In a Twitter post, the CEO ruled out OpenSea’s website as the origin point of the attack. He added that interacting with an email from OpenSea was not a vector for the attack. Similarly, clicking on the site’s banner, signing the new Wyvern smart contract, and using OpenSea’s listing migration tool to move listings to the new Wyvern contract system were determined to be safe, as well.
See Also: FTX Starts Gaming Segment to Assist Crypto Advocacy: Ch Hussain
“We’re actively working with users whose items were stolen to narrow down a set of common websites that they interacted with that might have been responsible for the malicious signatures,” Finzer said on Sunday. “We’ll keep you updated as we learn more about the exact nature of the phishing attack.”
The incident, which occurred on Saturday over the course of a few hours, suggests this was a targeted attack.
“32 users had NFTs stolen over a relatively short time period. This is extremely unfortunate, but suggests a targeted attack as opposed to a systemic issue.” The company’s chief technology officer, Nadav Hollander said.
Hollander also added that the attack appeared to have occurred outside OpenSea. Also, the company was “actively helping affected users and discussing ways to provide them additional assistance.”
Also Check: NFTs, explained
0 Comments
Don't comment any spam or promotional links. Thank you.