MetaMask issues warning to investors regarding ongoing phishing attempts

SNEAK PEEK

  • MetaMask issued a warning to investors about ongoing phishing attempts by scammers.
  • The third-party upstream system for emails used by NameCheap is being used by scammers to contact users.
  • When dealing with communications from NameCheap and MetaMask, investors are warned to double-check website links, email addresses, and contact information.

According to MetaMask, a popular crypto wallet provider, scammers are attempting to communicate with users via NameCheap’s third-party upstream email system.

NameCheap, a web hosting company, discovered the unauthorized use of one of its third-party services on the evening of February 12, which specifically targeted MetaMask users. Namecheap identified the problem as an “email gateway issue.”

In the proactive alert, MetaMask reminded its million followers that the company does not procure know-your-customer (KYC) data and will never notify them via email to discuss account information.

The phishing emails from the hacker have included a link to a bogus MetaMask website that asks for the Secret Recovery Phrase “to keep your wallet secure.”

The wallet provider warned investors to stop sharing seed phrases because doing so grants the hacker absolute control of the user’s funds.

Additionally, NameCheap affirmed that the scandal’s allegations regarding its services and customer data were completely false. Finally, NameCheap confirmed that mail delivery had resumed and that all upcoming communications would come directly from the official source within two hours of the initial notification.

However, the fundamental question of unsolicited email mailing is still being looked into. Therefore, investors are highly urged to double-check website links, email accounts, and contact information when dealing with MetaMask and NameCheap communications.

By using Google Ad services, in January 2023, a hacker also took cryptocurrency and nonfungible tokens from investors. OBS, an open-source video streaming program, was downloaded by the influencer using the Google search engine, which is how the incident happened. 

He decided to click a sponsored advertisement link rather than download it from the official website, which ultimately led to financial loss for the influencer.