A decentralized autonomous organization (DAO) focusing on gaming has recently warned its users that some of its X accounts were compromised. The company reminded its community that they don’t have airdrops, new mints or anything else planned.
In a tweet published on July 24, decentralized game publisher Treasure posted that their X accounts Playontreasure and Playbridgeworld were taken over by hackers. The organization warned users to refrain from interacting with links shared by the accounts.
PSA
Please do not interact with links shared by @PlayOnTreasure + @playbridgeworld at this time.
The accounts have unfortunately been hacked and we are working to regain access.
There is NO airdrop, new mint of TreasureTags, or anything else planned for today. Be safe.
— Treasure (@Treasure_DAO) July 24, 2023
After working to regain access to the accounts, the crypto game publisher posted on July 25 that they were able to bring back the X accounts to the “rightful hands” and was able to finally contain the issue.
The firm did not provide any additional information as to how the hack happened or if there are any victims that were affected by the recent security breach. However, the company warned its users to exercise an abundance of caution and to be safe, highlighting that their team has witnessed a significant rise in phishing attempts within the Treasure community as well as in the broader Arbitrum ecosystem.
Related: Dota 2, Rocket League pros ‘want to explore’ Web3 and blockchain gaming
On July 21, Changpeng Zhao, the CEO of the Binance exchange, warned the crypto space about the increasing number of phishing hacks. Zhao urged exchange users to use hardware-based two-factor authentication (2FA) systems instead of using mobile carrier-based 2FA.
At the recent Ethereum Community Conference 6 event held in Paris, Polygon’s chief information security officer Mudit Gupta talked about the difficulties of being a defender in the security world. According to Gupta, defenders are tasked with covering every single potential entry point. He highlighted that if there’s a hole, someone will get in. On the other hand, attackers have it easier as all they need to do is find one way to break in and ignore the rest.
Magazine: Should crypto projects ever negotiate with hackers? Probably