PANews reported on April 16 that ENS developer nick.eth posted a warning that it had recently encountered a highly simulated phishing attack. The attacker exploited a vulnerability in Google's infrastructure, disguised it as an official email and bypassed DKIM verification. The email was sent from [email protected] and was deemed safe by Gmail. The embedded link in the email pointed to a phishing page under the "google.com" subdomain, guiding users to enter a simulated login interface to steal credentials. nick.eth called on users to be vigilant and not to trust the appearance of domain names.
nick.eth was exposed to a phishing attack imitating Google official website, warning users to beware of "legitimate domain name trap"
- 2025-05-11
GMGN Lianchuang: In certain scenarios, users will suffer losses when trading BSC's DOOD tokens, which are being repaired and will be compensated
- 2025-05-11
Gate.io MemeBox has launched BERRY, GOAT, and MOODENG
- 2025-05-11
USDT0 is now integrated into Hyperliquid
- 2025-05-11
sns.sol: SNS token airdrop allocation query is now open
- 2025-05-11
Gate.io MemeBox has launched USELESS, moonpig, Momcoin, Pookie, diarrhea
- 2025-05-11
SlowMist Cosine: A user lost more than 20,000 US dollars due to mistakenly entering a phishing website recommended by Chrome