12/08/2022 NFT Heists: Are Recent Attacks the First of Many to Come?

NFT Heists: Are Recent Attacks the First of Many to Come?

NFT heists are hitting the news. Here how you can protect yourself, saysIndrėViltrakytė, co-founder of theThe Rebels.

Phishing attacks are not new. Sometimes, they are easy to spot. Like when the prompts come with a request to send your banking information to a prince from a far-away foreign land. But sometimes, they are harder to spot. Like when a request to approve the release of your assets comes from a seemingly trustworthy source.

This is what happened recently in an NFT phishing theft case. Users trusted a scheme that involved thePremint platform. The users agreed to a prompt to approve an unknown entity to control their assets.

On July 17, 2022, a popular NFT platform, Premint NFT, was hacked. 314 NFTs worth $430,000 were stolen. Perpetrators were able to plant malicious code on Premint’s official website. The code instructed users to “set approvals for all” when connecting their digital wallets to the site. This allowed the attackers to access their crypto assets and steal their NFTs.

The new world of NFTs – digital art collection – may be in line for more phishing attacks.

NFT heists: What are being stolen?

Typically when we hear the word NFT, we think of a digital image that is unique and connected to the blockchain. It is, however, more elaborate than that. When talking about NFTs, the ownership tracking and uniqueness are always accented. But nowhere in the NFT standard, it is stated what the unique tokens represent. In its essence, the tokens are only unique numbers. It’s the authors of the NFT collection who define what these tokens represent.

Furthermore, images are usually never “uploaded into thecrypto wallet.” They are not part of the NFT contract. A hash of the image might be written into the contract to create a connection with the thing that the NFT represents. Also, NFT as a standard doesn’t concern itself about the value or the buying and selling operations of the NFTs. It only supplies standard methods to transfer the NFT ownership. It’s the marketplaces and the community who build on top of that and treat the NFTs as merchandise.

As merchandise, NFTs are mostly purchased as collectibles, often used for investment purposes. They have developed practical use cases only recently. An example isdigital fashion wearablesin the Metaverse.

NFT heists

What can be done in the future?

Who’s to blame? Is it the user? Or the platform, which allowed an attacker to initiate a fraudulent transaction?

In this particular case, the attackers were able to display content to trick the user into signing the fraudulent transaction.

A vague, plausible-sounding reason for the transaction in combination with trust in the website was enough to fool many. That said, it is unreasonable to expect that the average Web3 user could skirt it. Most didn’t have a strong enough tech background to notice that the transaction was actually giving someone access to his or her NFTs.

It’s possible to trick users into signing transactions if it’s initiated by a trusted website. The assets in the users’ wallets are only as safe as ALL the decentralized applications (dapps) that the user interacts with put together. Identical cases are likely to happen in the future.

The wayssecuritycan be improved:

1. Wallets could display more human-oriented information for known contract interaction types. For example, a huge red message saying, “Hey, you’re giving control for all of your NFTs to someone!” That would be much better than the current all caps “SET APPROVAL FOR ALL” in gray in the MetaMask’s transaction confirmation window.

2. Websites could list and publish the contract interactions that they might initiate. The providers likeMetaMaskcould refuse any non-standard transactions.

NFT heists: How can users protect themselves

– Review the transaction details before signing. This won’t protect the user 100% of the time. But reviewing what method on what contract is crucial.

– Separate NFTs (and other crypto assets) into multiple wallets. If the users are tricked into giving someone control of their assets in onewallet, at least the assets in other wallets are safe. This is as long as you don’t share your private key or the seed phrase.

– Use different wallets for different dapps. It’s not always practical to do so when the dapp is meant to interact with other assets in the wallet. However, it’s important to try keeping only what’s relevant.

About the Author

Indrė Viltrakytėis the co-founder of the Web3 fashion ventureThe Rebels. It has 10101 unique characters based on the controversial “Jesus, Maria” ad campaign. The campaign was banned but later found justice in the European Court of Human Rights, which ruled in favor of the brand. The case is now held as a precedent in cases related to freedom of expression in the EU. Indrė Viltrakytė has 10+ years of experience in the fashion industry.

Arts

https://beincrypto.com/nft-heists-attacks-many-to-come/

Interesting NFTs
The Moth Catcher
In this psychologically bed-headed portrait, a creature sets in a trance; his eyes devolved and vestigal, his third eye open but hardened and in a form resembling a Sharingan. The imagery therefore expresses an awareness existing in corporeal introspection. The creature’s mind sprouts, on the left side, an emerging face, grinning. To the right side of the head, red tentacles and fingers intertwine–a collaboration of invertebrate and vertebrate consciousness cooperatively handling paint brushes of the sort used to build an oil painting. The neck and throat bristle with random thorns, as from a rose or the upper portions of a beak sprouting from its flesh. The neck itself disassociates into layers of membranous material, terminating upon an abstracted base of convoluted forms composing its body. The nose is virtually non existent, more a sinus reiterative of the shape of the third eye. Set against the exposed teeth peering out of thick, meaty cheeks, a skeleton-like impression results. That impression sets behind a visceral set of lips and tongue, which is the creature’s prime seat of awareness. Sensual, organic, the tongue organ hangs, meaty, and with consciousness of a sea cucumber. It illuminates at the tip, drawing the attraction of a nearby moth–with mystery of purpose.
#90008
By OthersideDeployer
Stay Free (Edward Snowden, 2021)
This unique, signed work combines the entirety of a landmark court decision ruling the National Security Agency's mass surveillance violated the law, with the iconic portrait of the whistleblower by Platon (used with permission). It is the only known NFT produced by Snowden. Produced using open source software. This auction is on behalf of Freedom of the Press Foundation. https://www.aclu.org/press-releases/appeals-court-strikes-down-nsa-phone-spying-program-aclu-lawsuit
The Harvest
An anthropomorphic figure stands, wide eyed, staring at the viewer; its body masculine, muscular, and humanoid. Its “mind” dissociates into a conglomerate of structures resembling feathers, grain, teeth–as well as a radial flower “node”, casting linear rays throughout the composition. To his left, a vat of bodies gesture and writhe in a kind of amniotic soup, attended by a video game robot. The bot's red display reads “uWu”. Behind the robot and filling the left side of the composition is an archaic figure composed of a variety of vintage objects and symbols. Among them are a hardbound book with ancient cuneiform scripts, indicating barley, beer, bread, ox, house, and sky, behind which is a grimacing, salivating jagged toothed maw; and an old Commodore floppy drive. The figure’s head tilts toward an illuminated crescent moon, suggesting the Egyptian Sacred Bull. The archaic figure is composed of a variety of mutating cells, which shift in color, and pattern; eventually breaking free into an ephemeral broadcast of bubbles which move across the background. The work came into being against a psychological introspection, which included associations to pop culture such as alien abduction and pod people, as well as quite a bit of reflection on grains as a symbol of civilization, agriculture, sustenance, life, and imbibing (mainly whiskies).
Fidenza #547
Fidenza is by far my most versatile algorithm to date. Although the program stays focused on structured curves and blocks, the varieties of scale, organization, texture, and color usage it can employ create a wide array of generative possibilities. Additional project feature(s) => Scale:Jumbo, Turbulence:Med, Colors:Luxe, Have Margin:No, Spiral:No, Soft Shapes:No, Super Blocks:Yes, Collision Check:No Overlap, Outlined:No, Shape Angles:Curved, Density:High