Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

訂閱

Twitter Crypto Scams: Bored Ape Yacht Club, Azuki and Other Projects Impersonated to Steal NFTs, Digital Currencies

Scammers are using verified and unverified accounts to impersonate notable NFT projects like Bored Ape Yacht Club and others, tagging Twitter users to drive them to phishing websites.

背景說明

Over the last few months, a variety of non-fungible token (NFT) projects including Bored Ape Yacht Club (BAYC), Azukis, MoonBirds and OkayBears have been impersonated on Twitter in order to steal users’ NFTs and digital currencies like Ethereum and other altcoins. To create hype, many of these projects have been promoting upcoming integrations with their own metaverses, giving scammers ample opportunity to capitalize on new or rumored announcements in association with these projects.

Cryptocurrency scams on Twitter, which have been prevalent since at least 2018, have persisted on the platform through bull and bear markets. If there is one thing that is certain about cryptocurrency scams it is that scammers are determined to find creative ways to capitalize on the fervor in cryptocurrency and maliciously profit from it.

Scammers leverage Twitter mentions to capture attention

Recently, Twitter users with an interest in NFTs and cryptocurrency are likely to have received notifications in their Twitter Mentions. The cryptocurrency scammers are tagging users in replies across hundreds of tweets. By mentioning these Twitter usernames, they’re trying to pique their curiosity in a bid to trick some users into falling for their scams.

Image Source: Tenable, March 2022

Airdrops and free NFTs are the perfect vehicle for cryptocurrency scams

BAYC, one of the blue chip NFT projects in the space that has seen exponential growth since its launch in April 2021, announced earlier this year an Airdrop of ApeCoin to holders of its various NFT projects such as BAYC, Mutant Ape Yacht Club and Bored Ape Kennel Club. Naturally, scammers saw this announcement as a ripe opportunity to target the interest in this upcoming airdrop and began creating campaigns by hijacking verified Twitter accounts to drive users to phishing sites.

Image Source: Tenable, March 2022

These hijacked verified accounts were pivoted to use profile pictures (PFPs) of BAYC NFTs to lend legitimacy to their claims of airdrops of $APE tokens. Additionally, the scammers used these verified accounts to mention users en masse to capture their attention.

Image Source: Tenable, March 2022

Other noteworthy NFT projects impersonated

Besides BAYC, scammers have been impersonating a variety of other notable NFT projects including Azukis, Moonbirds, Invisible Friends and emerging projects on the Solana blockchain like OkayBears.

Backlash of BAYC’s Otherside Metaverse launch leveraged by scammers

On April 30, Yuga Labs launched its Otherside metaverse project, a way for BAYC NFT holders to purchase deeds (“Otherdeeds”) of land in their metaverse. This launch overwhelmed the Ethereum network, resulting in high gas fees for enthusiasts trying to mint a piece of land in the metaverse. This led to significant backlash from some of the project’s most vocal supporters. To capitalize on the frustration felt by these enthusiasts, scammers quickly moved to create fake OthersideMeta accounts on Twitter, promoting phishing pages not just for minting Otherdeeds, but also pages for those wanting to get a refund of the excessive gas fees they paid attempting to acquire the Otherdeeds.

Image Source: Tenable, May 2022

Scammers ironically warn of scammers, use fake accounts to add legitimacy to tweets

Conveniently, scammers will use the threat of potential scammers as justification for why they “clean” or “close” comments or replies to their tweets.

Image Source: Tenable, April 2022

They then leverage fake accounts that respond to the tweet to make it appear legitimate. Once they’ve seeded a few of these fake tweets, they leverage a built-in Twitter feature for conversations to restrict who can respond to their tweets, which prevents users from warning others of the potential fraud that lies ahead.

Image Source: Tenable, April 2022

Phishing sites are indistinguishable from the legitimate NFT project sites

The scammers leverage assets from the legitimate NFT project sites in order to craft their phishing sites, which would make it difficult for the average cryptocurrency enthusiast to tell them apart.

Image Source: Tenable, May 2022

The scammers will also use popular services like Linktree to drive users to fake pages mimicking NFT marketplaces like OpenSea and Magic Eden.

Image Source: Tenable, May 2022

Connecting your wallet to untrusted sites is a dangerous prospect

These phishing sites don’t rely on stealing users’ traditional usernames and passwords. Instead, they seek to convince users to connect their cryptocurrency wallets, typically browser-based wallets such as MetaMask or Phantom (Solana) to the phishing sites. Unsuspecting users explicitly need to grant these phishing sites permission to access their wallets. By doing so, scammers are able to then transfer out the digital currencies like Ethereum ($ETH) or Solana ($SOL), as well as any NFTs being held in these wallets.

These NFT-based scams are extremely successful

A fellow researcher who goes by the pseudonym Zachxbt recently noted that the BAYC Otherside phishing sites were so successful that they were able to locate three cryptocurrency addresses that had stolen several NFTs from Mutant Ape Yacht Club (MAYC), BAYC, Azuki and others to the tune of $6.2 million dollars.

The NFT scammers Twitter playbook

The projects impersonated here are just the few examples I’ve encountered over the last few months. However, future NFT projects or announcements from existing projects that have yet to launch or have launched recently will likely be capitalized by scammers following the same playbook:

  1. Hack or purchase a verified Twitter account or an account with hundreds of thousands of followers
  2. Pivot the account to impersonate notable NFT projects or their members by using PFPs and other images from the project
  3. Tweet about upcoming or recently held airdrops or mints for the projects with links pointing to phishing websites
  4. Tag users directly from the impersonated account or utilize an army of fake accounts to tag users across hundreds of tweets
  5. Wait for users to click on the phishing links and grant access to their cryptocurrency wallets in order to begin stealing NFTs and digital currencies

There may be some slight variations to the steps above, such as compromising the Twitter account of an existing figure within the cryptocurrency space, but chances are they will continue to use the same approach until something disrupts the playbook.

Twitter account for digital artist Beeple was hacked to promote a phishing scam
Image Source: xBenJamminx (Twitter)

How Twitter could curtail many of these NFT cryptocurrency scams

There are a few ways Twitter could intervene to make things harder for scammers when it comes to these impersonations.

  1. Make the NFT profile pictures feature available to all users instead of just to paying members of Twitter Blue. Because blockchains are meant to help provide a way to verify trust, allowing everyone to utilize this feature will provide a mechanism by which users can verify the authenticity of the tweets from someone using a BAYC profile picture.
  2. Temporarily hide tweets and profiles for verified accounts that change their profile pictures and names. Scammers that successfully hijack verified Twitter accounts will pivot them to brands, notable individuals or NFT projects. By temporarily hiding these tweets and profiles when they make such a change to their profiles, Twitter would give its abuse team a chance to manually review these changes before the scammers wreak havoc.
  3. Create warnings for profiles and links shared by verified Twitter accounts that recently changed their names and profile pictures. If #2 is not feasible, then put up a roadblock that creates warnings for end users when they are tagged in tweets from newly updated verified profiles or in the links that have been shared. Use transparency to help inform end users. Since Twitter accounts are tagged by a user_id, add a warning bubble next to a tweet saying “This profile recently changed its name and profile photo from (x) to (y). If this profile seems suspicious, report the account.”
  4. Watch for signals such as mass tagging on tweets. To gather the attention of users, the scammers are relying on tagging many users in replies to tweets. If a tweet begins to receive replies that are tagging multiple users, flag the original tweet/account and subsequent replies as suspicious. Twitter “canoes” – as they were once referred to – are anomalous, so such replies, even if from a number of Twitter accounts not related to the original tweet, should be another potential signal for flagging.

Twitter users interested in cryptocurrency need to remain skeptical

It’s a common refrain from me, but operating from a place of skepticism is likely going to provide some cover for users when it comes to such scams. If you’re proactively tagged in a tweet, you should be highly suspicious of the motivations behind it, even if it comes from a verified Twitter account. Seek out the original project’s website and cross-reference links that you see being shared on Twitter with the ones on their official website. Scammers will also rely on urgency to try to add pressure to users in this space. If an NFT mint is happening, they’ll say that there are a limited number of spots left. This urgency makes it easier to take advantage of users not wanting to miss out on the opportunity.

Much of the advice here is temporarily valuable because ultimately, scammers in this space are crafty and will continue to innovate their way into your MetaMask or other cryptocurrency wallets, which is why the oldest but most salient idiom remains valid: if it sounds too good to be true, it is.

其他資源

相關文章

您可以使用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用版軟體也包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

100 項資產

選取您的訂閱選項:

立即購買

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用版軟體也包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

100 項資產

選取您的訂閱選項:

立即購買

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable Vulnerability Management 試用版軟體也包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

100 項資產

選取您的訂閱選項:

立即購買

試用 Tenable Web App Scanning

享受完整存取我們專為新型應用程式所設計、屬於 Tenable One 曝險管理平台一部分的最新 Web 應用程式掃描產品。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

您的 Tenable Web App Scanning 試用版軟體也包含 Tenable Vulnerability Management 和 Tenable Lumin。

購買 Tenable Web App Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

5 個 FQDN

$3,578

立即購買

試用 Tenable Lumin

利用 Tenable Lumin 視覺化並探索您的曝險管理、追蹤經過一段時間後風險降低的情形以及與同業進行指標分析。

您的 Tenable Lumin 試用版軟體也包含 Tenable Vulnerability Management 和 Tenable Web App Scanning。

購買 Tenable Lumin

聯絡業務代表,瞭解 Tenable Lumin 如何協助您取得您整個環境的深入解析和管理網路風險。

免費試用 Tenable Nessus Professional

免費試用 7 天

Tenable Nessus 是目前市場上最全方位的弱點掃描器。

最新 - Tenable Nessus Expert
現已上市

Nessus Expert 新增了更多功能,包括外部攻擊破綻掃描和新增網域及掃描雲端基礎架構的能力。按這裡試用 Nessus Expert。

請填妥以下表單以繼續 Nessus Pro 試用。

購買 Tenable Nessus Professional

Tenable Nessus 是目前市場上最全方位的弱點掃描器。Tenable Nessus Professional 可協助將弱點掃描流程自動化,節省您執行合規工作的時間並讓您與 IT 團隊合作。

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。

選擇您的授權

購買多年期授權,節省更多。

增加支援與訓練

免費試用 Tenable Nessus Expert

免費試用 7 天

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

您已經有 Tenable Nessus Professional 了嗎?
升級至 Nessus Expert,免費試用 7 天。

購買 Tenable Nessus Expert

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

選擇您的授權

購買多年期授權省更多!

增加支援與訓練