
Unveiling Recent NFT Heists: A Deep Dive into Cybersecurity Breaches
The recent wave of cyberattacks on NFT projects has sent shockwaves through the cryptocurrency world. In just a week, hackers posing as IT personnel infiltrated the very core of minting operations, leading to losses of approximately $1 million. Notable victims included the fan-token marketplace Favrr and innovative Web3 projects such as Replicandy and ChainSaw.
The Silent Infiltration into Web3 Teams
As reported by renowned onchain investigator and cybersecurity analyst ZackXBT, these cybercriminals managed to integrate themselves into development teams under assumed identities. This strategy granted them unprecedented access to minting contracts. With this access, they executed mass minting of tokens and NFTs almost instantaneously.
The result was a devastating crash in floor prices, allowing the culprits to liquidate their ill-gotten gains swiftly. In less than a week, approximately $1 million was siphoned from the treasuries of these affected projects.
Mass Minting’s Impact on Market Prices
Favrr bore the brunt of these attacks, with tokens being offloaded at a pace the market couldn’t sustain. Similar scenarios unfolded at Replicandy and ChainSaw, where floor values plummeted to zero almost immediately. The stolen cryptocurrency from ChainSaw remains dormant in various wallets, awaiting laundering to re-enter exchanges. ZackXBT highlighted how intricate services further complicated the tracing of these funds.
The Challenges of Tracing and Freezing Stolen Funds
The complexity of onchain transfers, passing through numerous exchanges and wallets, poses significant challenges for analysts. Tracing these mixed outputs can extend over weeks as exchanges must sift through vast logs. This process can hinder or even prevent law enforcement efforts to freeze compromised accounts.
In a related incident in May 2025, the Coinbase data breach exposed personal information of around 69,461 customers. Compromised contractors were bribed to divulge user data, culminating in an extortion attempt against the exchange.
Insights from Broader Cybersecurity Threats
This breach within the NFT and Web3 space mirrors tactics used by Ruby Sleet in November 2024. That group initially targeted aerospace and defense sectors, later pivoting to IT companies through deceptive hiring initiatives. Their modus operandi involved social engineering, implanting malware, and acquiring credentials.
The immutable nature of blockchain and NFTs amplifies the repercussions of such breaches. Once insiders gain elevated privileges, reversing the damage becomes almost impossible.
Security professionals advocate for a reevaluation of trust models. Implementing zero-trust frameworks can restrict an engineer’s access, while multi-party approval processes could prevent unexpected minting surges. Real-time monitoring systems can quickly identify suspicious activities, and rigorous code reviews, coupled with identity verifications for new hires, can close potential vulnerabilities before they are exploited.
Editorial Commitment to Quality and Integrity
Our editorial process at Bitcoinist is dedicated to delivering content that is meticulously researched, accurate, and unbiased. We adhere to strict sourcing standards, and each article undergoes thorough review by our team of top technology experts and seasoned editors. This ensures that the content we provide is trustworthy and valuable to our readers.





