Cybercriminals posing as IT technicians managed to infiltrate several NFT and Web3 projects, stealing around $1 million in just a few days. Their modus operandi: exploiting internal access to fake large-scale minting and drain digital vaults.
Infiltration via fake IT profiles
- The hackers infiltrated technical teams by posing as legitimate employees, gaining privileged access to minting systems.
- Once inside, they generated excessive amounts of NFTs and sold them immediately, crashing the value of the collections to zero.
Mechanism and fund leakage
- The stolen amounts were then moved through multiple exchanges and wallets to obscure their trail.
- In some cases, the funds remained idle in dormant wallets, making it difficult to trace their destination.
Opportunities and risks
Opportunities:
- Enhanced security: Web3 projects are encouraged to implement stricter access controls and increased internal monitoring.
- Adoption of internal checks: The incident promotes the use of audits and more rigorous verification processes to prevent such abuses.
Risks:
- Eroded trust: Users and investors may hesitate to participate in NFT projects without strong security assurances.
- Repeated attacks: If these techniques become widespread, other protocols could face similar intrusions via fake IT profiles.
Conclusion
This attack highlights how vulnerable Web3 environments are to internal manipulation. Fake insiders pose a serious threat: to prevent future losses, teams must strengthen governance and implement more robust protocols. User trust depends on their ability to manage these risks.


