Close Menu
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain
  • Web 3
    • NFT
    • Metaverse
  • Regulation
  • Analysis
  • Learn
  • Blog
What's Hot

ZetaChain hires Kimi and Alibaba Qwen as AI models go cross-chain

2026-04-24

‘Most obvious Ponzi that ever existed’ – Peter Schiff criticizes Strategy’s STRC

2026-04-24

‘Most obvious Ponzi that ever existed’ – Peter Schiff criticizes Strategy’s STRC

2026-04-24
Facebook X (Twitter) Instagram
  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
Facebook X (Twitter) Instagram
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain

    ZetaChain hires Kimi and Alibaba Qwen as AI models go cross-chain

    2026-04-24

    How P2P.org built a Solana transaction channel for teams that can’t afford to miss a slot

    2026-04-24

    60% of banks listed on SWIFT have a connection with Ripple

    2026-04-23

    Monthly Active Addresses Exploding – Analysis of the Spike in Layer-1 and Layer-2 Network Utilities

    2026-04-23

    AI agents that trade crypto autonomously are the next big shift in blockchain

    2026-04-23
  • Web 3
    • NFT
    • Metaverse
  • Regulation

    The US Admiral Who Destroyed Crypto Now Runs A Bitcoin Node For US Security

    2026-04-23

    The American Bankers Association is calling for a 60-day pause to prevent stablecoin rules from going live

    2026-04-23

    Banks Fund Crypto Attack Ads in Washington, as More Than 3,000 Banks Unite to Stop the Clarity Act from Passing the Senate

    2026-04-21

    Have rate refunds been purchased at 20 cents on the dollar by Cantor Fitzgerald, a stablecoin-backed Treasurys custodian?

    2026-04-21

    Crypto will enter the US banking system through a backdoor, not through regulation

    2026-04-18
  • Analysis

    XRP Price Range Bound, Can Bulls Make the Next Big Move?

    2026-04-24

    Bitcoin Price Rally Approaches $80,000, Dips Could Attract New Buyers

    2026-04-23

    Cardano’s development teams want nearly $50 million for Bitcoin DeFi and Vision 2030

    2026-04-23

    Ethereum price rejected above $2,400, upside momentum starts to fade

    2026-04-23

    XRP Price Revisits Support Range, Make-or-Break Moment for Bulls

    2026-04-23
  • Learn

    Wall Street won’t stop buying. Bitcoin will not break out. What gives?

    2026-04-20

    Changelly launches ultimate DeFi Swap Flow and API for cross-chain and on-chain swaps

    2026-04-18

    What Is Etherscan? How to Use the Ethereum Block Explorer

    2026-04-17

    What Is a Crypto Faucet and How Does It Work?

    2026-04-17

    Crypto Bubbles Explained

    2026-04-17
  • Blog
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
Home»Web 3»What to Check Before ‘Updating’
Web 3

What to Check Before ‘Updating’

2026-01-03No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

On-chain security researcher ZachXBT noted that hundreds of wallets across multiple EVM chains were being emptied for small amounts of money, typically less than $2,000 per victim, which were funneled to a single suspicious address.

Total thefts rose above $107,000 and continued to rise. The cause is still unknown, but users reported receiving a phishing email disguised as a mandatory MetaMask upgrade, complete with a fox logo with a party hat and a “Happy New Year!” subject line.

This attack occurred when developers were on vacation, support channels had a skeleton crew, and users were scrolling through their inboxes crammed with New Year’s promotions.

Attackers abuse that window. The small amounts per victim suggest that in many cases the drainer is operating outside contract approvals rather than making full compromises, keeping individual losses below the threshold where victims immediately raise alarm but allowing the attacker to cover hundreds of wallets.

The industry is still processing a separate Trust Wallet browser extension incident in which malicious code in the Chrome extension v2.68 collected private keys and leaked at least $8.5 million from 2,520 wallets before Trust Wallet was patched to v2.69.

Two different exploits, same lesson: user endpoints remain the weakest link.

Anatomy of a phishing email that works

The MetaMask-themed phishing email shows why these attacks succeed.

The sender’s identity shows ‘MetaLiveChain’, a name that sounds vaguely DeFi-adjacent, but has no connection to MetaMask.

The email header contains an unsubscribe link for “[email protected]”, showing that the attacker took templates from legitimate marketing campaigns. The body features MetaMask’s fox logo wearing a party hat, mixing seasonal cheer with manufactured urgency about a “mandatory update.”

That combination bypasses the heuristics that most users apply to obvious scams.

Phishing scams sent to empty wallets
The phishing email imitates MetaMask with a party hat-fox logo, falsely claiming that a “mandatory” 2026 system upgrade is required for account access.

MetaMask’s official security documentation sets clear rules. Support emails only come from verified addresses, such as [email protected]and never from third-party domains.

The wallet provider does not send unsolicited emails requesting verification or upgrades.

See also  Bitcoin: BTC demand check as price remains stuck around $43,000

Furthermore, no representative will ever ask for a secret recovery phrase. Yet these emails work because they exploit the gap between what users know intellectually and what they reflexively do when an official-looking message arrives.

Four signals expose phishing before damage occurs.

First, the sender brand mismatch, as the MetaMask branding of “MetaLiveChain” signals template theft. Second, manufactured urgency around mandatory updates that MetaMask explicitly says it won’t send.

Third, destination URLs that don’t match claimed domains will show the actual destination if you hover over them before clicking. Fourth, requests that violate core wallet rules, such as asking for seed phrases or asking for signatures on opaque off-chain messages.

The ZachXBT case demonstrates distinctive phishing mechanisms. Victims who clicked on the fake upgrade link likely signed a contract approval granting the drainer permission to move tokens.

That one signature opened the door to continued theft at multiple chains. The attacker opted for small amounts per wallet because contract approvals often come with unlimited spending limits by default, but emptying everything would result in immediate investigations.

Spreading theft to hundreds of victims at $2,000 each flies under the individual radar as the total reaches six figures.

Withdraw approvals and reduce blast radius

Once a phishing link is clicked or a malicious endorsement is signed, the priority shifts to containment. MetaMask now allows users to view and revoke token permissions directly in MetaMask Portfolio.

Revoke.cash guides users through a simple process: connect your wallet, inspect approvals by network, and send revocation transactions for untrusted contracts.

Etherscan’s Token Approvals page provides the same functionality for manually revoking ERC-20, ERC-721, and ERC-1155 approvals. These tools are important because victims who act quickly can cut off access to the dish drainer before they lose everything.

The distinction between Endorsement Compromise and Seed-Phrase Compromise determines whether a wallet can be saved. MetaMask’s security guide draws a hard line: If you suspect your secret recovery phrase has been exposed, stop using that wallet immediately.

BC gameBC game

Create a new wallet on a new device, transfer the remaining assets, and treat the original seed as permanently burned. Revoking approvals helps when the attacker only has contract rights; if your seed is gone, the whole wallet must be left behind.

See also  Vitalik Buterin pitches ZK proofs to check the X algorithm and rankings

Chainalysis documented roughly 158,000 personal wallet compromises affecting at least 80,000 people in 2025, even as the total stolen value fell to approximately $713 million.

Chain analysis data about drainsChain analysis data about drains
The share of personal wallet losses in total crypto theft has increased from around 10% in 2022 to almost 25% in 2025, according to data from Chainalysis.

Attackers are hitting more wallets for smaller amounts, the pattern ZachXBT has identified. The practical implication: organizing wallets to limit blast radius is as important as avoiding phishing.

A single compromised wallet does not have to lead to a total wallet loss.

Building a defense in depth

Wallet providers have provided features that could have stopped this attack had they been adopted.

MetaMask now encourages setting spending limits for token approvals instead of accepting the default “unlimited” permissions. Revoke.cash and De.Fi’s Shield dashboard attorney consider approval ratings as routine hygiene in addition to using hardware wallets for long-term investing.

MetaMask enables standard Blockaid transaction security alerts, flagging suspicious contracts before executing signatures.

The Trust Wallet expansion incident reinforces the need for defense in depth. That exploit bypassed users’ decisions, and malicious code in an official Chrome list automatically collected keys.

Users who divided their assets between hardware wallets (cold storage), software wallets (warm transactions), and burner wallets (experimental protocols) limited exposure.

That three-tiered model creates friction, but friction is what matters. A phishing email that intercepts a burner wallet costs hundreds or several thousand dollars. The same attack on one wallet containing an entire wallet costs life-changing money.

The ZachXBT dish rack was successful because it addressed the line between convenience and safety. Most users keep everything in one MetaMask instance because managing multiple wallets feels cumbersome.

The attacker bet that a professional-looking email on New Year’s Day would catch enough people off guard to generate profitable volume. That bet paid off, with $107,000 and more.

See also  Telnyx expands Conversational AI Stack with new audio, TTS and integration options
MetaMask warns of three red flagsMetaMask warns of three red flags
MetaMask’s official guidelines identify three red flags for phishing: incorrect sender addresses, unsolicited urgent upgrade demands, and requests for secret recovery phrases or passwords.

What’s at stake?

This incident raises a deeper question: who bears responsibility for endpoint security in a self-protective world?

Wallet providers are building anti-phishing tools, researchers are publishing threat reports and regulators are warning consumers. Yet all the attacker needed was a fake email, a cloned logo, and a drainer contract to compromise hundreds of wallets.

The infrastructure that enables self-management, permissionless transactions, pseudonymous addresses, and irreversible transfers also makes it unforgiving.

The industry sees this as an educational problem: if users verified sender addresses, hovered over links, and revoked old approvals, attacks would fail.

Yet Chainalysis’s data on 158,000 compromises suggests that education alone does not scale. Attackers adapt faster than users learn. The MetaMask phishing email has evolved from the crude “Your wallet has been locked!” templates to sophisticated seasonal campaigns.

The Trust Wallet extension exploit proved that even cautious users can lose money when distribution channels are compromised.

What works: Hardware wallets for meaningful holdings, brutal withdrawal of approval, segregation of wallets based on risk profile, and skepticism towards unsolicited messages from wallet providers.

What doesn’t work: Assuming wallet interfaces are secure by default, treating approvals as one-time decisions, or consolidating all assets into a single hot wallet for convenience. The ZachXBT drain will be shut down as the address is flagged, and exchanges will freeze deposits.

But next week another dish rack will be launched with a slightly different template and a new contract
address.

The cycle continues until users realize that the ease of crypto creates an attack surface that is ultimately exploited. The choice is not between security and usability, but somewhat between friction now and loss later.

Mentioned in this article

Source link

Check updating
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

GetMentions AI launches AI visibility platform for brand mention execution

2026-04-23

Revenue crosses $20 billion mark with resilient growth of 3.1% in FY 26 in constant currency

2026-04-23

KL Rahul x Paul & Shark: the SS26 capsule signed by the famous Indian athlete

2026-04-23

Institutional infrastructure for digital assets: the maturation of yield routing and rail recovery

2026-04-23
Add A Comment

Comments are closed.

Top Posts

The US Treasury Department has imposed sanctions on Sinbad mixer, citing money laundering by North Korea’s Lazarus Group

2023-11-29

One Ethereum-based Altcoin is gearing up for ‘very strong’ performance, says trader – here’s his timeline

2023-09-27

Robinhood’s Crypto Revenue Skyrockets 700% in the middle of Bitcoin Boom

2025-02-13
Editors Picks

The price of XRP does not match its increasing use in the real world, research shows

2025-11-07

Notcoin rises by 14%: is another 80% rise on the cards for NOT?

2024-07-09

Solana (SOL) drops towards support – potential recovery base for bulls eye

2025-10-30

Animoca in preliminary talks to launch an IPO in a crypto-friendly region at a $6 billion valuation

2024-06-27

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Cryptocurrencies, Defi, NFT, Metaverse and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

ZetaChain hires Kimi and Alibaba Qwen as AI models go cross-chain

‘Most obvious Ponzi that ever existed’ – Peter Schiff criticizes Strategy’s STRC

‘Most obvious Ponzi that ever existed’ – Peter Schiff criticizes Strategy’s STRC

Get Informed

Subscribe to Updates

Get the latest news and Update from Bitcoin Platform about Crypto, Metaverse, NFT and more.

  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
© 2026 Bitcoinplatform.com - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.