Here's a list of what it steals from you. It is capable of stealing virtually everything you have saved on your computer. The malware that has been circulating in the NFT community offers a wide range of capabilities.
When I looked at this website, I discovered that it was a direct clone of the real version of the application described.
The attacker provided me a link to a website. Again, the goal is to establish trust with their victim. They referred to me as a professional, which is why they came to me. As you can see, the attacker cited one of my artworks, ‘'Vision' indicating that they are well-versed in my work. The attacker did their research to learn more about the type of artwork I create, which is abstract multi-colored work with sorted pixels, exactly what the attacker is mentioning.Īnother screenshot from the conversation. Let's go back to where I discussed what social engineering is for a second. The attacker also described adjusting the number of pixels, using rich color correction, and coloring the image to your liking. The majority of businesses do not pay in ETH and instead use a fiat currency. The attacker sent me a DM on Twitter with a decent introductionĪccording to the attacker, payment would be made in ETH.