Pi Network halts payment requests after scam drains 4.4 million Pi coins


Members of the Pay Network community are raising the alarm about a growing scam that has already drained millions of Pay tokens from users’ wallets.

The system leverages the network’s payment request function and the inherent transparency of blockchain data. The Pi Core team is temporarily disabling payment requests as losses mount.

Sponsored

Sponsored

Pioneers warn of a fraudulent method that leads to draining money from wallets

According to several community alerts circulating on X (formerly Twitter), scammers can scan the blocked pi to identify wallet addresses and view their Pi balances.

Once a wallet with a large balance is identified, the attacker sends a payment request directly to the holder. If the recipient clicks “Accept”, the Pi is immediately transferred to … Scammer wallet It cannot be refunded.

Pi OpenMainnet 2025 account community warned that the mechanism is often misunderstood as a technical defect.

“Previously, people called this a ‘hole in the system,’ but frankly, it’s not a loophole at all,” male Post. “This is exactly how the wallet is designed to work. The only way to lose your Pi coins is if you personally accept the transaction.”

The same message confirmed that the threat was In social engineering It is not a failure of the protocol. Scammers can disguise requests to appear legitimate or impersonate trusted contacts, making it more likely that users will approve transfers without verification.

A scam on a massive scale

Community shared blockchain tracking points to a single wallet address as the main center of activity.

Sponsored

Sponsored

Address – GCD3SZ3TFJAESWFZFROZZHNRM5KWFO25TVNR6EMLWNYL47V5A72HBWXP – He was accused of stealing between 700,000 and 800,000 pay per month. According to reports, cumulative losses have now exceeded 4.4 million pi.

Show the data he shared Pi Network Update Fixed monthly flows to the address:

  • About 877,900 feet in July 2025
  • 743,000 feet in August
  • 757,000 bays in September
  • 563,000 bays in October
  • 622,700 feet in November, and
  • More than 838,000 paid in December.

The figures indicate a coordinated and sustained process rather than isolated incidents, with the increase in December indicating an acceleration of activity.

Sponsored

Sponsored

The scale of the theft has raised concern among patrons, many of whom are new to chain transactions. Therefore, they may not be aware of the risks of agreeing to unsolicited requests.

The eBay team disables payment requests

In response, the Payments team has temporarily suspended the “Send Payment Request” feature. Community alerts indicate the move was made after an escalation in fraudulent activity.

“Currently, the Pi Team has suspended these requests (perhaps because the scams are out of control)” she said Pi Network Alerts in a post.

However, the suspension is written as a temporary solution and not a permanent solution. The feature may be reactivated once additional security or user protection measures are assessed.

Until then, the community’s guidance is unambiguous. The network advises users not to accept or approve any payment requests sent to their wallets, regardless of who the sender appears to be.

Sponsored

Sponsored

The warnings confirm that scammers can pose as friends, family members, or even official Pi accounts.

The incident highlights a broader challenge for blockchain networks: striking a balance between transparency and ease of use while keeping users safe.

While the Pi Protocol works as intended, the episode highlights how easy it is for social engineering to exploit standard functions to create attack vectors.

As payment requests continue to be disrupted at the end of the year, Pay’s PI coin was trading at $0.20381, up nearly 1% in the last 24 hours.

Pi Coin price performance
The price of Pai coin. Source: BeInCrypto

Meanwhile, members of the Pi community continue to track suspicious wallets and raise security alerts. Vigilance is urged as scams become more complex and widespread.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *