xmrwallet.com Operator Deletes Evidence After Being Caught Stealing Monero
When a legitimate service is accused of wrongdoing, the operator responds with transparency: they publish audits, open their code, and address concerns publicly. When xmrwallet.com was exposed as a Monero theft service by PhishDestroy Research, the operator did the opposite. Within hours, over 21 GitHub issues were deleted, repository content was wiped, and escape domains were registered. This article documents the full timeline of the cover-up and explains why the destruction of evidence is itself a damning admission of guilt.
What Was Deleted: 21+ GitHub Issues Erased
The xmrwallet.com GitHub repository previously contained a public issue tracker where users could report bugs, ask questions, and — critically — document their experiences. Over the years, more than 21 issues had accumulated from victims reporting stolen funds, failed transactions, and suspicious behavior. These issues constituted a public, timestamped record of the scam's impact.
After PhishDestroy Research published its technical analysis demonstrating how xmrwallet.com steals private view keys through the session_key parameter and hijacks transactions by returning raw_tx_and_hash.raw = "0", the operator moved swiftly to erase the evidence.
The deleted issues included:
- Victim reports detailing stolen Monero with specific amounts and transaction details
- Technical questions from users who noticed suspicious network requests
- Complaints about transactions that showed as "sent" but never arrived
- Discussions where community members raised security concerns
- Repeated reports of wallets being drained after login
Every single issue was deleted. Not closed — deleted. Closing an issue archives it but keeps it publicly visible. Deletion removes it entirely. This distinction matters: the operator did not want these reports to be readable at all, even as historical records.
The Deletion Timeline
xmrwallet.cc and xmrwallet.biz as fallback domains, anticipating that the original xmrwallet.com domain may face action. These domains are intended to continue the theft operation under new addresses.
xmrwallet.cc and xmrwallet.biz are identified and reported. The domain registrars suspend both domains, cutting off the operator's planned escape routes.
Why Deletion Is an Admission of Guilt
An innocent operator would welcome scrutiny. If xmrwallet.com were a legitimate service experiencing false accusations, the rational response would be to leave the issue tracker intact, point to the open-source code as proof of innocence, and publicly address each technical finding. Instead, the operator chose to:
- Destroy evidence: Deleting victim reports removes the easiest way for new users to discover the scam before becoming victims themselves.
- Prevent analysis: Wiping the repository removes code that could be independently audited to confirm or deny the findings.
- Prepare to flee: Registering new domains is not the behavior of someone who believes they will be exonerated. It is the behavior of someone planning to continue operations under a different name.
- Threaten researchers: Sending threats via anonymous email is an attempt to suppress the investigation through intimidation rather than through evidence.
Each of these actions is consistent with guilt and inconsistent with innocence. Taken together, they form a textbook pattern of evidence destruction and operational flight.
The Archival Record
Despite the operator's efforts, the evidence was not entirely destroyed. PhishDestroy Research had archived the GitHub issues, repository content, and victim reports before the deletion began. Web archiving services captured snapshots of the repository. The deleted content exists in multiple independent archives and is referenced in the full investigation report.
This is an important lesson for scam operators: the internet has a memory. Deleting a GitHub issue does not delete the cached copies, email notifications, RSS snapshots, or archived versions that were created automatically by multiple services the moment the content was published. The act of deletion did not protect the operator. It only added "evidence destruction" to the list of documented offenses.
What This Means for Current and Former Users
The deletion of evidence does not change the technical reality of how xmrwallet.com operates. The session_key still encodes your private view key in base64. The server still returns raw_tx_and_hash.raw = "0" instead of valid transaction data. These mechanisms were documented through code analysis, not through GitHub issues, and they remain fully proven regardless of what the operator deletes.
The operator's response to exposure — destroy, flee, threaten — should be understood as the final confirmation that xmrwallet.com is exactly what the investigation claims it to be: a theft service masquerading as a Monero wallet.
All Investigation Mirrors
- phishdestroy.github.io/DO-NOT-USE-xmrwallet-com
- phishdestroy.codeberg.page/DO-NOT-USE-xmrwallet-com
- phishdestroy.gitlab.io/do-not-use-xmrwallet-com
- phishdestroy.bitbucket.io/DO-NOT-USE-xmrwallet-com
- phishdestroy-research.on.drv.tw/DO-NOT-USE-xmrwallet-com
- phishdestroy.neocities.org/DO-NOT-USE-xmrwallet-com