Peckshield, a prominent blockchain security firm, has today exposed that there are numerous phishing websites for the Web3 lifestyle app Stepn. Hackers insert a forged MetaMask browser plugin through which they can steal seed phrases from unsuspecting Stepn users, according to Peckshield.
When these cybercriminals obtain the seed phrase, they gain complete control over the Stepn user's dashboard, where they may connect their stolen wallets to their own or "claim" a giveaway as per Perkshield.
Peckshield has urged Stepn users to contact support as soon as possible if they detect anything suspicious with their accounts. Some customers stated they had encountered issues, reported them to support, and resolved the problem.
However, Stepn has yet to provide any official remarks about it. The phishing notification arrived nearly 20 hours after the Web3 lifestyle app finished its AMA session on Twitter spaces. Peckshield is a popular Twitter account where the cryptocurrency community may learn about hacks or phishing scams.
STEPN is a Solana-based game where gamers buy nonfungible token (NFT) sneakers to begin playing. The app monitors users' movement through the GPS on their mobile phones and gives them in-game tokens called Green Satoshi Tokens (GSTs). These coins can then be traded for USD Coin (USDC) or Solana (SOL), allowing users to cash out.
Phishing attacks, rug pulls and protocol exploits have become more prevalent in the cryptocurrency industry as decentralized finance (DeFi) and nonfungible tokens (NFTs) have become popular. These types of attacks are not new, but they are continually evolving to take advantage of users in different ways.
Last month, the Ronin bridge on Axie Infinity was attacked and robbed of more than $600 million in Ether (ETH) and USD Coin. As reported by Cointelegraph recently, in a cryptocurrency heist gone wrong, an attacker fumbled their getaway at the finish line, leaving behind over $1 million in stolen crypto. Earlier this year, $80 million in crypto was stolen from Qubit Finance when hackers duped the protocol into thinking they had put down collateral, allowing them to mint a bridged currency asset.