<svg width="110" height="18" fill="none" xmlns="http://www.w3.org/2000/svg"><g clip-path="url(#a)" fill="#000"><path d="M79.42 9.335c0-.484.523-.672 1.085-.672.908 0 1.769.282 1.769.282V7.628c-.59-.174-1.193-.241-1.89-.241-1.528 0-2.6.725-2.6 1.908 0 2.299 3.162 1.708 3.162 2.823 0 .551-.495.7-1.218.7-.51 0-1.327-.2-1.916-.406v1.304c.49.195 1.18.378 1.862.378 1.487 0 2.907-.444 2.907-2.043 0-2.218-3.162-1.64-3.162-2.715l.001-.001Zm8.337 1.345c0-1.491.817-2.003 1.783-2.003.643 0 1.32.19 1.774.364V7.696c-.536-.174-1.01-.31-1.802-.31-2.104 0-3.404 1.291-3.404 3.375 0 1.975.938 3.333 3.31 3.333.75 0 1.333-.148 1.976-.364v-1.317c-.723.282-1.279.39-1.775.39-1.044 0-1.862-.484-1.862-2.124v.001ZM42.273 8.596h-.054V7.548h-1.474v6.384h1.581v-3.804c.496-.94 1.099-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.858 0-1.448.336-1.89 1.13Zm19.837 0h-.053V7.548h-1.474v6.384h1.58v-3.804c.497-.94 1.1-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.857 0-1.447.336-1.889 1.13Zm45.76-1.21c-.682 0-1.46.377-2.171.848l-.187.12c-.335-.712-1.005-.967-1.742-.967-.683 0-1.461.35-2.171.82v-.66h-1.501v6.385h1.594V9.35c.59-.39 1.219-.632 1.676-.632.523 0 .844.282.844 1.183v4.032h1.581v-4.57c.59-.39 1.219-.645 1.676-.645.523 0 .845.282.845 1.183v4.032h1.581V9.524c0-1.237-.738-2.137-2.024-2.137h-.001Zm-12.262 5.431c-1.032 0-1.58-.671-1.58-2.07 0-1.398.548-2.07 1.58-2.07s1.568.673 1.568 2.07c0 1.398-.536 2.07-1.568 2.07Zm0-5.43c-2.184 0-3.216 1.411-3.216 3.36 0 1.95 1.032 3.347 3.216 3.347s3.216-1.399 3.216-3.347-1.045-3.36-3.216-3.36ZM73.664 9.336c0-.484.523-.672 1.086-.672.907 0 1.768.282 1.768.282V7.63c-.59-.174-1.193-.241-1.889-.241-1.527 0-2.6.725-2.6 1.908 0 2.299 3.163 1.708 3.163 2.823 0 .551-.496.7-1.22.7-.508 0-1.325-.2-1.915-.406v1.304c.491.195 1.178.378 1.862.378 1.487 0 2.908-.444 2.908-2.043 0-2.218-3.163-1.64-3.163-2.715v-.001Zm-6.86.7c.094-.887.576-1.452 1.366-1.452.845 0 1.099.673 1.099 1.452h-2.466Zm1.38-2.648c-2.037 0-3.096 1.586-3.096 3.32 0 2.38 1.245 3.387 3.267 3.387.817 0 1.523-.109 2.347-.363v-1.32c-.664.244-1.263.391-1.905.391-1.178 0-1.967-.323-2.008-1.72h4.074c.027-.256.054-.497.054-.94 0-1.345-.71-2.756-2.734-2.756ZM56.3 9.483h-1.254V6.257H56.3c1.019 0 1.527.564 1.527 1.573s-.469 1.653-1.527 1.653Zm-.013-4.556h-2.928v9.004h1.688V10.8h1.24c1.916 0 3.31-1.035 3.31-2.97 0-1.935-1.394-2.903-3.31-2.903ZM49.82 12.09c-.51.47-.992.725-1.5.725-.871 0-1.435-.578-1.435-1.935 0-1.465.697-2.231 1.903-2.231.375 0 .764.094 1.032.202v3.239Zm0-4.557c-.47-.094-.805-.149-1.193-.149-2.184 0-3.377 1.466-3.377 3.603 0 2.137 1.193 3.105 2.6 3.105.697 0 1.54-.323 2.05-.753v.591h1.5V4.926h-1.58v2.608Zm-13.565 5.282c-1.031 0-1.58-.671-1.58-2.07 0-1.398.549-2.07 1.58-2.07 1.032 0 1.569.673 1.569 2.07 0 1.397-.537 2.07-1.569 2.07Zm0-5.43c-2.184 0-3.216 1.41-3.216 3.36s1.032 3.347 3.216 3.347c2.185 0 3.216-1.399 3.216-3.347s-1.044-3.36-3.215-3.36Zm47.372 6.545h1.587v-1.64h-1.587v1.64ZM31.608 4.926 29.82 11.82 28.03 4.926h-1.805l.42 1.477-1.575 5.65-1.712-7.128H21.62l2.441 9.005h1.892l1.462-4.815 1.37 4.815h1.892l2.563-9.005h-1.634.001ZM8.973 0C4.025 0 0 4.037 0 9s4.025 9 8.973 9 8.973-4.038 8.973-9-4.026-9-8.973-9ZM.906 9c0-1.173.25-2.287.698-3.293l3.849 10.575A8.095 8.095 0 0 1 .906 9Zm8.067 8.092a8.052 8.052 0 0 1-2.28-.329l2.42-7.055 2.48 6.814c.017.04.037.076.059.112a8.02 8.02 0 0 1-2.68.458Zm1.111-11.885a16 16 0 0 0 .924-.077c.435-.052.383-.693-.051-.667 0 0-1.307.103-2.15.103-.793 0-2.126-.103-2.126-.103-.435-.026-.485.64-.051.667 0 0 .411.052.846.077L8.733 8.66l-1.766 5.311L4.03 5.206c.486-.026.924-.077.924-.077.434-.052.383-.693-.052-.667 0 0-1.306.103-2.15.103-.151 0-.33-.004-.519-.01A8.049 8.049 0 0 1 14.42 3.033c-.035-.003-.069-.007-.105-.007-.792 0-1.355.693-1.355 1.436 0 .667.384 1.231.792 1.897.307.54.666 1.232.666 2.232 0 .692-.266 1.496-.614 2.615l-.806 2.697-2.915-8.698.002.002Zm5.967-.088a8.077 8.077 0 0 1 .989 3.882 8.09 8.09 0 0 1-4.012 6.994l2.464-7.146c.461-1.155.614-2.078.614-2.9 0-.297-.02-.573-.055-.831v.001Z"/></g><defs><clipPath id="a"><path fill="#fff" d="M0 0h109.895v18H0z"/></clipPath></defs></svg>{"id":43974,"date":"2022-12-26T23:26:54","date_gmt":"2022-12-26T23:26:54","guid":{"rendered":"https:\/\/pley2win.com\/metaverse\/north-korean-phishing-scam-targets-nfts\/"},"modified":"2022-12-26T23:26:54","modified_gmt":"2022-12-26T23:26:54","slug":"north-korean-phishing-scam-targets-nfts","status":"publish","type":"post","link":"https:\/\/pley2win.com\/?p=43974","title":{"rendered":"North Korean Phishing Scam Targets NFTs"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400;\">In the latest report on <\/span><span style=\"font-weight: 400;\">NFT scams<\/span><span style=\"font-weight: 400;\">, North Korean hackers have been found to be behind a major phishing scam targeting NFT holders. According to Blockchain security firm, SlowMist, the hackers used as many as 500 phishing domains to lure unsuspecting victims. Most of these websites were duplicates of popular NFT platforms such as <\/span><span style=\"font-weight: 400;\">OpenSea<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">X2Y2<\/span><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s all you need to know about the North Korean NFT phishing scam:<\/span><\/p>\n<figure id=\"attachment_88447\" aria-describedby=\"caption-attachment-88447\" style=\"width: 1200px\" class=\"wp-caption aligncenter\"><picture decoding=\"async\" class=\"size-full wp-image-88447\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg.webp 1200w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-300x207.jpeg.webp 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-768x530.jpeg.webp 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-81x56.jpeg.webp 81w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-150x103.jpeg.webp 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-450x310.jpeg.webp 450w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201200%20827'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 1200px) 100vw, 1200px\"\/><img loading=\"lazy\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201200%20827'%3E%3C\/svg%3E\" alt=\"North Korean NFT phishing scam\" width=\"1200\" height=\"827\" data-lazy-srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg 1200w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-300x207.jpeg 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-1024x706.jpeg 1024w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-768x530.jpeg 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-81x56.jpeg 81w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-150x103.jpeg 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-450x310.jpeg 450w\" data-lazy-sizes=\"(max-width: 1200px) 100vw, 1200px\" data-lazy-src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"size-full wp-image-88447\"><source type=\"image\/webp\" srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg.webp 1200w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-300x207.jpeg.webp 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-768x530.jpeg.webp 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-81x56.jpeg.webp 81w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-150x103.jpeg.webp 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-450x310.jpeg.webp 450w\" sizes=\"(max-width: 1200px) 100vw, 1200px\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg\" alt=\"North Korean NFT phishing scam\" width=\"1200\" height=\"827\" srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg 1200w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-300x207.jpeg 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-1024x706.jpeg 1024w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-768x530.jpeg 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-81x56.jpeg 81w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-150x103.jpeg 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-450x310.jpeg 450w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"\/>\n<\/picture>\n<\/noscript><figcaption id=\"caption-attachment-88447\" class=\"wp-caption-text\">The North Korean hackers created around 500 phishing domains. Credit: Unsplash<\/figcaption><\/figure>\n<h2><span id=\"What_is_the_North_Korean_NFT_phishing_scam\"><b>What is the North Korean NFT phishing scam?<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In a report released on December 24, SlowMist alleged that hackers connected to North Korea\u2019s Lazarus Group were behind a massive NFT phishing scam. Typically, the North Korean Advanced Persistent Threat (APT) groups used fake websites to offer investors \u201cmalicious mints\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To explain, the websites lure victims under the pretext of minting legitimate NFTs. Once they connect their wallets to the website, the hackers get access to the wallets and can drain them as they please.\u00a0<\/span><\/p>\n<h2><span id=\"How_do_hackers_steal_NFTs\"><b>How do hackers steal NFTs?<\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0<\/span><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Furthermore, SlowMist discovered several unique NFT phishing traits used by the North Korean groups. For example, the phishing websites would record visitor data and save it to external sites. Then, they would run various \u201cattack scripts\u201d to access sensitive information such as victim\u2019s access records, wallet addresses, authorizations, approve records, and sigData. Using this information, the North Korean hackers can drain victims\u2019 wallets.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, most of the sites used the same Internet Protocol (IP). Moreover, they used multiple tokens, such as WETH, USDC, and DAI, in their phishing attacks. Additionally, one phishing address, in particular, was responsible for a major number of transactions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe hacker was able to receive a total of 1,055 NFTs and made off with a profit of approximately 300 ETH through their sales,\u201d the <\/span><span style=\"font-weight: 400;\">report<\/span><span style=\"font-weight: 400;\"> added.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SlowMist\u2019s findings on the North Korean NFT phishing scam further emphasise the need to take <\/span><span style=\"font-weight: 400;\">NFT security<\/span><span style=\"font-weight: 400;\"> seriously.<\/span><\/p>\n<div class=\"bottom-text__subscribe\">\n<div id=\"mlb2-5802138\" class=\"ml-form-embedContainer ml-subscribe-form ml-subscribe-form-5802138\">\n<div class=\"ml-form-align-center\">\n<div class=\"ml-form-embedWrapper embedForm\">\n<div class=\"ml-form-embedBody ml-form-embedBodyHorizontal row-form\">\n<div class=\"ml-form-embedContent\" style=\"\">\n<h4><span id=\"Join_Our_New_To_The_Moon_daily_Newsletter\">Join Our New &#8220;To The Moon&#8221; daily Newsletter<\/span><\/h4>\n<p>Get our free, 5 minutes daily newsletter. Join 25,000+ NFT enthusiasts &amp; stay on top \ud83d\udc4a\ud83c\udf1a<\/p>\n<\/div>\n<\/div>\n<div class=\"ml-form-successBody row-success\" style=\"display:none\">\n<div class=\"ml-form-successContent\">\n<h4><span id=\"Thank_you\">Thank you!<\/span><\/h4>\n<p>You have successfully joined our subscriber list.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=\" http:=\"\" width=\"1\" height=\"1\" style=\"max-width:1px;max-height:1px;visibility:hidden;padding:0;margin:0;display:block\" alt=\".\" border=\"0\" data-lazy-src=\"https:\/\/track.mailerlite.com\/webforms\/o\/5802138\/c5t4g8?v1668587371\"\/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/track.mailerlite.com\/webforms\/o\/5802138\/c5t4g8?v1668587371\" width=\"1\" height=\"1\" style=\"max-width:1px;max-height:1px;visibility:hidden;padding:0;margin:0;display:block\" alt=\".\" border=\"0\"\/><\/noscript><\/p>\n<div class=\"bottom-text__wrapper post-content\">\n<p>\u00a0<\/p>\n<hr\/>\n<p><em>All investment\/financial opinions expressed by NFTevening.com are not recommendations.<\/em><\/p>\n<p><em>This article is educational material.<\/em><\/p>\n<p><em>As always, make your own research prior to making any kind of investment.<\/em><\/p>\n<\/div>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/nftevening.com\/north-korean-phishing-scam-targets-nfts\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the latest report on NFT scams, North Korean hackers have been found to be behind a major phishing scam targeting NFT holders. According to Blockchain security firm, SlowMist, the hackers used as many as 500 phishing domains to lure unsuspecting victims. Most of these websites were duplicates of popular NFT platforms such as OpenSea [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":43975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","fifu_image_alt":"","footnotes":""},"categories":[681],"tags":[],"class_list":["post-43974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-metaverse"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>North Korean Phishing Scam Targets NFTs - Gaming News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pley2win.com\/?p=43974\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean Phishing Scam Targets NFTs - Gaming News\" \/>\n<meta property=\"og:description\" content=\"In the latest report on NFT scams, North Korean hackers have been found to be behind a major phishing scam targeting NFT holders. According to Blockchain security firm, SlowMist, the hackers used as many as 500 phishing domains to lure unsuspecting victims. Most of these websites were duplicates of popular NFT platforms such as OpenSea [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pley2win.com\/?p=43974\" \/>\n<meta property=\"og:site_name\" content=\"Gaming News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T23:26:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg\" \/>\n<meta name=\"author\" content=\"pley2win\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pley2win\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean Phishing Scam Targets NFTs - Gaming News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pley2win.com\/?p=43974","og_locale":"en_US","og_type":"article","og_title":"North Korean Phishing Scam Targets NFTs - Gaming News","og_description":"In the latest report on NFT scams, North Korean hackers have been found to be behind a major phishing scam targeting NFT holders. According to Blockchain security firm, SlowMist, the hackers used as many as 500 phishing domains to lure unsuspecting victims. Most of these websites were duplicates of popular NFT platforms such as OpenSea [&hellip;]","og_url":"https:\/\/pley2win.com\/?p=43974","og_site_name":"Gaming News","article_published_time":"2022-12-26T23:26:54+00:00","og_image":[{"url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","type":"","width":"","height":""}],"author":"pley2win","twitter_card":"summary_large_image","twitter_image":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","twitter_misc":{"Written by":"pley2win","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pley2win.com\/?p=43974#article","isPartOf":{"@id":"https:\/\/pley2win.com\/?p=43974"},"author":{"name":"pley2win","@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"headline":"North Korean Phishing Scam Targets NFTs","datePublished":"2022-12-26T23:26:54+00:00","mainEntityOfPage":{"@id":"https:\/\/pley2win.com\/?p=43974"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"image":{"@id":"https:\/\/pley2win.com\/?p=43974#primaryimage"},"thumbnailUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","articleSection":["Metaverse"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pley2win.com\/?p=43974#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pley2win.com\/?p=43974","url":"https:\/\/pley2win.com\/?p=43974","name":"North Korean Phishing Scam Targets NFTs - Gaming News","isPartOf":{"@id":"https:\/\/pley2win.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pley2win.com\/?p=43974#primaryimage"},"image":{"@id":"https:\/\/pley2win.com\/?p=43974#primaryimage"},"thumbnailUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","datePublished":"2022-12-26T23:26:54+00:00","breadcrumb":{"@id":"https:\/\/pley2win.com\/?p=43974#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pley2win.com\/?p=43974"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/?p=43974#primaryimage","url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg","contentUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/12\/hack-scaled.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/pley2win.com\/?p=43974#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pley2win.com\/"},{"@type":"ListItem","position":2,"name":"North Korean Phishing Scam Targets NFTs"}]},{"@type":"WebSite","@id":"https:\/\/pley2win.com\/#website","url":"https:\/\/pley2win.com\/","name":"Gaming News","description":"Video Gaming News","publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pley2win.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d","name":"pley2win","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","url":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","contentUrl":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","width":700,"height":250,"caption":"pley2win"},"logo":{"@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png"},"sameAs":["http:\/\/www.pley2win.com"],"url":"https:\/\/pley2win.com\/?author=3"}]}},"_links":{"self":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/43974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=43974"}],"version-history":[{"count":0,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/43974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/media\/43975"}],"wp:attachment":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=43974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=43974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=43974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}