Attackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases. The Mertamask domain uses typosquatting and urgency tactics to trick users. A fresh waveAttackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases. The Mertamask domain uses typosquatting and urgency tactics to trick users. A fresh wave

MetaMask Users Face New 2FA Phishing Scam, SlowMist Says

  • Attackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases.
  • The Mertamask domain uses typosquatting and urgency tactics to trick users.

A fresh wave of phishing attempts is circling back toward MetaMask users, this time with a more polished and coordinated setup. SlowMist’s Chief Information Security Officer (CISO) has raised the alarm over a new scam framed as a “2FA verification,” built to look far more legitimate than earlier attacks.

This method mimics the official security flow and directs victims to fake websites, one of which is “Mertamask.” This is where many users become unprepared, as the interface and narrative appear to originate from MetaMask’s own system.

The scheme usually starts with a bogus security notice sent by email, warning of suspicious activity in a user’s wallet. The message wastes no time, urging the recipient to “verify” right away. However, instead of going to the official page, users are redirected to a deliberately similar Mertamask domain.

Small changes in the lettering are easy to miss, particularly when an urgent warning pushes someone into panic mode. Once they click through, victims land on a fake 2FA page outfitted with a countdown meant to heighten the pressure.

MetaMask fake WebsiteImage from X

MetaMask Users Tricked Into Handing Over Recovery Phrases

On the fake page, users are asked to follow seemingly logical steps. However, in the final stage, the site asks for a recovery phrase or seed phrase. This is where the scam’s core lies. MetaMask never asks for a seed phrase for verification, updates, or any other security reasons. Once the phrase is entered, control of the wallet is immediately transferred.

Not only that, the asset draining process is usually quick and silent, with victims only realizing it after their balances have been drastically reduced.

Interestingly, this approach marks a shift in the fraudsters’ focus. While previously many attacks relied on random messages or superficial visuals, now the visuals and flow are much more convincing.

Furthermore, psychological pressure has become a primary weapon. Threat narratives, time limits, and a professional appearance combine to make MetaMask users act reflexively, rather than rationally.

Malicious Contract Signatures Enable Silent Asset Theft

This fake 2FA scheme emerged amid a surge in other phishing attacks also targeting the EVM ecosystem. Recently, hundreds of EVM wallets, primarily MetaMask users, fell victim to fraudulent emails claiming a “mandatory update.”

In these cases, victims were not asked for their seed phrase but instead were lured into signing a malicious contract. Over $107,000 was stolen in small amounts from each wallet, a strategy that makes the theft difficult to detect individually. This pattern exploits the speed of transaction signatures, as opposed to direct seed phrase theft.

On the other hand, on December 9, we reported that MetaMask had expanded cross-chain exchanges through its Rango multi-chain routing infrastructure. What started with the EVM and Solana has now expanded to Bitcoin, giving users even broader cross-chain reach.

A few days earlier, on December 5, we also highlighted the direct integration of Polymarket into MetaMask Mobile, allowing users to participate in prediction markets without leaving the app and earn MetaMask Rewards.

Also, in late November, we covered the on-chain equity perpetual trading feature in MetaMask Mobile, which opens access to long and short positions on a variety of global assets with leverage options.

]]>
Market Opportunity
Scamcoin Logo
Scamcoin Price(SCAM)
$0.00108
$0.00108$0.00108
-0.09%
USD
Scamcoin (SCAM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Solana Price Outlook: Long-Term Bull Flags Clash With Short-Term Risk

Solana Price Outlook: Long-Term Bull Flags Clash With Short-Term Risk

TLDR Solana price trades within a multi-year ascending triangle, signaling prolonged compression before expansion. Monthly bull flag structure supports long-term
Share
Coincentral2026/01/08 12:46
TrendX Taps Trusta AI to Develop Safer and Smarter Web3 Network

TrendX Taps Trusta AI to Develop Safer and Smarter Web3 Network

The purpose of collaboration is to advance the Web3 landscape by combining the decentralized infrastructure of TrendX with AI-led capabilities of Trusta AI.
Share
Blockchainreporter2025/09/18 01:07
Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

The post Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued appeared on BitcoinEthereumNews.com. American-based rock band Foreigner performs onstage at the Rosemont Horizon, Rosemont, Illinois, November 8, 1981. Pictured are, from left, Mick Jones, on guitar, and vocalist Lou Gramm. (Photo by Paul Natkin/Getty Images) Getty Images Singer Lou Gramm has a vivid memory of recording the ballad “Waiting for a Girl Like You” at New York City’s Electric Lady Studio for his band Foreigner more than 40 years ago. Gramm was adding his vocals for the track in the control room on the other side of the glass when he noticed a beautiful woman walking through the door. “She sits on the sofa in front of the board,” he says. “She looked at me while I was singing. And every now and then, she had a little smile on her face. I’m not sure what that was, but it was driving me crazy. “And at the end of the song, when I’m singing the ad-libs and stuff like that, she gets up,” he continues. “She gives me a little smile and walks out of the room. And when the song ended, I would look up every now and then to see where Mick [Jones] and Mutt [Lange] were, and they were pushing buttons and turning knobs. They were not aware that she was even in the room. So when the song ended, I said, ‘Guys, who was that woman who walked in? She was beautiful.’ And they looked at each other, and they went, ‘What are you talking about? We didn’t see anything.’ But you know what? I think they put her up to it. Doesn’t that sound more like them?” “Waiting for a Girl Like You” became a massive hit in 1981 for Foreigner off their album 4, which peaked at number one on the Billboard chart for 10 weeks and…
Share
BitcoinEthereumNews2025/09/18 01:26