Illustration by Alex Castro / The Verge

On Saturday, attackers stole hundreds of NFTs from OpenSea users, causing a late-night panic among the siteā€™s broad user base. A spreadsheet compiled by the blockchain security service PeckShield counted 254 tokens stolen over the course of the attack, including tokens from Decentraland and Bored Ape Yacht Club.

The bulk of the attacks took place between 5PM and 8PM ET, targeting 32 users in total. Molly White, who runs the blog Web3 is Going Great, estimated the value of the stolen tokens at more than $1.7 million.

ā€œThey all have valid signaturesā€

The attack appears to have exploited a flexibility in the Wyvern Protocol, the open-source standard underlying most NFT smart contracts, including those made on OpenSea. One explanation (linked by CEO Devin Finzer on Twitter) described the attack in two parts: first, targets signed a partial contract, with a general authorization and large portions left blank. With the signature in place, attackers completed the contract with a call to their own contract, which transferred ownership of the NFTs without payment. In essence, targets of the attack had signed a blank check ā€” and once it was signed, attackers filled in the rest of the check to take their holdings.

ā€œI checked every transaction,ā€ said the user, who goes by Neso. ā€œThey all have valid signatures from the people who lost NFTs so anyone claiming they didnā€™t get phished but lost NFTs is sadly wrong.ā€

Valued at $13 billion in a recent funding round, OpenSea has become one of the most valuable companies of the NFT boom, providing a simple interface for users to list, browse, and bid on tokens without interacting directly with the blockchain. That success has come with significant security issues, as the company has struggled with attacks that leveraged old contracts or poisoned tokens to steal usersā€™ valuable holdings.

OpenSea was in the process of updating its contract system when the attack took place, but OpenSea has denied that the attack originated with the new contracts. The relatively small number of targets makes such a vulnerability unlikely, since any flaw in the broader platform would likely be exploited on a far greater scale.

Still, many details of the attack remain unclear ā€” particularly the method attackers used to get targets to sign the half-empty contract. Writing on Twitter shortly before 3AM ET, OpenSea CEO Devin Finzer said the attacks had not originated from OpenSeaā€™s website, its various listing systems, or any emails from the company. The rapid pace of the attack ā€” hundreds of transactions in a matter of hours ā€” suggests some common vector of attack, but so far no link has been discovered.

ā€œWeā€™ll keep you updated as we learn more about the exact nature of the phishing attack,ā€ said Finzer on Twitter. ā€œIf you have specific information that could be useful, please DM @opensea_support.ā€

Emma Roth also contributed reporting.

By

Leave a Reply

X