Klever Wallet tweeted that after a thorough investigation, it has been determined that all wallets affected by suspicious activity on July 12th were affected by a known vulnerability caused by a low-entropy mnemonic with flawed correspondence. Algorithm (the random generation algorithm used by Bip39 compromises the security and unpredictability of private key generation, potentially making it vulnerable to unauthorized access or malicious activity. In the above incidents, all wallets involved were not originally using Klever Created by Wallet K5, all wallets are generated and imported into Klever Wallet K5, and are created using the old, weak pseudo-random number generator PRNG algorithm as an entropy source, which will seriously damage the security and unpredictability of private key generation. Thus, it may be more vulnerable to attack or unauthorized access. It is strongly recommended that if users currently have old wallets created before Klever Wallet, they must immediately migrate to new wallets created on Klever Wallet K5 or Klever Safe to protect them from Impact of potential vulnerabilities related to outdated or weak pseudo-random number generator algorithms.