On March 22nd, Google issued an emergency security update for its Chrome browser as 3.2 billion users were potentially at risk of being attacked. This update highlighted a single security vulnerability that could have a big impact on everyone, but specifically crypto users.
Earlier this week, Arthur Cheong, the founder of DeFiance Capital and a known crypto whale via Twitter that his crypto wallet had been hacked causing him to lose over $1.5 million USD in tokens and NFTs.
Found out the likely root cause for the exploit, it’s a targeted social engineering attack. Received a spear-phishing email that really seems to be sent by one of our portco with content that seems like general industry-relevant content.
They are likely targeting all crypto peers pic.twitter.com/SegYBcoLX2
— Arthur 🌔⛩️🦔👻 (@Arthur_0x) March 22, 2022
The hack targeted what is called a ‘hot’ wallet. A hot wallet is directly connected to the internet rather than a ‘cold’ wallet, also known as a hardware wallet, where assets can be stored offline and remain offline for safekeeping and security. After seeing sophisticated hacks such as this, it’s safe to say that storing cryptocurrencies in cold wallets offer far more secure solutions to holding cryptocurrencies.
Weeks earlier, Ledger had warned users to be aware of Blind Signatures and the dangers that come with them, while continuing to advise users to proceed with caution when browsing DApps (decentralized applications) and other related websites.
Two primary hot wallets that were being targeted held a crypto balance valuing over $1.5 million USD; most of which contained NFTs under the ‘Azukis’ collection. These popular NFTs were immediately sold on OpenSea below market price, resulting in the hacker acquiring funds in the fastest possible manner.
Luckily, the cry was heard by the entire crypto community and actions were made with haste. Supporters swiftly acquired some of the stolen Azuki NFTs from the blacklisted hacker and were mercifully willing to return the NFTs to Arthur at a base price rather than reselling them at their current market value, allowing them to profit 7-8+ ETH (worth around $24 k USD) in exchange. Not all heroes wear caps.
Altogether, the hacker was able to acquire 78 different NFTs from five widely known collections. And that’s not all.
Not only focusing on Azuki’s and other NFTs collectibles, they also managed to steal 68 wrapped ETH (wETH), 4,349 staked DYDX (stkDYDX) and 1,578 LooksRare (LOOKS) tokens, tallying to a whopping $293,281.64 at the time of the attack.
Following the announcement, Arthur himself investigated deep into the exploit and discovered the hacker must have obtained access to his wallet by sending him what is known as spear-phishing emails. This alone revealed that the emails received were issuing requests to access Arthur’s Google Docs content in full. At first glance, these requests seemed to be from two ‘legitimate’ sources of his. Immediately after opening the shared file, the hacker gained an unauthorized passage to the seed phrase of his hot wallet. In other words, the master password to the hot wallet was compromised instantly, granting the thief access to all crypto wallets connected to Google Chrome and siphoning the hard-earned assets right in front of him.
Similar hacks and exploits are nothing new to the crypto industry. However, and it’s very unfortunate to say, these attacks are becoming extremely intricate and identical catastrophic events can happen to even the most experienced users. This display of tragedy is evidence that anyone can fall victim to similar cyberattacks and nothing is ever really “100% secure” as some may claim.
As the recovering cyberattack victim later tweeted “Didn’t expect this to happen to me.”
Well not sure what happened, need to take time to figure it out. Didn’t expect this to happen to me as well.
Guess no more hot wallet usage then.
— Arthur 🌔⛩️🦔👻 (@Arthur_0x) March 22, 2022
Following the hack, Arthur’s recommendations were to always put security first. Examples include using a trusted password manager, enabling 2-factor authentication (not via phone numbers to avoid sim card jailbreaks and sim-swapping), and to adopt cold storage wallets, namely Ledger hardware wallets to ensure your funds are SAFU in perpetuity.
Credit : cryptoslate.com