Tricks Attackers Use To Scam People Buying NFTs

Share post:

Cisco Talos researcher, Jaeson Schultz has uncovered several tricks cybercriminals could use to defraud users buying or minting NFTs. This includes malicious smart contracts, sleepminting, and seed phrases.

The seed phrase is a representation of a long string of random numbers. A digital wallet uses it to generate the private keys that let users send and spend their crypto.

Bad actors, therefore, disguise themselves as customers service agent while offering to help users as long as they provide the seed phrase for their wallet.

Sleepminting involves attackers using malicious smart contracts to mint NFTs to other people’s wallets. The minted NFTs are then transferred from those other wallets so the NFT can be sold to an unsuspecting buyer.

Steps NFT buyers can take to protect themselves include using good security fundamentals (solid passwords, MFA), and examining internet, ENS domain, and crypto wallet addresses.

Others include using a hardware wallet to add another layer of security, rejecting every request to disclose their seed phrases, researching their purchases, and verifying the source code of a smart contract before buying anything.

For more information, read the original story in TechRepublic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways