PANews reported on April 16 that ENS developer nick.eth posted a warning that it had recently encountered a highly simulated phishing attack. The attacker exploited a vulnerability in Google's infrastructure, disguised it as an official email and bypassed DKIM verification. The email was sent from no-reply@google.com and was deemed safe by Gmail. The embedded link in the email pointed to a phishing page under the "google.com" subdomain, guiding users to enter a simulated login interface to steal credentials. nick.eth called on users to be vigilant and not to trust the appearance of domain names.
nick.eth was exposed to a phishing attack imitating Google official website, warning users to beware of "legitimate domain name trap"
Share to:
Author: PA一线
This content is for informational purposes only and does not constitute investment advice.
Follow PANews official accounts, navigate bull and bear markets together
Recommended Reading
