Web hosting company Namecheap detected the misuse of one of its third-party services for sending some unauthorized emails, which directly targeted MetaMask users.
MetaMASK, a popular provider of data encryption wallets, has warned investors to avoid ongoing phishing attacks by fraudsters who try to contact customers using Namecheap's third-party upstream and downstream email system software.
On the evening of Feb. 12, Namecheap, a website hosting company, detected that one of its third-party services had been misused to push unauthorized e-mails to MetaMASK customers immediately. Namecheap described the incident as an "email gateway ip conundrum".
In the positive alarm, MetaMASK prompts its 1 million fans and will not collect and master your customer information (KYC), nor will it discuss account details based on email contacts.
The fishing email uploaded by the hacker includes a connection that opens an unreal MetaMASK URL, requiring a secret fix statement "to ensure the security of your wallet".
The wallet provider suggested that investors do not have to share seed statements because he handed over complete control of users' money to hackers.
Namecheap further confirmed that its service had not been compromised and that there was no leakage of customer data in this incident. Within two hours of the initial announcement, Namecheap confirmed that its email delivery had resumed and all communications would now come from the official website.
However, the main issues related to actively pushing e-mail are still under investigation. Investors are advised to re-check web links, e-mail addresses, mobile contacts when dealing with MetaMak and Namecheap communications.
In response to Cointelegraph's report on the subject, Namecheap confirmed that it could block fraudulent emails and contact his upstream and downstream providers to solve these problems from his side.
In January, a hacker used Google's advertising service to steal investors' irreplaceable dynamic passwords (NFT) and digital currency.
NFT's influential figure, NFT Creator, lost "fate-changing money" after accidentally installing malicious programs placed in Google ads.
The incident happened after the influencer used Google search engine to download the open source video capture mobile phone software OBS for free. However, he clicked on a link with a named sponsorship advertisement rather than an official website link, which led to asset damage.