ENS lead developer suffers phishing attack due to Google infrastructure vulnerability that has not yet been fixed

This article is machine translated
Show original

According to ChainCatcher, ENS chief developer nick.eth posted on a social platform that he experienced an extremely complex phishing attack that exploited a vulnerability in Google's infrastructure, which Google refused to fix.

He explained that the attack email looked very authentic, could pass DKIM signature verification, was displayed normally by GMail, and was placed in the same conversation as other legitimate security warnings. The attackers utilized Google's "Sites" service to create a trusted "support portal" page, as users would see the domain containing "google.com" and mistakenly believe it was safe, urging users to remain cautious.

Sector:
Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments