BlockBeats News, April 20th - SlowMist founder Cosmos posted on social media that earlier, the ENS chief developer fell victim to a phishing attack that exploited a vulnerability in Google's infrastructure. The phishing group sent out a phishing email disguised as an official Google communication, tricking users into believing they were under investigation. While Google has taken countermeasures, today the phishing group launched a new round of phishing attacks and will continue to lure users to a subdomain of "google.com," prompting them to disclose their account passwords and immediately add a Passkey.
BlockBeats previously reported that on April 16th, ENS chief developer nick.eth stated that he experienced a highly sophisticated phishing attack that exploited a vulnerability in Google's infrastructure, which Google refused to fix. He indicated that the attack email looked very authentic, could pass DKIM signature verification, and was displayed normally in Gmail, alongside other legitimate security alerts in the same thread. The attackers used Google's "sites" service to create a trusted "support portal" page, as users would see the domain name containing "google.com" and mistake it for being secure. Users should remain vigilant.
免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。