Noble X Account Hacked: Wallet Risks and Fake Airdrop Links Explained
The official Noble X account, which is a Cosmos-based blockchain initiative famous for issuing stablecoins, was attacked on October 22, 2025, and utilized to share phishing airdrop links in the form of $NBL token claims on the Solana network.
Crypto security monitoring tool Scam Sniffer verified Noble X Account Hacked, alerting users that the account was actively posting malware links that could empty linked wallets.
By early October 23, Jelena Noble, founder of the Noble Platform, also confirmed the incident through her Official X handle . Right now, the fraudulent tweets have been deleted and the team is working on its restoration.
Although no direct financial losses or smart contract compromise were reported, the action raises general awareness concerns and the surging cases.
How the Attack Worked
Attackers posted a tweet announcing “NBL is now live on BSC” with a fake contract address and links to binance Alpha and other major exchanges.
However, those URLs led to phishing websites that prompted users to connect their wallets. Once connected, attackers could exploit approval functions like “SetApprovalForAll” and “SafeTransferFrom” to transfer assets of NFTs without consent.
This Isn’t First time: Similar Incidents
-
Twitter Crypto Hack 2020: Over 130 verified accounts, including major brands and figures, were hijacked to promote a fake Bitcoin giveaway. Victims lost over $118,000 in BTC.
-
Blur NFT Drain 2024: Scammers used fake Airdrop Claim Page (most similar to this one), stealing an estimated $2.3 million in NFTs.
-
Friend.tech Clone 2024: Malicious “app copies” on Google Ads drained users’ wallets immediately after connection.
These examples show how trust and speed are exploited, and why verifying every link matters.
Security Breakdown: How Wallets Get Drained
All the cases have similar motives with different tactics . Even without sharing your seed phrase, a single malicious click can trigger:
-
Fake contract permissions that let attackers move your tokens.
-
Clipboard controlling, swapping your wallets address with theirs.
-
Malware or browser exploits that capture private keys or other passwords.
-
Phishing without promoting, redirected you to clone signing pages.
Safety Checklist for All Crypto Users
When it comes to money, caution is key. Never click links from posts or DMs, always verify official sites. In terms of Crypto, use cold wallets for storage, revoke suspicious approvals, double check URLs, and keep your devices updated.
Along with devices, keeping oneself also updated about the market activities , incidents, and new actions play a major role, as even experienced users can fall for coordinated phishing attacks.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。