ENS developer nick eth was hit by a highly camouflaged phishing attack related to a Google vulnerability

robot
Abstract generation in progress

Wu learned that ENS core developer nick eth suffered a highly sophisticated phishing attack that exploited two unfixed vulnerabilities in Google's infrastructure to bypass DKIM verification and pass a Gmail security warning, disguised as a real Google Security Alert email. Attackers use Google Sites to build fake "support pages" to trick users into logging in and steal credentials. Nick ETH said that he had reported the issue to Google, but was replied that it "works as expected", and Google refused to fix the logic vulnerability, which could be frequent in the future.

View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments