Illustration by Alex Castro / The Verge
On Saturday, attackers stole hundreds of NFTs from OpenSea users, causing a late-night panic among the siteâs broad user base.A spreadsheet compiled by the blockchain security service PeckShield counted 254 tokens stolen over the course of the attack, including tokens from Decentraland and Bored Ape Yacht Club.
The bulk of the attacks took place between 5PM and 8PM ET, targeting 32 users in total. Molly White, who runs the blog Web3 is Going Great, estimated the value of the stolen tokens at more than $1.7 million.
âThey all have valid signaturesâ
The attack appears to have exploited a flexibility inthe Wyvern Protocol, the open-source standard underlying most NFT smart contracts, including those made on OpenSea. One explanation (linked by CEO Devin Finzeron Twitter) described the attack in two parts: first, targets signed a partial contract, with a general authorization and large portions left blank. With the signature in place, attackers completed the contract with a call to their own contract, which transferred ownership of the NFTs without payment. In essence, targets of the attack had signed a blank check â and once it was signed, attackers filled in the rest of the check to take their holdings.
âI checked every transaction,â saidthe user, who goes by Neso. âThey all have valid signatures from the people who lost NFTs so anyone claiming they didnât get phished but lost NFTs is sadly wrong.â
Valued at $13 billion in a recent funding round, OpenSea has becomeone of the most valuable companies of the NFT boom, providing a simple interface for users to list, browse, and bid on tokens without interacting directly with the blockchain. That success has come with significant security issues, as the company has struggled with attacks that leveragedold contractsorpoisoned tokensto steal usersâ valuable holdings.
OpenSea was in the process of updating its contract system when the attack took place, but OpenSea has denied that the attack originated with the new contracts. The relatively small number of targets makes such a vulnerability unlikely, since any flaw in the broader platform would likely be exploited on a far greater scale.
Still, many details of the attack remain unclear â particularly the method attackers used to get targets to sign the half-empty contract. Writing on Twitter shortly before 3AM ET, OpenSea CEO Devin Finzer said the attacks had not originated fromOpenSeaâs website,its various listing systems, orany emails from the company. The rapid pace of the attack â hundreds of transactions in a matter of hours â suggests some common vector of attack, but so far no link has been discovered.
âWeâll keep you updated as we learn more about the exact nature of the phishing attack,â said Finzer on Twitter. âIf you have specific information that could be useful, please DM@opensea_support.â
https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft