Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Hackers Compromise Ethereum Mailing List to Send Phishing Emails Directing Subscribers to Crypto Drainers

    Hackers Compromise Ethereum Mailing List to Send Phishing Emails Directing Subscribers to Crypto Drainers

    July 5, 2024

    The Ethereum Foundation (EF) this week disclosed a phishing campaign that targeted its email subscribers. The attack that took place on June 23, saw a malicious email sent to over 35,794 recipients from the compromised email account of ethereum – “updates@blog.ethereum.org”.

    Phishing mail sent on 23-06-2024, 00:19 AM UTC, to 35,794 email addresses from updates@blog.ethereum.org

    The phishing email sent from this address leveraged social engineering tactics, luring users with the promise of a high annual percentage yield (APY) through a fake collaboration between Ethereum and Lido DAO. Clicking the embedded “Begin staking” button led victims to a well disguised website designed to steal cryptocurrency from unsuspecting users’ crypto wallets.

    Dissecting the Ethereum Mailing List Attack

    Investigators discovered the attacker used a combined email list, incorporating both their own addresses and a subset of 3,759 addresses harvested from the Ethereum blog’s mailing list. Fortunately, only 81 of the obtained addresses were new to the attacker.

    The phishing email advertised a lucrative 6.8% APY on staked Ethereum. Upon clicking the malicious link and attempting to connect their wallets, users would unknowingly initiate a transaction that would drain their crypto holdings straight into the attacker’s wallet.

    Fake website where crypto drainers were masqueraded

    Swift Response and Ongoing Measures

    The Ethereum Foundation’s security team swiftly responded to the incident. They identified and blocked the attacker from sending further emails, while simultaneously alerting the community via Twitter about the malicious campaign. Additionally, the team submitted the fraudulent link to various blocklists, effectively hindering its reach and protecting users of popular Web3 wallet providers and Cloudflare.

    While on-chain analysis revealed no successful thefts during this specific campaign, the EF emphasizes the importance of vigilance. They have implemented additional security measures and are migrating some email services to mitigate future risks.

    Similar Incidents

    This incident highlights the evolving tactics of cybercriminals who exploit trust in reputable organizations to target cryptocurrency users. In February, crypto scammers devised a new tactic to deceive owners of Ethereum Name Service (ENS) domains, commonly recognized by their “.eth” extension. The ENS email phishing scam involved sending emails to ENS owners, purportedly alerting them about the expiration of their domains. But, as seen in the latest campaign victims were directed to fraudulent platforms designed to siphon their funds.

    Nick Bax, a prominent figure in cryptocurrency analysis, first reported the crypto scam, suggesting that attackers could be exploiting the extensive data leaked from previous data breaches. This leak potentially provides scammers with access to genuine email addresses associated with [.]eth accounts, facilitating the targeting of ENS owners.

    Security professionals and crypto enthusiasts alike should remain vigilant against phishing attempts and prioritize verifying information before interacting with suspicious links or investment opportunities.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRevealing the Zergeca Botnet: A New Era in DDoS Attacks
    Next Article Free Tickets? Fraud Alert: Hackers Leak Taylor Swift’s ERAS Tour Barcodes Targeting Ticketmaster

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Integrating Figma with Cursor IDE Using an MCP Server to Build a Web Login Page

    Machine Learning

    CVE-2025-32022 – Finit Urandom Heap Buffer Overwrite Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Shock move by Microsoft: Hiring freeze in consulting to cut costs after significant recent layoffs

    News & Updates

    NeuralOperator: A New Python Library for Learning Neural Operators in PyTorch

    Development
    Hostinger

    Highlights

    DistroWatch Weekly, Issue 1102

    December 22, 2024

    The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. This week in DistroWatch Weekly:
    Review: The best of 2024
    News: Fedora to expand Btrfs support and publishes new Apple M-series update, openSUSE announces the upcoming end of 15.5 Leap support and patches security feature out of Bottles
    Questions and answers: Changing a process name
    Released last week: NetBSD 10.1, T2….

    colorette – set your terminal text color and styles

    December 14, 2024

    NVIDIA AI Releases Eagle2 Series Vision-Language Model: Achieving SOTA Results Across Various Multimodal Benchmarks

    January 30, 2025
    DeepMind AI staff reportedly tied to Google with “aggressive” noncompete clause — Preventing them from joining rivals like Microsoft but offering year-long PTO

    DeepMind AI staff reportedly tied to Google with “aggressive” noncompete clause — Preventing them from joining rivals like Microsoft but offering year-long PTO

    April 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.