A decentralized autonomous organization (DAO) focusing on gaming has recently warned its users that some of its X accounts were compromised. The company reminded its community that it doesn’t have airdrops, new mints, or anything else planned.
Security Breach and Response
In a tweet published on July 24, decentralized game publisher Treasure posted that its X accounts, Playontreasure and Playbridgeworld, were taken over by hackers. The organization warned users to refrain from interacting with links shared by the accounts.
After working to regain access to the accounts, the crypto game publisher tweeted on July 25 that it was able to bring back the X accounts to their “rightful hands” and finally contain the issue.
Caution and Vigilance
The firm did not provide additional information about how the hack happened or if any victims were affected by the recent security breach. However, the company warned its users to exercise an abundance of caution and to be safe, highlighting that its team has witnessed a significant rise in phishing attempts within the Treasure community and the broader Arbitrum ecosystem.
Industry-Wide Concerns
On July 21, Changpeng Zhao, the CEO of Binance, warned the crypto space about the increasing number of phishing hacks. Zhao urged exchange users to use hardware-based two-factor authentication (2FA) systems instead of mobile carrier-based 2FA.
At the recent Ethereum Community Conference 6 event in Paris, Polygon’s chief information security officer Mudit Gupta talked about the difficulties of being a defender in the security world. According to Gupta, defenders are tasked with covering every single potential entry point. He highlighted that if there’s a hole, someone will get in. On the other hand, attackers have it easier as all they need to do is find one way to break in and ignore the rest.
Conclusion
With the increasing frequency of social media hacks and phishing attempts in the crypto space, users should remain vigilant and take necessary precautions to protect their accounts and assets. Using robust authentication methods and being cautious with links and interactions can help mitigate the risk of falling victim to cyber threats.