When these types of attacks happen and users of the wallet or service are that time lose their funds, the company should be held liable for it. Their customers do not have to loss for their failure. The companies should be able to pay some compensation to the users if this a possibility.
I'm sorry, but in the context of free open-source Electrum wallet this is nonsense. And you should actually read the
MIT License for Electrum wallet (version as of Feb 21
st, 2024):
I don't remember the exact dates (late 2019, or early 2020 perhaps,) but a few years back servers were able to send messages and there was at least one server operated by a scammer who was sending pop up messages directing people to download a malicious version. The Electrum team has removed the ability for servers to send messages to the client, so this type of thing is less likely to happen again.
Clicking on a download link in such a push notification for an update download of Electrum would still be a violation of what Electrum devs recommend how and where to download updates and of course users should check update's GPG signatures! Never skip the verification steps!!
If users fail to comply, it's user's fault, not fault of developers.
Almost every page of the Electrum website displays the following warning:
Warning: Do not download Electrum from another source than electrum.org. Verify GPG signatures.
This warning is there for a good reason and Electrum users should not skip to verify GPG signatures. I have doubts that OP did verify GPG signatures when he executed his yearly updates of his Electrum wallet software.
From reading the thread, I'm not sure how his wallet got compromised. Usually there are details and clues missing to pinpoint the real reason. For a hot wallet to receive coins, it doesn't need to be a hot wallet with private keys. A watch-only hot wallet would've been safer.
Some details, maybe worth to explore in more detail:
The Electrum wallet was created in 2014 (no details by OP if the mnemonic recovery words were stored safely offline-only in 2014).
A separate laptop was used for the wallet, which is good when this laptop hasn't been used for daily internet shit.
Confusing to me:
Why had the mnemonic recovery words to be displayed and written down again in September 2022, when the laptop apparently got decommissioned and sold (without any internal storage device, I assume)? Was there no prior backup?
Under which conditions were the recovery words revealed? Was the device still online or later online?
It's strange that after selling the laptop, a few months later in December 2022 the wallet was emptied. I don't say there's a causality.
As the attacker seems to have robbed other wallets, the probability is high that OP downloaded a malicious Electrum software and didn't verify that GPG signatures were solely from genuine Electrum developers. Or of course it could be some malware that targeted genuine Electrum wallets.
I couldn't find any detail if OP's Electrum wallet was encrypted with a wallet encryption passphrase. If yes and with a long and strong encryption passphrase, then stealing the wallet file won't be enough for the attacker. A keylogger would be needed to obtain and exfiltrate the unlocking wallet passphrase.