
How to Protect NFT From Stealing?
The NFT markets began to grow day by day and reached transaction volumes in the millions of dollars. However, big money attracts a lot of eyes. We'll tell you about the methods modern hackers use to steal NFT and make millions from it.
#1 Phishing
Phishing is the most common method based on duplicating a legitimate website or marketplace. Carefully check the URL of the service / marketplace / website before you connect your Web3 Wallet (MetaMask, Phantom, Terra Station Wallet, etc.), and don't ignore even the slightest change in the URL.
#2 Discord scams
Discord is a platform for sharing important information, audio meetings, and the verification process that many NFT and crypto teams actively use. NFT project mint addresses are usually published on discord channels, so scammers can hack the channel and send fake messages to users via DMS.
Do not click on links posted by outsiders, and carefully check messages sent by administrators.
#3 NFT Copycat NFTs
Many people follow the wallets of influencers to make similar investments. Some scammers take advantage of this and mint coins similar to those in famous people's purses.
Due to the spread of this problem, Metaverse services and crypto projects like Verasity have even implemented a Proof-of-View protocol that can authenticate NFT collections to prevent victims from falling for this type of scam.
#4 Fake social media accounts
Mis-spelling the handles of popular social media influencers by adding a letter, symbol, or number at the end of real project profiles and usernames is also common among scammers. In that case, you should check the account's followers, posting history and content.
#5 Stolen social media accounts
Like Discord scams, social media account theft from influencers through social engineering misleads subscribers into connecting their wallets to malicious websites by clicking on links sent to them. Hackers usually try to trick with free mint, airdrop or giveaways.
Remember the following rules to protect your NFTs:
- Choose hardware wallets over software wallets;
- Treat every private message sent to you with suspicion, and examine your account carefully;
- Do not share your private key, source phrase, and/or passwords with anyone;
- Use strong passwords and consider alternative authentication options.