OpenSea Investigating ‘Exploit Rumors’ as Users Complain of Missing NFTs

Emails purporting to be from the NFT marketplace about a planned smart contract migration may have been a phishing attack.

AccessTimeIconFeb 20, 2022 at 3:32 a.m. UTC
Updated May 11, 2023 at 5:55 p.m. UTC
10 Years of Decentralizing the Future
May 29-31, 2024 - Austin, TexasThe biggest and most established global hub for everything crypto, blockchain and Web3.Register Now

In the wake of a series of viral tweets from panicked non-fungible token (NFT) traders, leading marketplace OpenSea says it’s investigating “rumors of an exploit” regarding smart contracts connected to its platform – a vulnerability that may have cost traders valuable tokens.

  • “We are actively investigating rumors of an exploit associated with OpenSea related smart contracts,” OpenSea posted to Twitter Saturday night U.S. hours. “This appears to be a phishing attack originating outside of OpenSea's website. Do not click links outside of opensea.io.”
  • Around 10:50 p.m. ET, OpenSea CEO Devin Finzer followed up in a tweet that “32 users thus far have signed a malicious payload from an attacker, and some of their NFTs were stolen.” He added that the company is “not aware of any recent phishing emails that have been sent to users,” and suggested a fraudulent website may be to blame.
  • Running With Crypto: 5 Questions With TRM Labs' Ari Redbord
    00:59
    Running With Crypto: 5 Questions With TRM Labs' Ari Redbord
  • Hacks Involving North Korea Are 'Even Greater Problem': Legal Experts
    09:43
    Hacks Involving North Korea Are 'Even Greater Problem': Legal Experts
  • Breaking Down the State of Hacking in 2024
    02:01
    Breaking Down the State of Hacking in 2024
  • Crypto Hack Volumes Fell by More Than 50% in 2023: TRM Labs
    00:59
    Crypto Hack Volumes Fell by More Than 50% in 2023: TRM Labs
    • OpenSea had planned to revise its smart contract (the code governing its trading platform, essentially) by releasing a brand-new contract on Friday. The upgraded contract was intended to ensure old, inactive listings on the platform would eventually expire.
    • On Twitter, traders shared what they’d initially thought were official OpenSea emails about the migration process from contract A to contract B.
    • PeckShield, a blockchain security company that audits smart contracts, stated that the rumored exploit was “most likely phishing” – a malicious contract hidden in a disguised link. The company cited that same mass email about the migration process as one of the possible sources of the link.
    • The apparent attacker’s address (which the blockchain explorer website Etherscan has already slapped with a “phish/hack” warning badge) holds about $1.7 million worth of ether (ETH), as well as three tokens from the Bored Ape Yacht Club, two Cool Cats, one Doodle and one Azuki.

    Update (Feb. 20, 04:42 UTC): Adds public statement from OpenSea CEO.

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information has been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. In November 2023, CoinDesk was acquired by the Bullish group, owner of Bullish, a regulated, digital assets exchange. The Bullish group is majority-owned by Block.one; both companies have interests in a variety of blockchain and digital asset businesses and significant holdings of digital assets, including bitcoin. CoinDesk operates as an independent subsidiary with an editorial committee to protect journalistic independence. CoinDesk employees, including journalists, may receive options in the Bullish group as part of their compensation.

    Will Gottsegen

    Will Gottsegen was CoinDesk's media and culture reporter.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.


    Read more about