FUD started for take price down...
If you seriously think I'm trying to spread lies about this coin, you're absolutely clueless. I was holding on to that small bag for over two years. Keep in mind a was ripped off by mintpal for 3500 when Moolah took over, and the amazing thing is I had coins in there for 2 days while I went to sell. I bought around .0006 on average. Recently, I decided to update the client to stake again, and ended up with a total loss. As I said before, the only thing that was installed recently on that machine was the latest wallet from OP. There is another person claiming the exact same thing happened to them a few pages ago. Not one person from the cloak team has replied.
I don't use stake only in wallet and on a frend his computer lol 2 jears agoo 10000 dollar stolen
first time I cry for coins don't no wat 2fa was
now everything 2fa
couple of monds back my own fauld 1700 dollar gone
nothing on my pc again
1 week agoo I had a mail from c-cex loggin failed
I use more than a year no c-cex
its your IP format don't help I think greets and sorry for my very talented engels
I have no idea what you're saying but I use 2fa for everything, and this has nothing to do with your situation. I downloaded a "legitimate" wallet and received a wallet with an undetectable trojan.
There are numerous Trojans out there that are quite adept at stealing funds from wallets, doesn't matter if it's CLOAK, Bitcoin or any other, you will never know it happened until you find your funds are gone. Even if your PC is protected, eventually, something will get through. That's why its a good idea to run multiple virus protection programs such as MalewareBytes and one of the top ten listed here:
http://www.top10bestantivirus.com/ Using 2fa is a good idea but, it won't stop an attack vector that rides under it meaning if your already logged into a site, and that site is compromissed, 2fa does nothing.
One of the oldest:
https://www.cryptocoinsnews.com/pony-trojan-steals-cryptocurrencies-bitcoin/ Credentials theft:
http://virusguides.com/dridex-banking-trojan-bans-suspicious-hosts-adds-crypto-currency-wallets-hit-list/Another:
https://www.hackread.com/coinbitclip-trojan-threat-to-bitcoin/Overview:
https://www.secureworks.com/research/cryptocurrency-stealing-malware-landscapeQuote from the overview:
"Wallet stealer
The most common type of CCSM is the wallet stealer, a category that includes nearly every family of CTU-analyzed CCSM. This type of malware searches for "wallet.dat" or other well-known wallet software key storage locations, either by checking known file locations or by searching all hard drives for matching filenames. Typically, the file is uploaded to a remote FTP, HTTP, or SMTP server where the thief can extract the keys and steal the coins by signing a transaction, transferring the coins to the thief's Bitcoin/altcoin address.
Most cryptocurrency security guides recommend protecting the wallet with a strong passphrase, preventing the thief from decrypting and using the private keys if the file is stolen. To counter this protection, many of the analyzed wallet-stealer malware families use a keylogger or clipboard monitor to obtain the wallet file's passphrase and send it to the thief.
Credential stealer
Many wallet-stealer families also steal credentials for various web-based wallets, such as Bitcoin exchanges. Some individuals keep a significant amount of bitcoin or other currency in exchanges to trade on price movements. Malware authors are aware of this activity, and many victims have reported that their exchange wallets were emptied without their authorization. In most cases, it is impossible to know exactly what malware was used in the theft, because a full forensic analysis of the victim's hard drive is rarely performed.
Many exchanges have implemented two-factor authentication (2FA) using one-time PINs (OTP) to combat unauthorized account logins. However, advanced malware can easily bypass OTP-based 2FA by intercepting the OTP as it is used and creating a second hidden browser window to log the thief into the account from the victim's computer. Simultaneously, the malware displays a fake "authentication failed" message and blocks the victim's access to the website while the thief empties the account. CTU researchers have not observed a verified example of this type of attack against cryptocurrency exchanges. However, this technique has been successfully used against online banking sites for several years, and it is only a matter of time before CCSM uses this approach.
Man in the middle
CTU researchers have observed at least one family of CCSM that does not exfiltrate wallet files or private keys. Instead, it acts as a "man in the middle," altering the recipient address of a transaction before it is signed. The observed sample runs in the background, monitoring the contents of the clipboard. The malware checks new data in the clipboard for a valid Bitcoin address. If the data is a valid address, the malware replaces it with the thief's Bitcoin address. Victims who do not notice the replacement send the bitcoins to the thief.
RPC automation
Bitcoin and altcoin "reference client" software includes remote procedure call (RPC) functionality, which allows another program to interact with the wallet software. In many cases, a thief with access to this functionality could connect to a running client on a local TCP port and steal the balance of an unencrypted wallet using only two commands (three if the wallet is encrypted and the malware has obtained the passphrase). CTU researchers have not witnessed any CCSM malware taking advantage of this technique as of this publication. It would be difficult to detect this type of theft from a network standpoint, as the transaction would look like any authorized transaction. Another advantage to this technique is that it requires no external command and control (C2) or exfiltration server that can be shut down or blocked."
Be careful out there, other people want your money more than you do!