Close Menu
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain
  • Web 3
    • NFT
    • Metaverse
  • Regulation
  • Analysis
  • Learn
  • Blog
What's Hot

Bitcoin Play signals at $138 million are driving a shift in sentiment around large amounts

2026-04-23

Bitcoin Reaches $78,000 – All Eyes on $80,700 Cost Base?

2026-04-23

Bitcoin Price Recovery Accelerates, Traders See Strong Upside Continuation

2026-04-23
Facebook X (Twitter) Instagram
  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
Facebook X (Twitter) Instagram
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
  • News
    • Bitcoin
    • Altcoins
    • DeFi
    • Market Cap
  • Blockchain

    0G Foundation and Alibaba Cloud Partner Bring Qwen LLM’s Onchain

    2026-04-22

    W3.io partners with Space and Time to deliver an end-to-end proof layer for AI-driven financial workflows

    2026-04-22

    The quantum threat is getting closer

    2026-04-22

    Multichainz Integrates CHAINZ Token on Fjord Foundry Launchpad to Increase RWA Lending Opportunities for Web3 Communities

    2026-04-22

    Singapore’s OCBC launches tokenized gold fund on Ethereum and Solana

    2026-04-22
  • Web 3
    • NFT
    • Metaverse
  • Regulation

    Banks Fund Crypto Attack Ads in Washington, as More Than 3,000 Banks Unite to Stop the Clarity Act from Passing the Senate

    2026-04-21

    Have rate refunds been purchased at 20 cents on the dollar by Cantor Fitzgerald, a stablecoin-backed Treasurys custodian?

    2026-04-21

    Crypto will enter the US banking system through a backdoor, not through regulation

    2026-04-18

    Congress is about to make regulated dollar stablecoins function almost like digital money

    2026-04-18

    Why Kevin Warsh Could Be Bitcoin’s Most Influential Fed Chairman

    2026-04-18
  • Analysis

    Bitcoin Price Recovery Accelerates, Traders See Strong Upside Continuation

    2026-04-23

    Neem deel aan de strijd om voorspellingsapps om te zetten in non-stop casino’s met hefboomwerking

    2026-04-22

    Japan Gets Into XRP, But Can It Push The Price To $10?

    2026-04-22

    Crypto is leading the race to build the ultimate gambling super app

    2026-04-22

    Crypto analyst predicts more Bitcoin rallies as long as the price remains above the crucial level – here is his positive target

    2026-04-22
  • Learn

    Wall Street won’t stop buying. Bitcoin will not break out. What gives?

    2026-04-20

    Changelly launches ultimate DeFi Swap Flow and API for cross-chain and on-chain swaps

    2026-04-18

    What Is Etherscan? How to Use the Ethereum Block Explorer

    2026-04-17

    What Is a Crypto Faucet and How Does It Work?

    2026-04-17

    Crypto Bubbles Explained

    2026-04-17
  • Blog
Bitcoin Platform – Bitcoin | Altcoins | Blockchain | News Stories Updated Daily
Home»Web 3»What to Check Before ‘Updating’
Web 3

What to Check Before ‘Updating’

2026-01-03No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

On-chain security researcher ZachXBT noted that hundreds of wallets across multiple EVM chains were being emptied for small amounts of money, typically less than $2,000 per victim, which were funneled to a single suspicious address.

Total thefts rose above $107,000 and continued to rise. The cause is still unknown, but users reported receiving a phishing email disguised as a mandatory MetaMask upgrade, complete with a fox logo with a party hat and a “Happy New Year!” subject line.

This attack occurred when developers were on vacation, support channels had a skeleton crew, and users were scrolling through their inboxes crammed with New Year’s promotions.

Attackers abuse that window. The small amounts per victim suggest that in many cases the drainer is operating outside contract approvals rather than making full compromises, keeping individual losses below the threshold where victims immediately raise alarm but allowing the attacker to cover hundreds of wallets.

The industry is still processing a separate Trust Wallet browser extension incident in which malicious code in the Chrome extension v2.68 collected private keys and leaked at least $8.5 million from 2,520 wallets before Trust Wallet was patched to v2.69.

Two different exploits, same lesson: user endpoints remain the weakest link.

Anatomy of a phishing email that works

The MetaMask-themed phishing email shows why these attacks succeed.

The sender’s identity shows ‘MetaLiveChain’, a name that sounds vaguely DeFi-adjacent, but has no connection to MetaMask.

The email header contains an unsubscribe link for “[email protected]”, showing that the attacker took templates from legitimate marketing campaigns. The body features MetaMask’s fox logo wearing a party hat, mixing seasonal cheer with manufactured urgency about a “mandatory update.”

That combination bypasses the heuristics that most users apply to obvious scams.

Phishing scams sent to empty wallets
The phishing email imitates MetaMask with a party hat-fox logo, falsely claiming that a “mandatory” 2026 system upgrade is required for account access.

MetaMask’s official security documentation sets clear rules. Support emails only come from verified addresses, such as [email protected]and never from third-party domains.

The wallet provider does not send unsolicited emails requesting verification or upgrades.

See also  Earn 3,777 XRP! Bjmining attracts a wave of XRP -whales

Furthermore, no representative will ever ask for a secret recovery phrase. Yet these emails work because they exploit the gap between what users know intellectually and what they reflexively do when an official-looking message arrives.

Four signals expose phishing before damage occurs.

First, the sender brand mismatch, as the MetaMask branding of “MetaLiveChain” signals template theft. Second, manufactured urgency around mandatory updates that MetaMask explicitly says it won’t send.

Third, destination URLs that don’t match claimed domains will show the actual destination if you hover over them before clicking. Fourth, requests that violate core wallet rules, such as asking for seed phrases or asking for signatures on opaque off-chain messages.

The ZachXBT case demonstrates distinctive phishing mechanisms. Victims who clicked on the fake upgrade link likely signed a contract approval granting the drainer permission to move tokens.

That one signature opened the door to continued theft at multiple chains. The attacker opted for small amounts per wallet because contract approvals often come with unlimited spending limits by default, but emptying everything would result in immediate investigations.

Spreading theft to hundreds of victims at $2,000 each flies under the individual radar as the total reaches six figures.

Withdraw approvals and reduce blast radius

Once a phishing link is clicked or a malicious endorsement is signed, the priority shifts to containment. MetaMask now allows users to view and revoke token permissions directly in MetaMask Portfolio.

Revoke.cash guides users through a simple process: connect your wallet, inspect approvals by network, and send revocation transactions for untrusted contracts.

Etherscan’s Token Approvals page provides the same functionality for manually revoking ERC-20, ERC-721, and ERC-1155 approvals. These tools are important because victims who act quickly can cut off access to the dish drainer before they lose everything.

The distinction between Endorsement Compromise and Seed-Phrase Compromise determines whether a wallet can be saved. MetaMask’s security guide draws a hard line: If you suspect your secret recovery phrase has been exposed, stop using that wallet immediately.

BC gameBC game

Create a new wallet on a new device, transfer the remaining assets, and treat the original seed as permanently burned. Revoking approvals helps when the attacker only has contract rights; if your seed is gone, the whole wallet must be left behind.

See also  Hayes' Zcash 'Vibe Check' gives 30% Moonshot

Chainalysis documented roughly 158,000 personal wallet compromises affecting at least 80,000 people in 2025, even as the total stolen value fell to approximately $713 million.

Chain analysis data about drainsChain analysis data about drains
The share of personal wallet losses in total crypto theft has increased from around 10% in 2022 to almost 25% in 2025, according to data from Chainalysis.

Attackers are hitting more wallets for smaller amounts, the pattern ZachXBT has identified. The practical implication: organizing wallets to limit blast radius is as important as avoiding phishing.

A single compromised wallet does not have to lead to a total wallet loss.

Building a defense in depth

Wallet providers have provided features that could have stopped this attack had they been adopted.

MetaMask now encourages setting spending limits for token approvals instead of accepting the default “unlimited” permissions. Revoke.cash and De.Fi’s Shield dashboard attorney consider approval ratings as routine hygiene in addition to using hardware wallets for long-term investing.

MetaMask enables standard Blockaid transaction security alerts, flagging suspicious contracts before executing signatures.

The Trust Wallet expansion incident reinforces the need for defense in depth. That exploit bypassed users’ decisions, and malicious code in an official Chrome list automatically collected keys.

Users who divided their assets between hardware wallets (cold storage), software wallets (warm transactions), and burner wallets (experimental protocols) limited exposure.

That three-tiered model creates friction, but friction is what matters. A phishing email that intercepts a burner wallet costs hundreds or several thousand dollars. The same attack on one wallet containing an entire wallet costs life-changing money.

The ZachXBT dish rack was successful because it addressed the line between convenience and safety. Most users keep everything in one MetaMask instance because managing multiple wallets feels cumbersome.

The attacker bet that a professional-looking email on New Year’s Day would catch enough people off guard to generate profitable volume. That bet paid off, with $107,000 and more.

See also  We are NOT all going to jail! (For now)
MetaMask warns of three red flagsMetaMask warns of three red flags
MetaMask’s official guidelines identify three red flags for phishing: incorrect sender addresses, unsolicited urgent upgrade demands, and requests for secret recovery phrases or passwords.

What’s at stake?

This incident raises a deeper question: who bears responsibility for endpoint security in a self-protective world?

Wallet providers are building anti-phishing tools, researchers are publishing threat reports and regulators are warning consumers. Yet all the attacker needed was a fake email, a cloned logo, and a drainer contract to compromise hundreds of wallets.

The infrastructure that enables self-management, permissionless transactions, pseudonymous addresses, and irreversible transfers also makes it unforgiving.

The industry sees this as an educational problem: if users verified sender addresses, hovered over links, and revoked old approvals, attacks would fail.

Yet Chainalysis’s data on 158,000 compromises suggests that education alone does not scale. Attackers adapt faster than users learn. The MetaMask phishing email has evolved from the crude “Your wallet has been locked!” templates to sophisticated seasonal campaigns.

The Trust Wallet extension exploit proved that even cautious users can lose money when distribution channels are compromised.

What works: Hardware wallets for meaningful holdings, brutal withdrawal of approval, segregation of wallets based on risk profile, and skepticism towards unsolicited messages from wallet providers.

What doesn’t work: Assuming wallet interfaces are secure by default, treating approvals as one-time decisions, or consolidating all assets into a single hot wallet for convenience. The ZachXBT drain will be shut down as the address is flagged, and exchanges will freeze deposits.

But next week another dish rack will be launched with a slightly different template and a new contract
address.

The cycle continues until users realize that the ease of crypto creates an attack surface that is ultimately exploited. The choice is not between security and usability, but somewhat between friction now and loss later.

Mentioned in this article

Source link

Check updating
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The Elmet Group Co. announces pricing for a larger IPO

2026-04-22

Tredence puts enterprise AI into action with Google Cloud’s Gemini-powered Agentic Accelerators

2026-04-22

Apparel Group strengthens digital footprint with the launch of ALDO app for the Indian market

2026-04-22

CEX.IO selects OpenPayd to enable real-time settlements for institutional clients

2026-04-22
Add A Comment

Comments are closed.

Top Posts

Yes! Can we have a little privacy, please?

2024-04-10

Interest in Bitcoin spot ETF wanes: Blame memecoin mania?

2024-03-31

Bitcoin Loses $716 Billion Since ATH – Here’s What’s Weighing on BTC

2025-12-22
Editors Picks

Tornado Cash Founders Accused of Laundering Over $1 Billion

2023-08-23

Dungeons & Dragons publisher tightens guidelines for artists after AI art found in book

2023-08-06

Real value gap suggests that the Bitcoin price is going higher, but watch out for this crash

2025-09-08

Is web3’s innovative explosion limiting user adoption?

2024-07-22

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Cryptocurrencies, Defi, NFT, Metaverse and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Bitcoin Play signals at $138 million are driving a shift in sentiment around large amounts

Bitcoin Reaches $78,000 – All Eyes on $80,700 Cost Base?

Bitcoin Price Recovery Accelerates, Traders See Strong Upside Continuation

Get Informed

Subscribe to Updates

Get the latest news and Update from Bitcoin Platform about Crypto, Metaverse, NFT and more.

  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Advertise
© 2026 Bitcoinplatform.com - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.