Cointime

Download App
iOS & Android

CertiK Report: OpenSea Phishing Incident Analysis

Validated Project

Introduction

Back in February 2022, OpenSea users were targeted by an elaborate phishing attack through emails that tricked users into signing permissions with a malicious contract. In total, 28 wallets had NFTs stolen that were worth $2 million making it the second most profitable NFT phishing attack in 2022, just behind the Bored Ape Yacht Club (BAYC) Instagram compromise in April 2022.

Event Summary

On 20 February 2022, multiple OpenSea users realized that their NFTs were being transferred out of their wallets and into the wallet of an unknown user. As far as the victims were aware, they hadn’t signed any permissions allowing for the transfer of NFTs. This was particularly concerning considering OpenSea had recently updated the community that they had to migrate their listings.

Users became suspicious that perhaps the new Wyvern 2.3 contract contained a vulnerability, or there may have been a compromise on OpenSea’s main website. However, as only a few individuals were affected those suspicions shifted to a more targeted approach against specific victims. It soon became clear that a phishing email had been sent to multiple victims.

An email from OpenSea advising on migrating listings wasn’t necessarily an unexpected communication to receive. This was a relatively sophisticated phishing campaign as it not only created a sense of urgency within the reader, common among many phishing scams, but it also contained a direct copy/paste text from OpenSea’s Tweet.

Clicking on the link in an email presented the victim with a phishing site, further prompting them to sign an approval which then allowed the attacker to transfer NFTs out of the victims' wallet.

On Chain Analysis

When signing the aforementioned approval, the victims send an AtomicMatch request to the hacker's malicious contract. From there, the AtomicMatch is sent to the Wyvern Exchange contract, confirming the legitimacy of the signed owner’s approval to transfer the NFT. The NFT is then transferred to the exploiters wallet for 0 ETH.

In total, 28 EOAs fell victim to this phishing exploit. A few examples of valuable NFTs stolen were the 2x BAYC and 3x Mutant Ape Yacht Club NFTs. The full list can be seen in the appendix below.

In total, the malicious actor deposited 1105 ETH into Tornado Cash, worth approximately $2.7 million at the time.

OpenSea Warns Users of Future Phishing Attempts

In August, OpenSea issued a warning to its users to be on the lookout for potential phishing emails following a data leak. The NFT exchange detailed that an employee at customer.io misused their company access to download OpenSea users emails which were used by customers to sign up for OpenSea’s newsletter. Due to the phishing attack in February, OpenSea were prepared to inform their users of potential phishing emails promptly.

In late August, an email was sent to OpenSea customers prompting them to recover their MetaMask account by entering their seed phrase. The site mimicked the MetaMask plug-in which was evident by opening the legitimate extension.

This is a slightly different method of phishing as it is attempting to farm seed phrases. In the February attack, the hacker did not attempt to compromise a victim's seed phrase but instead tricked the victim into signing permissions allowing for the transfer of NFTs to the exploiter. The important takeaway here is that there are two types of phishing attacks in Web3.

  1. Classic phishing - Getting a user to send funds to or trick them in to giving away private keys / seed phrases
  2. Ice phishing - Trick a victim into giving a malicious actor approval to transfer assets by signing a transaction.

The OpenSea phishing attack in February falls under the second category and was one of the main methods used to steal users NFTs.

NFTs & Phishing

NFTs have been an attractive target for scammers this year with persistent threat actors targeting projects Discord servers. So far in 2022, we have detected over 730 Discord compromises that have targeted NFT holders. The vast majority of exploits tricked users into signing approvals allowing the attacker to transfer NFTs from the victims to the exploiter.

ncidents of this sort decreased dramatically after detailed investigations uncovered the threat actor responsible for the majority of these compromises. You can read more about the connections between these hacks in our detailed analysis.

Conclusion

NFT holders were a lucrative target for illicit actors in 2022. Users need to be aware that their wallets do not necessarily have to be compromised for their assets to be stolen. In the case of the OpenSea phishing attack, and the majority of phishing attacks, the victims have been tricked in to signing approvals to the attacker. This is why NFT holders need to take special care in verifying that communications are from trusted sources. By following @CertiKAlert on Twitter, you’ll be the first to be alerted on compromises in the NFT space to better help you understand the threats that are out there.

Appendix

List of phished NFTs stolen in the OpenSea phishing attack.

NFT
Comments

All Comments

Recommended for you

  • BTC breaks through $69,000

     the market shows BTC breaking through $69,000, currently at $69,021.49, with a 24-hour increase of 1.15%. The market is highly volatile, please manage your risk accordingly.

  • Spanish Foreign Minister: Not worried about any consequences of refusing US access to military bases

     on March 3 local time, Spanish Foreign Minister Alvarez defended the Spanish government's refusal to provide the Rota and Moron military bases to the United States for participation in attacks on Iran. Alvarez stated that the operation initiated by the United States and Israel is not supported by the United Nations and is not part of the bilateral agreements allowing the use of the aforementioned Spanish sovereign military bases. Alvarez also said that the Spanish government is not concerned that this stance will have any consequences. Alvarez stated: "The position of the Spanish government represents the will of the vast majority of the Spanish people as well as the vast majority of people worldwide, which is to defend the UN Charter, respect international law, and believe that cooperation is always more powerful than confrontation."

  • Spot gold plunges nearly $100 in the short term.

     spot gold plunged nearly 100 dollars in a short time, spot gold fell below 5170 dollars/ounce, with a daily decline of 2.94%. 

  • BTC falls below $67,000

    the market shows BTC fell below $67,000, currently at $66,996.93, with a 24-hour increase of 1.18%. The market is highly volatile, please manage your risk accordingly.

  • ETH breaks $2,000

    the market shows ETH breaking through $2000, currently at $2001.64, with a 24-hour increase of 2.89%. The market is highly volatile, please manage your risks accordingly.

  • The US spot Bitcoin ETF saw a net inflow of $962.48 million yesterday.

    according to Trader T's monitoring, the US spot Bitcoin ETF had a net inflow of 962.48 million USD yesterday.

  • BTC falls below $66,000

     the market shows BTC fell below 66,000 USD, currently at 65,986.66 USD, with a 24-hour decline of 1.31%. The market is highly volatile, please manage your risks accordingly.

  • BTC falls below $66,000

     the market shows BTC fell below $66,000, currently at $65,973.16, a 24-hour drop of 2.66%. The market is highly volatile, please manage your risks accordingly.

  • ETH breaks $2,000

    market shows ETH breaking through $2000, currently at $2000.29, with a 24-hour increase of 3.73%. The market is volatile, please manage your risk accordingly.

  • The United States uses Anthropic's artificial intelligence technology in its airstrikes in the Middle East.

     United States used Anthropic's artificial intelligence technology in airstrikes in the Middle East, and just hours before the attack, Trump had just issued a ban against Anthropic.