Pi Network Temporarily Halts Wallet Payment Requests Amid Rising Scams

TheNewsCryptoОпубликовано 2025-12-31Обновлено 2025-12-31

Введение

Pi Network has temporarily disabled its wallet payment request feature due to widespread scams. Scammers were impersonating official accounts and targeting high-balance wallets, tricking users into approving fraudulent requests, resulting in irreversible losses. Over a million PI tokens have been stolen this year, with one wallet receiving more than 838,000 tokens. The Pi Core Team clarified that the issue stems from user approval, not a system vulnerability, and emphasized that this is a common risk across crypto wallets. The token’s value dropped 10% following the incident but has since shown slight recovery. Recent updates include standardized KYC and testnet DEX improvements to enhance security and liquidity.

The Pi network, which is the mobile-first Cryptocurrency and web3 blockchain, recently posted a tweet on DEC 30 that the team has warned that scammers are exploiting the Payment request feature to steal Pi tokens from users’ balances. In the Pi network, the wallet balances are publicly visible, and the attackers are targeting the high-balance wallets and sending the payment request to the wallet as an impersonation of official Pi accounts or community moderators.

Once the user approves the payment request, the Tokens will be instantly transferred to the scammers’ account and will be gone forever. No reversal or recovery will be done. The Community reports indicate the scams are widespread, and one scammer’s wallet has received more than 838,000 PI tokens. Overall, more than a million PI tokens have been lost throughout the year. This created a panic situation among the users, and even the experienced users were tricked because the request looked legitimate.

Pi Core Team Denies System Vulnerability, Addresses Market and User Impact

After this incident happened, many users called it a wallet flaw, but the Core team clarified that the problem is from the human approval, not the protocol Flaw. They say that the wallet never sends funds on its own, and the transfer only happens after the user’s approval. This behavior exists in all major Crypto wallets. So to stop this scam, the PI network has disabled all payment requests network-wide. This stops the scams instantly and prevents further user losses. This makes the PI token safe, and it was the fastest way to contain the damage.

The token is currently trading at $0.204 with a market cap of 1.7 billion. The Token has dropped to 10% due to this issue. Recently, the token has updated its ecosystem by adding Standardized KYC to cut the verification backlogs by 50% and speed up mainnet migration for millions of users. Another update is from the testnet DEX, which makes the trading safer and easier by using Pi as the main trading Pair and improving the liquidity. This makes the token regain its momentum, and it has increased by 0.7% in 24 hours.

Highlighted Crypto News:

XDC Network Momentum Test: Will It Break Resistance or Slip Back to Lows?

TagsAltcoinCryptocurrencyPi Network

Связанные с этим вопросы

QWhy did the Pi Network temporarily halt wallet payment requests?

AThe Pi Network temporarily halted wallet payment requests to stop scammers who were exploiting the feature to steal Pi tokens by impersonating official accounts, preventing further user losses.

QHow were the scammers able to steal Pi tokens from users?

AScammers targeted high-balance wallets, sent payment requests while impersonating official Pi accounts or community moderators, and stole tokens once users approved these deceptive transactions.

QWhat was the Pi Core Team's response to the incident being called a 'wallet flaw'?

AThe Pi Core Team clarified that the issue was due to human approval of fraudulent requests, not a protocol flaw, emphasizing that transfers only occur after user authorization, similar to other crypto wallets.

QHow much Pi token value was reported lost due to these scams?

ACommunity reports indicated that over a million Pi tokens were lost throughout the year, with one scammer's wallet receiving more than 838,000 Pi tokens.

QWhat recent updates has the Pi Network implemented to improve its ecosystem?

AThe Pi Network recently added Standardized KYC to reduce verification backlogs by 50% and introduced updates to the testnet DEX, using Pi as the main trading pair to enhance safety and liquidity.

Похожее

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit29 мин. назад

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit29 мин. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit57 мин. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit57 мин. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit1 ч. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit1 ч. назад

Торговля

Спот
Фьючерсы
活动图片