Low-Value Wallet Drains Spread Quietly Across EVM Chains
The post Low-Value Wallet Drains Spread Quietly Across EVM Chains appeared on BitcoinEthereumNews.com.
A coordinated wave of cryptocurrency theft is unfolding quietly across multiple blockchain networks, targeting everyday users rather than high-profile wallets. While no single incident appears catastrophic on its own, the cumulative impact is becoming increasingly difficult to ignore. Blockchain investigator ZachXBT has flagged an ongoing series of wallet-draining incidents affecting hundreds of addresses across EVM-compatible chains. The defining characteristic of the attack is its scale-by-volume approach. Most victims lose less than $2,000, an amount small enough to avoid immediate alarm, yet large enough to add up quickly when repeated hundreds of times. So far, on-chain analysis estimates that approximately $107,000 has been drained. That number continues to rise as new compromised wallets are identified. The activity was highlighted publicly through an aggregated dashboard shared by ZachXBT and later amplified by the broader security community. HACKERS ARE QUIETLY STEALING FUNDS FROM EVERYDAY WALLETS ACROSS EVM CHAINS🚨 Researcher ZachXBT warns that hundreds of wallets are being drained across multiple EVM networks. Most victims lose small amounts (under $2K), but the total stolen has already reached $107K. The exact… pic.twitter.com/Jl6DcI0JqE — Zia ul Haque (@ImZiaulHaque) January 2, 2026 What makes the situation notable is not just the losses, but the method. This is not a smash-and-grab exploit. It is a slow bleed. A Strategy Built On Staying Below The Radar The attack appears deliberately structured to evade attention. Instead of targeting large treasuries or whales, the attacker focuses on low-value wallets, draining small balances from many users rather than emptying a few accounts entirely. Most affected users lose amounts well below thresholds that typically trigger urgent investigations or exchange-level alerts. This strategy reduces visibility while maintaining a steady flow of stolen funds. From a behavioral perspective, this approach exploits a gap in user response. Many victims may assume the loss is a mistake,…
Filed under: News - @ January 3, 2026 8:25 am