You don't need to stop using crypto this week. Just double check your activity. If you are a crypto developer, check the following Node Package Managers (NPMs) to see if you pulled a compromised version: error-ex chalk debug ansi-styles ...among others These are the smart contract calls/dependencies for a lot of other popular application packages. That is where the attacker hid their malicious code which swaps their address for yours when you go to transfer funds. If you are a crypto user, do this to stay protected: 1. Verify recipient addresses on your hardware/software wallet’s screens (hardware devices show the final destination on device — this is the strongest protection). If a web wallet or dApp can intercept during the browser flow, the hardware device’s confirmation is the ultimate check. 2. Double-check transaction details before approving; especially the recipient and amount. 3. If you used a site that might have been affected, check your transaction logs from your wallet and move small funds to a new address if you suspect a compromise. Rotate any approvals/allowances.