North Korean hackers linked to cybercrime group ‘Lazarus Group’ are behind a massive phishing campaign targeting non-fungible token (NFT) investors, using around 500 phishing domains to dupe victims, a new report said.
The strategies used by the North Korean Advanced Persistent Threat (APT) groups to distract NFT investors from their NFTs, such as the use of fake websites that appear to be various NFT-related platforms and projects, Cointelegraph quoted the report as saying.
These fake websites included one that presented itself as a World Cup project and others that impersonated popular NFT marketplaces like OpenSea, X2Y2 and Rarible.
The use of “malicious Mints” which tricked the victims into thinking they are minting a real NFT by connecting their wallet to the website, was one of the strategies implemented.
The report also showed that a large number of phishing websites shared the same Internet Protocol (IP), with 372 NFT phishing websites sharing a single IP and another 320 NFT phishing websites using a different IP.
Other phishing techniques used included saving visitor data to external websites and recording it, as well as attaching photos to the projects that were being targeted.
One phishing address alone was able to get 1,055 NFTs and profit 300 Ethereum (ETH), worth $367,000, through its phishing tactics, the report said.