Beware! Scammers pretend to be MetaMask technical support

MetaMask developers have sounded the alarm about scammers pretending to be the technical support team and stealing users’ private keys.

Scammers are trying to extort users’ personal data, posing as MetaMask technical support. This was reported by the developers of the project on their Twitter page.

According to MetaMask, a new type of phishing bot attacks cryptocurrency wallet users. The bot pretends to be an ordinary Twitter user with a small number of followers. As the BeInCrypto editorial staff found out, the bot has spread more than a dozen fraudulent tech support messages in the last 24 hours.

In his posts, the attacker leaves a link to the alleged MetaMask tech support page, which leads to a Google document.

Мошенники воруют криптовалюту у пользователей MetaMask с помощью рекламы  Google

In the document, the scammers ask to leave a mnemonic phrase with which they subsequently steal the cryptocurrency. The developers of MetaMask noted that it will not be easy to block scammers because of the chosen method of collecting information.

However, it is worth noting that the attackers are not only targeting MetaMask.

As it turned out, the owners of TrustWallet wallets were also under threat. Attackers use a similar method to spread links to supposedly TrustWallet tech support.

Fraudsters have long been inventing various ways to steal cryptocurrencies from wallets. For example, in early December last year, attackers spoofed not only the MetaMask website, but also a browser extension. The BeInCrypto editorial board also reported that a popular Chrome extension could steal data from a user’s computer. As it turned out, a screenshot extension called Awesome Screenshot & Screen Recorder can transmit screenshots to third parties.

In addition to wallets, scammers also prey on traders. For example, attackers use the mobile app Uniswap as a cover, through which they steal a mnemonic phrase.

No votes yet.
Please wait...
Avatar photo
Roman Mikhailov
Articles: 189

Leave a Reply

Your email address will not be published. Required fields are marked *