Bored Apes Creator Warns of Threat Group Targeting NFT Communities
Attackers have targeted wallets hosting several high-profile NFT collections in the past few months.

Yuga Labs, the development studio behind popular non-fungible tokens (NFT) collections such as the Bored Apes Yacht Club, warned in a tweet Monday of a group of attackers targeting the NFT community.
“Our security team has been tracking a persistent threat group that targets the NFT community,” Yuga developers tweeted. “We believe that they may soon be launching a coordinated attack targeting multiple communities via compromised social media accounts.”
Our security team has been tracking a persistent threat group that targets the NFT community. We believe that they may soon be launching a coordinated attack targeting multiple communities via compromised social media accounts. Please be vigilant and stay safe.
— Yuga Labs (@yugalabs) July 18, 2022
Yuga Labs did not respond to requests asking for more specific information at writing time. However, the warning came as millions of dollars worth of NFT exploits have occurred in the past few months.
The past weekend saw over $375,000 worth of ether
“While the malicious file is no longer available due to the Domain Name Server no longer existing, the effects of the attack are visible on-chain," read a statement from CertiK at the time. "In total, six externally owned accounts (EOA) are directly associated with the attack, with approximately 275 ETH stolen (~$375K).
The firm added that attackers “exploit the centralization issues and single-points of failure” that come with crypto projects relying on centralized internet infrastructures. “Hacks of this kind are becoming increasingly popular,” CertiK said. “There has been a marked increase in attackers targeting other official accounts such as social media platforms to conduct exploits.”
The Premint attack came nearly a week after attackers stole over $1.4 million worth of ether from Omni Protocol, an NFT platform that allows users to take loans against their NFTs.
That followed a May attack when users of NFT marketplace OpenSea received false promotional messages on the project’s Discord channel, which led community members to a fake site that ultimately drained user wallets after clicking on a malicious link.
In April, the Bored Apes’ Instagram account and Discord server were exploited with an unofficial "mint" link sent out to followers. The fraudulent link claimed that users could mint "land" in the then-upcoming OthersideMeta, as previously reported.
In a separate April incident, attackers exploited a now-fixed design flaw in the Rarible NFT marketplace to steal a Bored Ape NFT from Taiwanese singer and actor Jay Chou and sell it for over $500,000.
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
- Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.
More For You
The Protocol: Bug that can drain all your tokens impacting 'thousands' of sites

Also: Ripple news, Aave protocol debate, and pudgy penguins takeover
What to know:
This article is featured in the latest issue of The Protocol, our weekly newsletter exploring the tech behind crypto, one block at a time. Sign up here to get it in your inbox every Wednesday.










