BlockBeats News, April 20th - SlowMist founder Cosmos posted on social media that earlier, the ENS chief developer fell victim to a phishing attack that exploited a vulnerability in Google's infrastructure. The phishing group sent out a phishing email disguised as an official Google communication, tricking users into believing they were under investigation. While Google has taken countermeasures, today the phishing group launched a new round of phishing attacks and will continue to lure users to a subdomain of "google.com," prompting them to disclose their account passwords and immediately add a Passkey.
BlockBeats previously reported that on April 16th, ENS chief developer nick.eth stated that he experienced a highly sophisticated phishing attack that exploited a vulnerability in Google's infrastructure, which Google refused to fix. He indicated that the attack email looked very authentic, could pass DKIM signature verification, and was displayed normally in Gmail, alongside other legitimate security alerts in the same thread. The attackers used Google's "sites" service to create a trusted "support portal" page, as users would see the domain name containing "google.com" and mistake it for being secure. Users should remain vigilant.
免責聲明:投資有風險,本文並非投資建議,以上內容不應被視為任何金融產品的購買或出售要約、建議或邀請,作者或其他用戶的任何相關討論、評論或帖子也不應被視為此類內容。本文僅供一般參考,不考慮您的個人投資目標、財務狀況或需求。TTM對信息的準確性和完整性不承擔任何責任或保證,投資者應自行研究並在投資前尋求專業建議。