MetaMask Phishing Emails Use Fake Security Reports to Steal Wallets


Attackers target MetaMask users with phishing emails that include forged “Security_Reports.pdf” files. These create panic about account breaches and push clicks to AWS-hosted fake 2FA pages. Internet Storm Center detailed the campaign, noting its ReportLab-generated PDFs with SHA256 hash 2486253ddc186e9f4a061670765ad0730c8945164a3fc83d7b22963950d6dcd1.

The emails warn of unusual login activity. They urge users to enable two-factor authentication fast. Links lead to hxxps://access-authority-2fa7abff0e.s3.us-east-1.amazonaws.com/index.html for credential theft.

Mail asks the victim to enable 2FA (Source – Internet Storm Center)

MetaMask serves over 100 million users as a top crypto wallet extension and app. Attackers exploit this trust. The PDFs look professional but stay benign to dodge email filters. Social engineering builds urgency around fake security threats.

Despite clever touches, flaws exist. Sender addresses show no spoofing. PDFs lack victim-specific details or MetaMask branding. These gaps help spot fakes on close check.

Campaign Technical Details

Emails attach the PDF as a fear trigger. It claims unauthorized access without proof. Readers feel pressed to act on the 2FA link right away.

The AWS domain adds trust since cloud services seem legit. Phishing pages mimic MetaMask flows perfectly. Victims enter seed phrases at the final step, losing all funds instantly.

Internet Storm Center tracked the hash across samples. ReportLab’s ease lets attackers scale fast. Low quality shows in unpersonalized blasts though.

Security_Reports.pdf (Source – Internet Storm Center)

Phishing Flow Table

StepTacticGoal
Email DeliveryAttach Security_Reports.pdfBypass filters, build panic
Social EngineeringUrgent login alertsLower victim skepticism
Link ClickAWS-hosted fake pageRedirect to credential form
Fake 2FASeed phrase promptFull wallet drain

This chain preys on crypto users’ security worries. Bull markets spike such attacks as trades rise.

Protection Measures

  • Check sender domains against official MetaMask lists.
  • Never enter seed phrases on prompted pages.
  • Type metamask.io manually for checks.
  • Block AWS phishing URLs in filters.

MetaMask never emails for recovery phrases or 2FA setup. Use extension alerts only. Teams should hash-block the PDF and scan for similar lures.

FAQ

What triggers the MetaMask phishing email?

Attachment named Security_Reports.pdf warns of logins. Pushes 2FA link urgently.

Is the PDF file malicious?

No. It uses ReportLab for looks only. Real theft happens on linked page.

How to spot fake MetaMask messages?

Unspoofed senders. No personalization. AWS domains in links.

What if I clicked the link?

Move funds to new wallet now. Check transactions. Enable real 2FA via official site.

Where are official MetaMask warnings?

Security report at metamask

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages