Quite a few customers of the crypto analytics platform Nansen have acquired phishing emails from scammers pitching an “unique alternative” to take part within the fictitious “Nansen Airdrop.”
On Nov. 23, crypto group members on X (previously Twitter) flagged an ongoing phishing marketing campaign focusing on Nansen customers. The scammers are impersonating Nansen and sending pretend invites to an unique airdrop occasion.
Cointelegraph confirmed the hack from crypto investigator Officer’s Notes (Officercia), who initially warned the group in regards to the ongoing assault. He suspects that consumer information from a earlier third-party database leak is getting used to focus on Nansen customers.
On Sept. 22, certainly one of Nansen’s third-party distributors suffered a security breach, which affected practically 7% of the system’s customers. The customers affected by the breach reportedly had their e-mail addresses uncovered, together with some password hashes, and a number of other had their blockchain addresses compromised. On the time, Nansen claimed it could determine and inform these affected and ask all of them to vary their passwords. It additionally clarified that pockets funds had been unaffected by the occasion.
The screenshot of the Nansen phishing e-mail shared with Cointelegraph exhibits the sender was “email@example.com,” an e-mail handle fully unrelated to the unique analytics platform.
It mentioned that for the following 48 hours, customers may declare a assured allotted quantity of faux NANSEN tokens. The scammers connected a hyperlink to the e-mail, which might redirect customers to a doubtlessly rigged web site.
Officercia advises reporting suspected phishing hyperlinks to databases corresponding to chainabuse.com, cryptoscamdb.org and phishtank.org, which assist the web group scale back the success charges of such assaults.
Nansen has not responded to Cointelegraph’s request for remark.
That is simply somebody scraping our public API that exhibits the affiliation between public pockets addresses and public Twitter usernames.
It’s like saying somebody hacked you by taking a look at your public Twitter feed.
— buddy.tech (@friendtech) August 21, 2023
Nevertheless, Good friend.tech lately denied claims that its database of over 100,000 customers was leaked. “It’s like saying somebody hacked you by taking a look at your public Twitter feed,” defined the Good friend.tech group, clarifying that the knowledge got here from scraping its public API.