Friday, November 15, 2024
HomeEthereumweblog.ethereum.org mailing checklist incident | Ethereum Basis Weblog

weblog.ethereum.org mailing checklist incident | Ethereum Basis Weblog


On 2024-06-23, 00:19 AM UTC, a phishing electronic mail was despatched out to 35,794 electronic mail addresses by updates@weblog.ethereum.org with the next content material

Customers who clicked the hyperlink within the electronic mail had been despatched to a malicious web site:

This web site had a crypto drainer working within the background, and if a person initiated their pockets and signed the transaction requested by their web site their pockets would have been drained.

Our inner safety crew instantly launched an investigation to assist decide who launched the assault, what the purpose of the assault was, when it occurred, who was affected, and the way it occurred.

A number of the intial actions taken had been:

  • Prevented the menace actor from sending extra emails.
  • Despatched out notifications by way of twitter and electronic mail to not click on the hyperlink in query.
  • Closed down the malicious entry path the menace actor had used to acquire entry into the mailing checklist supplier.
  • Submitted the malicious hyperlink to varied blacklists, and it was then blocked by majority of web3 pockets suppliers and cloudflare.

Our investigation into the assault confirmed that:

  • The menace actor imported a big electronic mail checklist of their very own into the mailing checklist platform for use for the phishing marketing campaign.
  • The menace actor exported the weblog mailing checklist electronic mail addresses, which was a complete of 3759 electronic mail addresses.
  • Once we in contrast the emails within the electronic mail checklist that the menace actor had imported, we may see that the weblog mailing checklist contained 81 electronic mail addresses that the menace actor didn’t beforehand have data of, and the remainder had been duplicate addresses.
  • Analyzing on-chain transactions made to the menace actor between the time they despatched out the e-mail marketing campaign and the time the malicious area obtained blocked, seem to indicate that no victims misplaced funds throughout this particular marketing campaign despatched by the menace actor.

As we proceed engaged on this incident, we’ve got taken extra measures equivalent to migrating some mail companies to different suppliers, to additional assist scale back the chance of this taking place once more.

We’re deeply sorry that this incident occurred, and are working diligently with each our inner safety crew in addition to exterior safety groups to additional assist handle and examine this incident.

Any questions will be directed to safety@ethereum.org.



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments