32 OpenSea users lost NFT, estimated loss of USD1.7 million

marketplace is currently investigating an alleged phishing attack that caused dozens of users to lose valuable assets. Reporting from Engadget (21/2), this incident began on Saturday night, when someone stole hundreds of NFTs on the platform.

Over the course of several hours, attackers targeted 32 accounts and had obtained 254 tokens, according to data compiled by Blockchain security service PeckShield. The stolen NFTs included tokens from the Bored Ape Yacht Club and the Azuki collection. According to estimates by Molly White, creator of the blog Web3 is Going Great, this theft grossed 641 Ethereum, or about $1.7 million.

Read More

“We believe this is a phishing attack,” Devin Finzer, co-founder and CEO of OpenSea said in a tweet. “We don’t know where the phishing is happening, but we can rule things out based on our conversations with the 32 affected users.”

According to Finzer, OpenSea was not a vector for the attack and neither exploited a previously unknown vulnerability in the platform’s printing, buying, selling and listing features.

See also: YouTube reveals plans to introduce NFT on its platform

“The ending with OpenSea email is not an insect vector,” says Finzer. “In fact, we are not aware of any affected users receiving or clicking links in suspicious emails.”

According to The Verge, the attack likely took advantage of aspects of the Wyvern Protocol. Many Web platforms, including OpenSea, use open source standards to support their contracts.

A thread on Twitter suggests those targeted may have signed a clause agreement that would allow attackers to transfer NFTs without Ethereum.

See also: Intel releases blockchain chip for crypto mining and NFT

In addition, OpenSea has recently been involved in controversy because one of its employees resigned after using inside information to profit from the NFT downturn. Fake, plagiarized and spam tokens are also common on the platform.

Related posts

Leave a Reply

Your email address will not be published. Required fields are marked *