Attackers can reveal identities of those using the largest NFT marketplace, research finds

NFTs
Aveva pagato quasi 3 milioni per un NFT, ora li sta perdendo (Image credit: Shutterstock/Sashkin)

OpenSea, arguably the world’s most popular marketplace for non-fungible tokens (NFT) was carrying a vulnerability that allowed hackers to deanonymize users and possibly even reveal their full identities. 

This is according to a new report from cybersecurity researchers part of the Red Team at Imperva, who notified OpenSea, and later confirmed that the vulnerability had been properly addressed.

In a blog post detailing the findings, Imperva’s researchers said that the OpenSea website carried a cross-site search vulnerability, as it didn’t restrict cross-origin communication. At the root of the problem was the iFrame-resizer library.

Exposing NFT owners

The researchers explained: “The iFrame-resizer library broadcasts the width and height of the page, which can be used as an “oracle” to determine when a given search returns results because the page is smaller when a search returns zero results. By continuously searching the user’s assets, which is done cross-origin through a tab or popup, an attacker can leak the name of an NFT created by the user, thereby revealing their public wallet address. This information can associate the user’s identity with the leaked NFT and public wallet address.” 

As a result, the victims might have their identities exposed, the researchers concluded.

To exploit the flaw, an attacker could send a link to the victim, be it via email, SMS, or any other communication channel. By clicking on the link, the victim reveals valuable information such as IP address, user agent, device details, software versions, ad similar.

Next, the attacker would exploit the cross-site search vulnerability to extract one of the target’s NFT names. And by associating the leaked NFT/public wallet address with the target, the attacker might expose the victim’s true identity.

After disclosing the flaw to the marketplace, OpenSea “quickly” released a patch, the researchers said. The flaw was addressed by restricting cross-origin communication, thus mitigating the risk of further exploitation, they concluded.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.