Skip to content Skip to sidebar Skip to footer

Non-fungible tokens (NFTs) have crossed into that realm of popularity where various platforms are ranked, with industry observer Comparitech launching its Worldwide NFT Heists tracker.
NFTs have sold for as much as $92 million, but their financial value is still a point of great controversy in the traditional financial, financial technology (fintech), payments and cryptocurrency industries.
Researchers at Comparitech have been tracking NFT thefts for more than two years ever since the first NFT was stolen in early 2020. More than $86 million in NFT value has been pilfered since then, according to Comparitech research.
Much like financial threats and security in general, growing attacks on NFTs boil down to bad actors attempting to attack areas where they see the most money flowing. (Case in point: In December 2021, one NFT called “The Merge” sold for an eye-popping $92 million.)
Rebecca Moody, head of data research at Comparitech, pointed out that the company’s research have been tracking NFT heists since they initially came to light more than two years ago. In the past two and a half years, $86 million has been stolen from these sites, with increasing attacks this year — just like cryptocurrency in general. According to Comparitech, the 10 most significant NFT heists (based on the U.S. dollar amount stolen at the time of the attack) have been:
July 21, 2022
August 13, 2022
Evil PLC” is what the researchers believe is a novel attack scenerio: infecting whichever engineer communicates with a PLC with malicious code. As a proof of viability, Claroty published a set of 11 new vendor-specific vulnerabilities that would allow for the attack.
August 13, 2022
The investment community at Black Hat say they are not gun-shy about new investments while the U.S. and global economies face a downturn. 

Tue Dec 6Wed Dec 7

On-Demand Event

On-Demand Event

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.

source

Leave a comment