Two users fell victim to an OKX SIM swap hack that involved the theft of an undisclosed sum on June 9. The customers’ funds were stolen following a deceitful SMS notification purportedly from the exchange.
The attack follows last week’s deepfake incident on OKX, where cybercriminals used AI videos to circumvent the exchange’s security architecture.
The founder of blockchain security firm SlowMist, Yu Xian, revealed that the theft occurred through a sophisticated SMS attack.
The attackers sent a fake notification appearing to come from Hong Kong, tricking the victim into creating new API keys with withdrawal and trading permissions. Both incidents shared strikingly similar methods and might have been carried out by the same perpetrators.
Xian noted that the OKX SIM swap hack was initially suspected to involve cross-trading intentions, but that method has been ruled out.
两个不同的受害者,今天凌晨遭遇的交易所账号被盗币事件的手法及一些特征居然是相似的,除了 @AsAnEgg 提到的共性,还包括短信风险通知来自“香港”这个特征、创建了新的 API Key(有提现、交易权限,这也是为什么之前怀疑有对敲意图,目前看来可以排除了)。… https://t.co/pqIjqLhmkB
— Cos(余弦)
Read more on cryptonews.com