Hackers steal $ 400,000 in NFTs from Premint users via malicious link

Hackers steal $ 400,000 in NFTs from Premint users via malicious link

The popular NFT platform Premint was hacked on July 17, resulting in a total loss of around $ 400,000 for users who clicked on a malicious link.

According to available information, the hacker compromised Premint’s website by adding a malicious JS file to the site. Unsuspecting users who clicked on the link gave the hacker access to steal the NFTs in their wallets.

Over 300 NFTs lost

Blockchain security company Certik confirmed that the hackers stole 314 NFTs, which included NFTs from notable projects such as Bored Ape, Goblintown and Otherside.

Premint confirmed the hack, saying only a “relatively small number of users” were exposed, adding that Etherscan had identified four wallets related to the attack.

The total Ethereum value (ETH) of stolen assets is estimated at 275 ETH, worth over $ 400,000.

The attack took place hours after Premint warning users should not “sign any transactions that say permanent approvals for everyone!”

Premint restores the service

Premint has been able to restore the normality of its website and has added an update that removes the wallet login feature.

Users can now log in to the platform via Discord or Twitter social media accounts, such as the platform claims is “safer and more convenient, especially for those who log on to mobile.”

It also required affected users to add their wallet address to a document.

However, there is no information on how or when they will be refunded.

See also  How to do your own research on NFT projects

NFT hacks

The latest attack on Premint is the latest in a long line of hacks in the NFT area within a relatively short time.

On July 15, famed NFT artist DeeKay lost $ 150,000 NFT to malicious gamers.

A Footprint Analytics report said that around 5% of the total hacks in web3 during the second quarter of 2022 occurred in NFTs.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *