Threat actors are increasingly leveraging cryptocurrency-themed phishing attacks to target users of popular crypto wallets such as MetaMask, Coinbase, Trezor, Ledger, and others. These attackers are using free hosting services like Gitbook and Webflow to create deceptive lure sites, often hosted on typo-squatter subdomains that resemble the legitimate wallet brands. For example, sites like “metamask—data-wallet.webflow[.]io” and “connected—-wallet.gitbook[.]io” are designed to look similar to real wallet pages, making it difficult for unsuspecting users to recognize the malicious intent behind them.
The phishing sites often lure potential victims with fake information about cryptocurrency wallets and offer download links that appear legitimate. However, these links lead users to malicious URLs designed to distribute malware or steal sensitive information. Some of these URLs function as Traffic Distribution Systems (TDS), which serve as intermediaries to redirect users to phishing content. If the TDS detects that a visitor is a security researcher or someone attempting to analyze the site, it may redirect them to benign content to avoid raising suspicion.
The tactic of using typo-squatting and misdirecting users through seemingly harmless content is a growing trend among cybercriminals targeting cryptocurrency users. As the popularity of digital wallets and cryptocurrency grows, these phishing campaigns are becoming more sophisticated, blending in with legitimate sites to increase their chances of success. The attackers are careful to avoid detection, ensuring that the phishing sites can still operate without being flagged by automated security systems.
To combat these attacks, users are urged to be cautious when accessing wallet-related websites and to always double-check URLs for any discrepancies or unusual subdomains. Additionally, cryptocurrency wallet providers and security experts are working to raise awareness about these ongoing threats. Ensuring that users are educated on recognizing phishing sites is essential in reducing the effectiveness of these sophisticated scam tactics.
Reference: