Timeline of the Web3 protocol mass phishing campaign

Timeline of the Web3 protocol mass phishing campaign


On January 23, users of several Web3 protocols and companies were hit by a massive phishing campaign by fraudsters. More than $580,000 worth of crypto has been lost so far in the attack, which used emails sent from WalletConnect, Token Terminal, Social.Fi and De.Fi, as well as official Cointelegraph email addresses.

Here's a timeline of what happened:

10:03 am UTC: WalletConnect has announced that its users are receiving malicious emails: “We are aware of an email that appears to be sent from an email address associated with WalletConnect, asking recipients to open a link so they can claim it.” Airdrop We can confirm that this email does not originate directly from WalletConnect or any of WalletConnect's affiliates, and that the link appears to lead to a malicious site.

The WalletConnect team said it is working with a blockchain security firm to determine how the attacker obtained the team's email domain. Blockaid then shared the report from its own X account.

okex

10:11 am UTC: Cointelegraph has been notified by Telegram that its official email address is sending scam emails to subscribers. Cointelegraph employees began reporting internally that they had received a malicious email. The message (screenshot below) claims to be “10th Anniversary Web3 Exclusive Airdrop” and links to a malicious protocol.

A malicious email was sent from an official Cointelegraph email address. Source: Cointelegraph

The Scientelegraph Information Technology Department was immediately notified of the problem and, in turn, contacted the company's email provider, MailerLite, to find out the cause. Meanwhile, the IT team successfully blocked the malicious links and prevented them from being sent to anyone else.

Cointelegraph also cautioned that the weather posted on X's other social media platforms is not advertising and that users should not click on links from emails.

11:00 AM UTC: Cointelegraph became aware of the WalletConnect report and began an investigation, contacting Blockcaid for more information. Not long ago, security sleuth ZachXBT reported on Telegram that the phishing attacks came from “CoinTelegraph, WalletConnect, Token Terminal and De.Fi.”

11:41 am UTC: Cointelegraph reported on the hack.

1:34 pm UTC: Cyber ​​security service Hudson's Rock released a report saying it found malware on a computer belonging to an employee of MailerLite, which is used by all websites that send malicious emails. Hudson Rock says this malware may have allowed the attacker access to MailerLite's servers, which explains how the phishing campaign occurred. Cointelegraph has updated its coverage to include Hudson Rock's claims.

According to the report, Hudson's Rock researchers recently identified a MailerLite employee computer with access to sensitive URLs within MailerLite and its third parties. The computer had to obtain login credentials for the URL admin.mailerlite.com/admin, which appears to be the MailerLite staff login page.

In addition, the computer contains valid cookies for Slack.com and Office365, which can be used to perform session hijacking to obtain personal information. The cyber security firm said it had obtained an image of the user's desktop at the time of the attack, which it said “had problems when trying to execute the infected software.”

b936b1fe 6323 4836 971f 560344fea64c
Image of a MailerLite employee's PC case at the time of the attack. Source: Hudson Rock

Hudson Rock cautioned that this evidence does not prove that the phishing campaign was caused by this malware infection, as it is “uncertain whether MailerLite was exposed to an exploit or not.” However, the evidence “shows how a single InfoStellar infection can affect any company” and offers a plausible hypothesis as to how the phishing campaign might have played out.

4:55 pm UTC: Blockaid released a report on the results of the investigation, saying the attacker “used a vulnerability in the email service provider Mailer Lite to impersonate Web3 companies and extort $600,000.”

Cointelegraph reached out to MailerLite, which responded that it is currently conducting its own investigation. At the time of publication, the report has not yet been submitted.



Leave a Reply

Pin It on Pinterest