Based on CfB's posts...
****
Clone Attack
Clone Attack is a scheme for stealing NXTs through the use of a Nxt Clone and can only be successful if you use the same passphrase on Nxt and on a Nxt Clone that uses the same transaction format. Very Important: Do not use your Nxt Account passphrase for anything but your Nxt account. The Clone Attack is a very simple attack so could become common if people are reluctant to generate new Strong Passphrases and reuse their Nxt Passphrase in any Clone. It is described below using a fictitious clone named NEX:
1. You use the same account passphrase in NEX as you have in Nxt.
2. The attacker sends you an amount, say 10000NEX, perhaps at the launch of the Clone, as a giveaway or as part of day to day transactions.
3. Later, the attacker offers to buy 5000NEX from you for 0.01 BTC (this will always be a generous offer for the Clone).
4. The Attacker sends you the Bitcoins in advance and you send him 5000NEX.
5. The attacker then broadcasts the NEX transaction you sent them onto Nxt network, .
Result: 5000NXT is removed from your Nxt account and you only received a small percentage of its value. Again, very important: Do not use your Nxt Account passphrase for anything but your Nxt Account. Anyone can broadcast transactions from a Clone into Nxt and vice versa, if the clone doesn't change the transaction format used in Nxt. So anyone who uses the same Account Passphrase in both can lose NXTs.
The transaction signed by the client includes a timestamp (seconds since genesis block), and as all clones so far have a timestamp more than one day in the future compared to Nxt, why would such a transaction if rebroadcast into the Nxt network be accepted?
Using the same pass phrase is playing with fire. I just don't understand why that attack would work.
You can resurrect the thread here : https://nxtforum.org/alternate-cryptocurrencies/nxt-clones/
The attack stuff starts on page 2 I think. Two Nxters were trying to prove it was possible but I think they both got busy