Scammers are exploiting a flaw with Twitter's website preview cards to show a legitimate website but have it redirect you to a phishing site.
Here's how it's currently being exploited to drain wallets π§΅π
1/ There is an ongoing exploit that allows people to spoof what the Twitter website preview shows. It can be manipulated to show any website's preview, and take you somewhere completely different.
This is possible in both tweets & DMs.
2/ Recently, using a network of hacked accounts, attackers mass tweeted claiming that Uniswap was hacked, and they were able to get the hashtags #UniswapHack#UniswapExploit and "Revoke Cash" trending
3/ After clicking on any of the trending terms, you'll find that the top tweets are fake tweets by accounts impersonating known web3 security accounts.
They bot the engagement to get it to the top of the search.
4/ When you click the links, it will redirect you to replica phishing sites. After you connect your wallet, it will find your most valuable assets and prompt transactions that will drain your wallet.
5/ They're taking advantage of the recent SushiSwap exploit, hoping people will see #UniswapHack trending, see top security accounts posting about it with links that seem to be legit, and go on the websites to 'protect their assets', but it is all fabricated by scammers.
6/ There have also been other cases of this exploit, where scammers have spoofed website links in DMs during NFT trades, or announced fake airdrops/raffles with legitimate looking links.
7/ Does this link look legit to you? It shows OpenSea's website preview, but will it actually take you there? Test it out for yourself.
8/ Things to learn βοΈ
- Don't trust what Twitter previews show.
- Always confirm authenticity. Double check usernames & URLs
- Understand what you're signing
- Hold your valuable assets on a hardware wallet
Stay safe & feel free to share this thread to educate others β€οΈ
β’ β’ β’
Missing some Tweet in this thread? You can try to
force a refresh
π¨ Analysis of how a scammer stole 14 BAYCs worth over 852 ETH ($1.07 million) today through a month-long social engineering scam.
Here's how it happened π§΅π
1/ The scammer (@JasonBrubeck) contacted the victim (@_sevenseason_) and asked to license IP rights for BAYC #2060. They claimed to be a casting director working for "Forte Pictures" which is an LA based Emmy award winning company with offices at Sony Pictures Studio.
2/ The alias "Jason Brubeck" is fake and does not exist, however, Forte Pictures and Marcus Mizelle are both real and legitimate. The real Forte Pictures company did not own the domain forte(.)pictures, but rather operated under Mizelle's website, marcusmizelle(.)com.
A few days ago, a dangerous Discord XSS exploit was found and exploited. This allowed hackers to steal your Discord token from clicking on an official Discord link.
Here's how it worked π§΅π
1/ For those who don't know, cross-site scripting (XSS) is an attack vector in which the attacker injects malicious executable scripts onto a vulnerable website.
2/ Discord's newly released discovery page allowed for an XSS exploit through HTML code injection. Hackers created a Discord server discovery page and put malicious code in the "Reasons to join" section. This is the HTML code hackers put on the page.
Scammers have started spoofing URLs using lookalike
unicode letters
In this case, they are changing the letter "i" to a lookalike character from a non-English alphabet
The URLs respectively resolve to:
β’ xn--premnt-s9a[.]xyz
β’ xn--premnt-zva[.]xyz
On the phishing website, you will be met with a replica site of @PREMINT_NFT
When you click "Login To Register", depending on your total NFT collection value and your wallet balance, it will send either a Seaport signature which will drain your NFTs or attempt to drain your ETH.
Scammers are spoofing file extensions to disguise malicious files as PDFs and targeting artists, influencers, and projects.
This is how it works π§΅π
1/ In this case, artist @RabbitinM was first messaged about a commission for his art. He was sent a zip file containing what the customer wanted, with examples and sketches. What seemed to a normal commission turned bad when the artist went to view the customer's request.
2/ After opening the zip file, we can see example art, along with the PDF file containing the customer's sketches, however, this isn't a regular PDF file. It is actually a Screen Saver (.scr) file, which is an executable script, disguised as a PDF file.
Using an exploit with Google ads, scammers are able to make the real and scam URL look exactly the same.
Already ~100 ETH stolen π§΅π
1/ After clicking the top link, you will be redirected to one of these phishing sites. On the phishing websites, they have two types of scams going on.
One will try to get your seed phrase, and the other one calls a Refund() method and attempts to drain your wallet balance.
2/ How do you prevent this?
- ALWAYS make sure you're on the right URL at all times
- Never confirm random transactions. Always be cautious.
- Never give out your seed phrase.
- Stole your valuables on a cold wallet
Already $650,000 stolen from a single individual and it's going to happen to a lot more people.
This is how it happened π§΅π
1/ On April 15th, @revive_dom received multiple text messages asking to reset his Apple ID password and at 6:32 PM he received a call from "Apple Inc." which was a spoofed caller ID.
They claimed that there was suspicious activity on his Apple ID and they asked for a one-time
2/ verification code to prove the owner of the Apple ID account. After giving the 6 digit verification code, the scammers hung up and his MetaMask wallet was wiped, with over $650,000 stolen. How did they access his MetaMask wallet? Let's look into what happened π