Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»ETHEREUM NEWS»$600,000 lost in cryptocurrency wallet due to ignored phishing attack
ETHEREUM NEWS

$600,000 lost in cryptocurrency wallet due to ignored phishing attack

By Crypto FlexsJanuary 27, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
0,000 lost in cryptocurrency wallet due to ignored phishing attack
Share
Facebook Twitter LinkedIn Pinterest Email

On January 23, Wallet Connect and other web3 companies notified users about a phishing scam that was using email addresses from official web3 companies to steal funds from thousands of cryptocurrency wallets.

Massive phishing campaign

Wallet Connect uses X to notify the community about approved emails sent from email addresses associated with Wallet Connect. The email encouraged recipients to open a link to claim the airdrop, but the link led to a malicious site and, as confirmed by Wallet Connect, was not issued directly by the team or anyone involved. Wallet Connect contacted web3 security and privacy company Blockaid to further investigate the phishing scam.

We have detected a sophisticated phishing attack using identity theft. @WalletConnect Via fake emails linking to malicious dapps.

Blockaid supported wallets are safe: https://t.co/quz9olGrpZ pic.twitter.com/TYS0BjIk2J

— Block Aid (@blockaid_) January 23, 2024

Next time, cryptocurrency detective Posted CoinTelegraph, Token Terminal, and De.Fi team emails have also been compromised, with community alerts notifying unwitting users that a larger, more sophisticated phishing campaign is taking place. At the time of publishing, approximately $580,000 had been stolen.

After investigating, Blockaid later revealed that the attackers “were able to impersonate a web3 company by leveraging a vulnerability in email service provider MailerLite.”

Email phishing scams are common among cyber fraudsters, so users should be wary of the most suspicious links or emails. At the same time, companies and organizations are advised not to open links that do not come from official channels. In this case, because the malicious link came from the company’s official email address, the attacker was able to fool numerous users of the company.

This compromise allowed attackers to send persuasive emails with malicious links attached to wallet-draining websites. Specifically, this link led to several malicious dApps leveraging Angel Drainer Group infrastructure.

As Bloackaid explains, the attackers took advantage of data previously provided to Mailer Lite because they had previously been given access by these companies to send emails on behalf of these sites’ domains. It is specifically detailed using existing DNS records. Thread:

Specifically, they used “dangling DNS” records created and associated with Mailer Lite (previously used by these companies). Even after an account is closed, these DNS records remain active, providing an opportunity for attackers to claim and impersonate these accounts. pic.twitter.com/cbTpc5MXu1

— Block Aid (@blockaid_) January 23, 2024

MailerLite explains security breach

The explanation came later via email, in which MailerLite explained that its investigation revealed that a member of its customer support team had inadvertently become the initial point of compromise. As explained in the email:

A team member responding to a customer inquiry through the support portal clicked on an image that deceptively linked to a fraudulent Google sign-in page. Entering credentials there by mistake gave the perpetrator access to their account. The intrusion was inadvertently authenticated by a team member through cell phone verification, and was believed to be a legitimate access attempt. This breach allowed the perpetrators to infiltrate internal management panels.

MailerLite added that the attackers reset specific users’ passwords in the admin panel to further consolidate unauthorized control. This control gave them access to 117 accounts, of which they only focused on cryptocurrency-related accounts for their phishing campaigns.

An anonymous Reddit user posted an analysis of the situation and took a closer look at the attacker’s transactions. The user stated:

One victim wallet appears to have lost 2.64 million XB tokens. There are about 2.7M in the phishing wallet of 0xe7D13137923142A0424771E1778865b88752B3c7, and 518.75K went into 0xef3d9A1a4Bf6E042F5aaebe620B5cF327ea05d4D.

Users said most of the stolen funds were in the first phishing address. At the same time, about $520,000 worth of ETH was transferred to the privacy protocol Railgun, which he believes will soon move through other mixers or exchanges.

  ETH is trading at $2,232.92 in the hourly chart. Source: ETHUSDT on TradingView.com

Featured image from Unsplash.com, chart from TradingView.com

Disclaimer: This article is provided for educational purposes only. This does not represent NewsBTC’s opinion on whether to buy, sell or hold any investment, and of course investing carries risks. We recommend that you do your own research before making any investment decisions. Your use of the information provided on this website is entirely at your own risk.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Fusaka Update – Information for Blob Users

October 18, 2025

Class action lawsuit claims Microsoft choked AI supply to drive up ChatGPT costs

October 14, 2025

‘OG’ Whale Attracts Over $400 Million in Bearish BTC Bet

October 10, 2025
Add A Comment

Comments are closed.

Recent Posts

Bombastic Casino Unveils New Design And Enhanced Features

October 21, 2025

Leading A New Era Of AI Model Training And Digital Computing Power Contracts

October 21, 2025

Earn 15% APR With Flexible Redemption And Up To 2,926 USDT

October 21, 2025

Crypto Market Recovers As Liquidity Returns — Pepeto Announces $700K Giveaway And 221% Staking Rewards

October 21, 2025

6 Best AI Quant Apps: Smarter Automated Trading Solutions for the Modern Investor

October 21, 2025

Start Passive Crypto Income At Zero Cost

October 21, 2025

Limitless Prediction Market Closes $10M Seed Round Ahead Of LMTS Token Launch

October 20, 2025

Whale.io Introduces Crock Dentist Game And Exclusive RWA NFT Collection

October 20, 2025

Bybit Card Honored As “the Best Performing Crypto Card” By Mastercard At EDGE 2025

October 20, 2025

Jupiter Launches Ultra V3 – The Ultimate Trading Engine For Solana

October 20, 2025

Jiuzi Holdings, Inc Enters Strategic Partnership With BitFi To Advance Bitcoin-Centric Finance

October 20, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Bombastic Casino Unveils New Design And Enhanced Features

October 21, 2025

Leading A New Era Of AI Model Training And Digital Computing Power Contracts

October 21, 2025

Earn 15% APR With Flexible Redemption And Up To 2,926 USDT

October 21, 2025
Most Popular

Goldmine Hostess Slots: Talk about a questionable fantasy!

May 9, 2024

Dogwifhat Becomes 3rd Largest Meme Coin by Market Capitalization

March 29, 2024

Spot Bitcoin and Ethereum ETFs approved in Hong Kong

April 15, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.