当前位置:网站首页>Phishing for NFT
Phishing for NFT
2022-04-23 04:31:00 【chinadefi】
in the light of NFT Phishing


Fishing mail
Attackers exploit various hotspots (NFT Open to booking 、 Wallet upgrade 、 Airdrop claim 、 Contract upgrade 、 Project change website 、 special NFT) etc. , Send official websites containing elaborate imitations 、 Pre sale platform 、app Download links and other phishing emails .
Example :OpenSea
Description of the incident : according to OpenSea The official reply to , This is a hacker upgrading OpenSea Initiated at the time of the contract .OpenSea Co founder and CEO Devin Finzer On twitter , The attacker stole the value 170 Million dollars of Ethereum .
Attack methods
The attacker uses the formal upgrade contract time node to send a contract upgrade success email to all users . Many users are uncertain about the source of the email . Many users don't determine the source of the email , Can't control your wallet , Which leads to the theft of the wallet .
Social media related phishing
Multiple NFT project
- Attacker’s wallet address
- BAYC
- Doodles
- Nyoki
- Shamanz
- Zooverse
- Dreadfuls
- Freaky Labs
- Kaijukingz
- Maison Ghost
- MekaVerse
- The Heart Project
- Monkey Kindom
- Fractal
- Phantom Galaxies
- Axie Infinity
- Cryptovoxel
Attack methods
- Attackers gain access to project members Discord account .
- The attacker used the account of the project party to publish a new announcement on the channel , The content of the announcement is a fake official website created by the attacker , And announce that some things can be purchased exclusively .
- Victims visit websites , Click the link , And try to buy . After authorization ,ETH Will be transferred to the attacker's wallet .
- The attacker joins a new discord Account or impersonate the victim's account , And say you're a liar , And say you're a liar , Then put your id To the server . The server prohibits the victim's account .
- The attacker requires remote desktop or screen sharing to show your innocence , They will let you Ctrl+Shirt+I View console , stay discord The console will display the authentication pass .
- Once you get a pass , An attacker can take over the account .
- because NFT Characteristics , Some trading platforms , Such as sudoswap、Nfttrader Will encourage users to trade privately NFT.
- The attacker will generate a transaction confirmation platform . After confirmation by both parties , Smart contracts will be executed automatically .
- In the process of communication , The attacker will negotiate with the victim in exchange for these NFT. When a transaction occurs , The attacker suggested modifying the data , Then send a fraud link to the victim .
- After confirmation by both parties , In the purse NFT Will be transferred to the attacker's wallet .
- The attacker took advantage of discord The server sends private messages to members of different communities in batches , Or cheat by pretending to be an administrator to solve the problem .
- Take the private key of the wallet , Or send a fake phishing website , Say you can get... For free NFT. Once the user authorizes the fake website , In the account NFT Will be stolen .
- In some mature NFT In the project , After the collection was released for some time , Announce that the attacker will make similar collections and use the official website in discord Send purchase links on websites such as communities , When the real NFT Not online , They will first search for... With similar names NFT, Some attackers will create several transactions in advance . In order to save the Commission of the platform and the project party , There will be private transactions between community members , At this time, users often ignore NFT Authenticity .
The project involved in the scam
- REALSWAK
- NFTflow
- Mercenary
- Blockverse
- Frosties
- Bored Bunny
- Evolved Apes
- Iconics
- Banksy
Suggest
- Do not click on any links or attachments in suspicious emails . If you receive suspicious email from your organization , And doubt whether the email is legal , Please open the web browser , And open a new tab . Then click from your saved favorites or search through the Internet to the organization's website .
- If the suspicious information seems to come from someone you know , By other means ( Such as text messages or phone calls ) Contact this person to confirm .
- Do not use your computer to log in to email in public places 、 Using instant messaging software 、 Online banking or other activities involving sensitive information . Without being sure of its safety , Connect WiFi Please do not log in and send or receive email after , Pay attention to using free WiFi. Due to management negligence , Some people with ulterior motives use data interception and monitoring methods to obtain user information .
- Don't send sensitive information to the Internet , The information and data published by users on the Internet may be collected by attackers . By analyzing this information and data , Send targeted phishing emails to users .
- If the email requires downloading attachments or installing some software , Please judge carefully .
- For asking for a password through a social media platform 、 Verification Code 、2fa People who , Identify yourself carefully , Judge whether it is forged for others 、 Whether the account is stolen, etc .
- Regularly change the frequently used account password 、 Increase complexity 、 Multi step verification, etc .
Source:https://medium.com/coinmonks/nft-phishing-96aa6488ae7e
About
ChinaDeFi - ChinaDeFi.com It's a research driven DeFi Innovation organizations , We are also a blockchain development team . From all over the world every day 500 Close to a good source of information 900 In the content , Looking for deeper thinking 、 Sort out more systematic content , Provide decision-making assistant materials to the Chinese market at the fastest speed .
Layer 2 friends sharing same hobby - Welcome to Layer 2 Interested blockchain technology enthusiasts 、 Study and analyze people and Gavin( WeChat : chinadefi) contact , Discuss together Layer 2 Landing opportunities . Please pay attention to our official account of WeChat “ Decentralized financial community ”.

版权声明
本文为[chinadefi]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230426454641.html
边栏推荐
- 【BIM入门实战】Revit建筑墙体:构造、包络、叠层图文详解
- TreeSet课后练习
- Single chip microcomputer serial port data processing (2) -- ucosiii + cyclic queue receiving data
- Alibaba cloud IOT transfer to PostgreSQL database scheme
- 基于英飞凌MCU GTM模块的无刷电机驱动方案开源啦
- [mapping program design] coordinate inverse artifact v1 0 (with C / C / VB source program)
- [BIM introduction practice] wall hierarchy and FAQ in Revit
- zynq平台交叉编译器的安装
- mysql ,binlog 日志查询
- Shopping mall for transportation tools based on PHP
猜你喜欢

STM32 MCU ADC rule group multi-channel conversion DMA mode

小红书被曝整体裁员20%,大厂之间内卷也很严重

【论文阅读】【3d目标检测】Voxel Transformer for 3D Object Detection

上海航芯技术分享 | ACM32 MCU安全特性概述
![[BIM introduction practice] wall hierarchy and FAQ in Revit](/img/95/e599c7547029f57ce23ef4b87e8b9a.jpg)
[BIM introduction practice] wall hierarchy and FAQ in Revit

【ICCV 2019】MAP-VAE:Multi-Angle Point Cloud-VAE: Unsupervised Feature Learning for 3D Point Clouds..
![[BIM introduction practice] Revit building wall: detailed picture and text explanation of structure, envelope and lamination](/img/cb/86b5898609800a80592fceb782503f.png)
[BIM introduction practice] Revit building wall: detailed picture and text explanation of structure, envelope and lamination

【测绘程序设计】坐标方位角推算神器(C#版)

OpenCV----YOLACT实例分割模型推理

指纹Key全国产化电子元件推荐方案
随机推荐
Qtspim manual - Chinese Translation
【论文阅读】【3d目标检测】Improving 3D Object Detection with Channel-wise Transformer
无线键盘全国产化电子元件推荐方案
[BIM introduction practice] wall hierarchy and FAQ in Revit
Introduction to Cortex-M3 register set, assembly language and C language interface
【BIM入门实战】Revit中的墙体层次以及常见问题解答
单片机串口数据处理(1)——串口中断发送数据
Shopping mall for transportation tools based on PHP
[mapping program design] coordinate inverse artifact v1 0 (with C / C / VB source program)
【NeurIPS 2019】Self-Supervised Deep Learning on Point Clouds by Reconstructing Space
Bridge between ischemic stroke and intestinal flora: short chain fatty acids
How to regulate intestinal flora? Introduction to common natural substances, probiotics and prebiotics
兼容NSR20F30NXT5G的小体积肖特基二极管
[BIM introduction practice] Revit building wall: detailed picture and text explanation of structure, envelope and lamination
单极性非归零NRZ码、双极性非归零NRZ码、2ASK、2FSK、2PSK、2DPSK及MATLAB仿真
Interaction of diet gut microbiota on cardiovascular disease
减治思想——二分查找详细总结
智能电子秤全国产化电子元件推荐方案
Chlamydia infection -- causes, symptoms, treatment and Prevention
Understand the gut organ axis, good gut and good health