Animoca to repay users 265 ETH stolen in fake NFT drop Discord hack

Animoca to repay users 265 ETH stolen in fake NFT drop Discord hack

The attack is the latest in a long string of exploits targeting users on Discord with fake “stealth” NFT drops. Hong Kong-based gaming and venture capital company Animoca Brands and subsidiary Blowfish Studios have promised users that they will repay 265 ETH (US$1.1 million) stolen in a fraudulent nonfungible token (NFT) sale on D`iscord. The fraudulent minting event occurred at approximately 3 AM AEDT on Nov 19 on the Phantom Galaxies Discord server. It saw 1,571 fake minting transactions over the course of about three hours.Phantom Galaxies is an upcoming Australian game being developed....


Related News

Beeple’s Discord compromised, timed to coincide with Christie’s auction

Users thought they were signing up for an affordable NFT drop by the famed artist, timed to coincide with his second Christie's auction. An admin account for Beeple’s official Discord group was compromised overnight resulting in a fake NFT drop that saw users lose an estimated 38 ETH. An admin from Beeple's Discord named "Multi"  confirmed to the group on Nov. 10 that their account had been compromised despite having 2FA. The perpetrator went on to impersonate Multi and the Beeple Announcements Bot to promote a fake NFT drop from Beeple on Nifty Gateway.The incident is the latest in a long....

Axie Infinity's Discord bot compromised, hackers issue fake minting message

The developers have managed to delete the fake message and remove the MEE6 bot from the main server. Axie Infinity, the popular play-to-earn nonfungible token game, faced another attack on its Discord server earlier on Wednesday, leading to a compromise of its MEE6 bot.MEE6 is a popular discord bot mainly used for automating roles and messages and is used by numerous crypto projects. The attackers used the compromised bot to add permissions to a fake Jiho account, and later issued a fake announcement regarding a mint.The developers managed to remove the compromised MEE6 bot from the main....

Cream Finance Plans To Repay The Stolen Funds To Its Users

Cream Finance is a decentralized finance protocol to repay users for the flash loan hack on its platform. The hack of nearly $19 million occurred on Aug 30, 2021. Cream Finance puts news of a post-mortem to the massive exploitation of the AMP flash loan. The protocol promises to repay the stolen Amp (AMP) and Ether (ETH) coins. It plans on footing its promise by allocating 20% of all the protocol fees until the debt is fully paid. Furthermore, the protocol will post collateral with the pertinent parties at AMP. It will also involve the Flexa digital payments network, the creators, for the....

Hacker tastes own medicine as community gets back stolen NFTs

The dev partner of the Solana-based NFT game raised the royalty to 98% from the usual 5%, resulting in the scammer listing the 25 stolen NFTs for sale, which were then bought back and returned. The tales of traders getting scammed out of their nonfungible tokens (NFTs)  were quite common at the peak of the NFT boom. However, in an interesting turn of events, the Solana community came together to “scam” a scammer in order to get back some stolen NFTs.It all started with the Discord channel hack of cross-chain gaming development studio Uncharted NFT, where scammers managed to drain out 109....

Hong Kong NFT project Monkey Kingdom loses $1.3M in phishing hack, launches c...

The exploited nonfungible token project is looking to make things right before the holidays with the help of a compensation fund. On Tuesday, Solana nonfungible token (NFT) project Monkey Kingdom, which has received notable backing from American DJ Steve Aoki, announced via Twitter that hackers made off with $1.3 million of the community's crypto funds through a security breach on Discord. According to its developers, the hack first occurred with the breach of Grape, a popular solution for verifying users on Solana. Hackers then used the exploit to take over an administrative account,....