https://phishdestroy.io/xmrwallet-exposedhttps://i.ibb.co/q3vLbWMN/og-xmrwallet.pngOur team has been tracking this service for some time. We focus on scam infrastructure analysis, threat attribution, and technical documentation. This is not a commercial effort — we publish findings publicly and work with affected parties only within a legitimate legal framework.
What we've confirmed so far:
This is not a case of poor security practice or an isolated bug. The evidence we've collected points to a systematic, intentional operation designed to harvest private view keys from every wallet opened through the service — including wallets created on the platform.
Our preliminary analysis covered:
Network traffic behavior and request structure
Private key handling and session token encoding
Infrastructure patterns and backend API design
Technical findings are documented publicly:
→
https://github.com/XMRWallet/Website/issues/36→
https://github.com/XMRWallet/Website/issues/35Current status:
We have partial attribution signals. We are not publishing them yet — doing so prematurely would compromise any chance of real accountability.
What we need:
Attribution alone is not actionable without victims willing to formally participate. If you used xmrwallet.com and experienced unexplained fund loss or suspicious activity, your cooperation would allow this investigation to move from analysis to enforcement.
Specifically useful:
Transaction history from the period of use
Wallet addresses used on the platform
Screenshots or logs if available
Willingness to engage with a legal process
Contact via this thread or privately. All communications handled confidentially.
We will continue publishing what can be verified publicly — regardless of whether anyone comes forward.