Article from: OpenSea
We recently learned that an employee of Customer.io, our email delivery vendor, misused their employee access to download and share email addresses – provided by OpenSea users and subscribers to our newsletter – with an unauthorized external party. If you have shared your email with OpenSea in the past, you should assume you were impacted. We are working with Customer.io in their ongoing investigation, and we have reported this incident to law enforcement.
Please stay vigilant about your email practices, and be alert for any attempt to impersonate OpenSea via email.
How Can You Protect Yourself?
Because the data compromise included email addresses, there may be a heightened likelihood for email phishing attempts. While safe email practices are always important, we strongly recommend that you follow the guidelines listed below and treat any future emails that appear to be from OpenSea carefully.
Please be aware that malicious actors may try to contact you using an email address that looks visually similar to our official email domain, ‘opensea.io’ (such as ‘opensea.org’ or some other variation).
Example phishing addresses:
Safety Recommendations:
Your trust and safety is a top priority. We wanted to share the information we have at this time, and let you know that we’ve reported the incident to law enforcement and are cooperating in their investigation.
Please help us keep the community safe by reporting any suspicious communication that appears to be from OpenSea at support.opensea.io.
The post Important Update on Email Vendor Security Incident appeared first on OpenSea Blog.
source
Article from: OpenSea