It would appear that users of the popular Ethereum network interface MyEtherWallet have recently been targeted by an attempted phishing scam.
As detailed in MyEtherWallet’s official Twitter page, a phishing email is being circulated by a questionable correspondence among users of the open-source interface, claiming that MyEtherWallet has recently incurred a DNS attack, subsequently prompting users to provide personal information to secure their account.
According to the fraudulent email which was purportedly sent to only specific users, the interface has been hijacked sometime this month, thereby compromising user data, and as such, users are now being prompted to sign in their wallets by entering their private Keys or mnemonic phrases, allowing hackers to gain access to highly sensitive data.
The MyEtherWallet (MEW) team has since alerted users of the phishing scam via Twitter, warning that such fraudulent emails were designed to hoodwink users into disclosing their private keys. Published February 4, the tweet contains a screenshot of the shady email.
As the fraudulent email further noted, only MEW users who have received the email were affected by the supposed DNS attack. The correspondence went on prompting users to visit a website and download their Keystore file, after which, they are then urged to respond to the email for further instructions on securing their wallet accounts.
The email ended with a stern warning, stating:
“If you do not update and secure your wallet, you are running the risk of losing your funds stored on your wallet.”
MyEtherWallet has since addressed the fraudulent scam, encouraging MEW users to be skeptical of such phishing attacks, clarifying that the MEW team would neither send such emails nor would it require users to disclose their private keys.
The announcement has since sparked a thread among Twitter followers, reacting to the equally underhanded and outdated tactics employed by those behind the scam.
As one Twitter user noted:
The scam draws on previous MyEtherWallet security compromises to give it an air of legitimacy. A similar DNS attack to that detailed in the email occurred last year against the blockchain interface program. Many of those unlucky enough to fall victim to the security issue last April found that the Ether and other tokens stored using the MEW service were stolen by those behind the attack.
This would not be the first time such phishing scams have targeted users of crypto trading platforms, as evidenced by other previous reports. Earlier in January, a number of users of the peer-to-peer Bitcoin trading website LocalBitcoins have also fallen victim to a similar phishing attack that stole their login credentials, resulting in the loss of roughly $28,000 worth of Bitcoin.