also an option. However, complete safety is not guaranteed even with this method.
Expectations for the Pi Network Operations Team and Future Challenges
This theft incident presents significant challenges for the Pi Network operations team. The following improvements are particularly needed:
- Introduction of Two-Factor Authentication: Strengthening protection for user account and wallet access.
- Speeding up KYC (Identity Verification): Strengthening support for users who have not completed KYC.
- Fraudulent Address Freezing Function: A mechanism to prevent transfers to clearly fraudulent addresses.
As an administrator, I also hope that two-factor authentication will be introduced.
Continuing to hold locked-up Pi without knowing if your wallet is being targeted is nothing but anxiety-inducing. I thought of an idea to try buying listed Pi and putting it in my wallet to see if it gets stolen, but trying it with the premise of it being stolen is foolish, and even if it were stolen, there are currently no countermeasures, which is frustrating. With so many reports of theft, it makes one anxious.
Summary: Warning to Users
Pi Network is a project that will continue to attract attention, but its transparency also comes with security risks. Users themselves need to be aware of the following points and take safety measures:
- Store passphrases and important information in a safe place
Reference
How to Securely Store Your Pi Wallet Recovery Phrase - Regularly check for the latest information on Pi
- If KYC procedures are incomplete, address them promptly and consider storage methods
Refer to the measures introduced in this article to protect your valuable assets.