Attackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases. The Mertamask domain uses typosquatting and urgency tactics to trick users. A fresh waveAttackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases. The Mertamask domain uses typosquatting and urgency tactics to trick users. A fresh wave

MetaMask Users Face New 2FA Phishing Scam, SlowMist Says

  • Attackers spoof MetaMask alerts and fake 2FA pages to steal seed phrases.
  • The Mertamask domain uses typosquatting and urgency tactics to trick users.

A fresh wave of phishing attempts is circling back toward MetaMask users, this time with a more polished and coordinated setup. SlowMist’s Chief Information Security Officer (CISO) has raised the alarm over a new scam framed as a “2FA verification,” built to look far more legitimate than earlier attacks.

This method mimics the official security flow and directs victims to fake websites, one of which is “Mertamask.” This is where many users become unprepared, as the interface and narrative appear to originate from MetaMask’s own system.

The scheme usually starts with a bogus security notice sent by email, warning of suspicious activity in a user’s wallet. The message wastes no time, urging the recipient to “verify” right away. However, instead of going to the official page, users are redirected to a deliberately similar Mertamask domain.

Small changes in the lettering are easy to miss, particularly when an urgent warning pushes someone into panic mode. Once they click through, victims land on a fake 2FA page outfitted with a countdown meant to heighten the pressure.

MetaMask fake WebsiteImage from X

MetaMask Users Tricked Into Handing Over Recovery Phrases

On the fake page, users are asked to follow seemingly logical steps. However, in the final stage, the site asks for a recovery phrase or seed phrase. This is where the scam’s core lies. MetaMask never asks for a seed phrase for verification, updates, or any other security reasons. Once the phrase is entered, control of the wallet is immediately transferred.

Not only that, the asset draining process is usually quick and silent, with victims only realizing it after their balances have been drastically reduced.

Interestingly, this approach marks a shift in the fraudsters’ focus. While previously many attacks relied on random messages or superficial visuals, now the visuals and flow are much more convincing.

Furthermore, psychological pressure has become a primary weapon. Threat narratives, time limits, and a professional appearance combine to make MetaMask users act reflexively, rather than rationally.

Malicious Contract Signatures Enable Silent Asset Theft

This fake 2FA scheme emerged amid a surge in other phishing attacks also targeting the EVM ecosystem. Recently, hundreds of EVM wallets, primarily MetaMask users, fell victim to fraudulent emails claiming a “mandatory update.”

In these cases, victims were not asked for their seed phrase but instead were lured into signing a malicious contract. Over $107,000 was stolen in small amounts from each wallet, a strategy that makes the theft difficult to detect individually. This pattern exploits the speed of transaction signatures, as opposed to direct seed phrase theft.

On the other hand, on December 9, we reported that MetaMask had expanded cross-chain exchanges through its Rango multi-chain routing infrastructure. What started with the EVM and Solana has now expanded to Bitcoin, giving users even broader cross-chain reach.

A few days earlier, on December 5, we also highlighted the direct integration of Polymarket into MetaMask Mobile, allowing users to participate in prediction markets without leaving the app and earn MetaMask Rewards.

Also, in late November, we covered the on-chain equity perpetual trading feature in MetaMask Mobile, which opens access to long and short positions on a variety of global assets with leverage options.

]]>
Market Opportunity
Scamcoin Logo
Scamcoin Price(SCAM)
$0.001078
$0.001078$0.001078
+0.74%
USD
Scamcoin (SCAM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.