12/08/2022 NFT Heists: Are Recent Attacks the First of Many to Come?

NFT Heists: Are Recent Attacks the First of Many to Come?

NFT heists are hitting the news. Here how you can protect yourself, saysIndrėViltrakytė, co-founder of theThe Rebels.

Phishing attacks are not new. Sometimes, they are easy to spot. Like when the prompts come with a request to send your banking information to a prince from a far-away foreign land. But sometimes, they are harder to spot. Like when a request to approve the release of your assets comes from a seemingly trustworthy source.

This is what happened recently in an NFT phishing theft case. Users trusted a scheme that involved thePremint platform. The users agreed to a prompt to approve an unknown entity to control their assets.

On July 17, 2022, a popular NFT platform, Premint NFT, was hacked. 314 NFTs worth $430,000 were stolen. Perpetrators were able to plant malicious code on Premint’s official website. The code instructed users to “set approvals for all” when connecting their digital wallets to the site. This allowed the attackers to access their crypto assets and steal their NFTs.

The new world of NFTs – digital art collection – may be in line for more phishing attacks.

NFT heists: What are being stolen?

Typically when we hear the word NFT, we think of a digital image that is unique and connected to the blockchain. It is, however, more elaborate than that. When talking about NFTs, the ownership tracking and uniqueness are always accented. But nowhere in the NFT standard, it is stated what the unique tokens represent. In its essence, the tokens are only unique numbers. It’s the authors of the NFT collection who define what these tokens represent.

Furthermore, images are usually never “uploaded into thecrypto wallet.” They are not part of the NFT contract. A hash of the image might be written into the contract to create a connection with the thing that the NFT represents. Also, NFT as a standard doesn’t concern itself about the value or the buying and selling operations of the NFTs. It only supplies standard methods to transfer the NFT ownership. It’s the marketplaces and the community who build on top of that and treat the NFTs as merchandise.

As merchandise, NFTs are mostly purchased as collectibles, often used for investment purposes. They have developed practical use cases only recently. An example isdigital fashion wearablesin the Metaverse.

NFT heists

What can be done in the future?

Who’s to blame? Is it the user? Or the platform, which allowed an attacker to initiate a fraudulent transaction?

In this particular case, the attackers were able to display content to trick the user into signing the fraudulent transaction.

A vague, plausible-sounding reason for the transaction in combination with trust in the website was enough to fool many. That said, it is unreasonable to expect that the average Web3 user could skirt it. Most didn’t have a strong enough tech background to notice that the transaction was actually giving someone access to his or her NFTs.

It’s possible to trick users into signing transactions if it’s initiated by a trusted website. The assets in the users’ wallets are only as safe as ALL the decentralized applications (dapps) that the user interacts with put together. Identical cases are likely to happen in the future.

The wayssecuritycan be improved:

1. Wallets could display more human-oriented information for known contract interaction types. For example, a huge red message saying, “Hey, you’re giving control for all of your NFTs to someone!” That would be much better than the current all caps “SET APPROVAL FOR ALL” in gray in the MetaMask’s transaction confirmation window.

2. Websites could list and publish the contract interactions that they might initiate. The providers likeMetaMaskcould refuse any non-standard transactions.

NFT heists: How can users protect themselves

– Review the transaction details before signing. This won’t protect the user 100% of the time. But reviewing what method on what contract is crucial.

– Separate NFTs (and other crypto assets) into multiple wallets. If the users are tricked into giving someone control of their assets in onewallet, at least the assets in other wallets are safe. This is as long as you don’t share your private key or the seed phrase.

– Use different wallets for different dapps. It’s not always practical to do so when the dapp is meant to interact with other assets in the wallet. However, it’s important to try keeping only what’s relevant.

About the Author

Indrė Viltrakytėis the co-founder of the Web3 fashion ventureThe Rebels. It has 10101 unique characters based on the controversial “Jesus, Maria” ad campaign. The campaign was banned but later found justice in the European Court of Human Rights, which ruled in favor of the brand. The case is now held as a precedent in cases related to freedom of expression in the EU. Indrė Viltrakytė has 10+ years of experience in the fashion industry.

Arts

https://beincrypto.com/nft-heists-attacks-many-to-come/

Interesting NFTs
#85699
By OthersideDeployer
Divine Virtue Fae of Creation
There is said to be a small fountain in the heart of Xalar with the power of material creation. It is heavily guarded by the Fae that live in the area, so finding it would be a difficult task.
ˈSÄ-V(Ə-)RƏN-TĒ
"I'm not smart enough to be an astronaut." That is what 7 year old Rayden told Micah the first time they met. How can a 7-year-old already feel limitations on his dreams? For centuries, the black community has been the target of a system designed to limit their power, their earning potential, their dreams. Now is your opportunity to help destroy the system. For the next 11 years, on each brother's birthday, (Rayden, Aug. 10/ Jacque Nov. 6), you the viewer, will be able to directly contribute Bitcoin to a wallet that will be given to each child upon turning 18. In what is one of the most powerful use cases for Bitcoin, 100% of your contributions and earnings will open all new doors for these special young men.
The Harvest
An anthropomorphic figure stands, wide eyed, staring at the viewer; its body masculine, muscular, and humanoid. Its “mind” dissociates into a conglomerate of structures resembling feathers, grain, teeth–as well as a radial flower “node”, casting linear rays throughout the composition. To his left, a vat of bodies gesture and writhe in a kind of amniotic soup, attended by a video game robot. The bot's red display reads “uWu”. Behind the robot and filling the left side of the composition is an archaic figure composed of a variety of vintage objects and symbols. Among them are a hardbound book with ancient cuneiform scripts, indicating barley, beer, bread, ox, house, and sky, behind which is a grimacing, salivating jagged toothed maw; and an old Commodore floppy drive. The figure’s head tilts toward an illuminated crescent moon, suggesting the Egyptian Sacred Bull. The archaic figure is composed of a variety of mutating cells, which shift in color, and pattern; eventually breaking free into an ephemeral broadcast of bubbles which move across the background. The work came into being against a psychological introspection, which included associations to pop culture such as alien abduction and pod people, as well as quite a bit of reflection on grains as a symbol of civilization, agriculture, sustenance, life, and imbibing (mainly whiskies).
Tile [7, 13] - The Notch
7 13