Users of Crypto Wallets Electrum and MyEtherWallet Face Phishing Attacks

Users of cryptocurrency wallets Electrum and MyEtherWallet are currently facing phishing attacks, according to posts published on Reddit and Twitter on Feb. 4.

A phishing attack is an attempt to obtain sensitive data like users’ personal or banking information by illicit means, wherein an attacker is disguised as a trusted entity and sends a user a message or an email containing a malicious link. Once clicked, the link asks the user to enter their personal data or initiates the installation of malware.

On Feb. 4, the team behind MyEtherWallet tweeted a warning about a phishing email that was sent to users, asking them to divulge personal information.

One user on Reddit found that a phishing scam attempting to steal sensitive data from Electrum customers was posing as a security update. Redditor exa61 posted a picture of a system message, allegedly from Electrum wallet, requiring a security update to Electrum 4.0.0, while the latest version of the wallet is currently Electrum 3.3.3.

In the thread, one user pointed out that it was “the second cluster of reports of the same phishing, and the first one was at the end of December 2018,” adding that the would-be hacker could have “100 GitHub accounts.”

Electrum subsequently published a warning on their website, notifying that “versions of Electrum older than 3.3.3 are vulnerable to a phishing attack, where malicious servers are able to display a message asking users to download a fake version of Electrum.” The company warned its users to not download software updates from other sources.

Recently, an unidentified hacker or hacker group purportedly detected a security vulnerability in the LocalBitcoins forum and linked it to a phishing forum. In a Reddit post published by the community manager, LocalBitcoins claimed that the identified vulnerability had been contained in third-party software, and confirmed six known cases of users being affected.

Main, News

Leave a Reply

Your email address will not be published. Required fields are marked *