Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    MiCA deadline, CLARITY Act, and UK/JP hardening

    April 22, 2026

    Justin Sun goes to war with World Liberty Financial

    April 22, 2026

    Shipping an L1 zkEVM #2: The Security Foundations

    April 22, 2026
    Facebook X (Twitter) Instagram YouTube
    X (Twitter) Instagram YouTube LinkedIn
    Block Hub News
    • Lithosphere News Releases
    • Altcoins
      • Bitcoin
      • Coinbase
      • Litecoin
    • Crypto
    • Ethereum
    • Blockchain
    Block Hub News
    You are at:Home » blog.ethereum.org mailing list incident | Ethereum Foundation Blog
    Ethereum

    blog.ethereum.org mailing list incident | Ethereum Foundation Blog

    Olivia MartinezBy Olivia MartinezMarch 20, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    On 2024-06-23, 00:19 AM UTC, a phishing email was sent out to 35,794 email addresses by [email protected] with the following content

    Users who clicked the link in the email were sent to a malicious website:

    This website had a crypto drainer running in the background, and if a user initiated their wallet and signed the transaction requested by their website their wallet would have been drained.

    Our internal security team immediately launched an investigation to help determine who launched the attack, what the aim of the attack was, when it happened, who was affected, and how it happened.

    Some of the intial actions taken were:

    • Prevented the threat actor from sending additional emails.
    • Sent out notifications via twitter and email to not click the link in question.
    • Closed down the malicious access path the threat actor had used to obtain access into the mailing list provider.
    • Submitted the malicious link to various blacklists, and it was then blocked by majority of web3 wallet providers and cloudflare.

    Our investigation into the attack showed that:

    • The threat actor imported a large email list of their own into the mailing list platform to be used for the phishing campaign.
    • The threat actor exported the blog mailing list email addresses, which was a total of 3759 email addresses.
    • When we compared the emails in the email list that the threat actor had imported, we could see that the blog mailing list contained 81 email addresses that the threat actor did not previously have knowledge of, and the rest were duplicate addresses.
    • Analyzing on-chain transactions made to the threat actor between the time they sent out the email campaign and the time the malicious domain got blocked, appear to show that no victims lost funds during this specific campaign sent by the threat actor.

    As we continue working on this incident, we have taken additional measures such as migrating some mail services to other providers, to further help reduce the risk of this happening again.

    We are deeply sorry that this incident occurred, and are working diligently with both our internal security team as well as external security teams to further help address and investigate this incident.

    Any questions can be directed to [email protected].



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGold slides below $4.5k, crypto is bleeding, and “store of value” myths are cracking
    Next Article DeFi projects hit by fresh wave of front-end attacks
    Olivia Martinez

    Related Posts

    Shipping an L1 zkEVM #2: The Security Foundations

    April 22, 2026

    Allocation Update – Q4 2025

    April 22, 2026

    Trillion Dollar Security Day at Devconnect

    April 22, 2026
    Leave A Reply Cancel Reply

    Demo
    Latest Posts

    MiCA deadline, CLARITY Act, and UK/JP hardening

    April 22, 20261 Views

    Justin Sun goes to war with World Liberty Financial

    April 22, 20261 Views

    Shipping an L1 zkEVM #2: The Security Foundations

    April 22, 20260 Views

    Lithosphere Integrates DNNS as Programmable Identity Layer in Makalu Environment

    April 22, 20260 Views
    Don't Miss

    Synthetix price forms compression as buyback plan emerges

    By James WilsonMarch 16, 2026

    Synthetix price moved slightly higher as the project published its roadmap for 2026, which includes…

    Here’s why StakeStone price exploded 136% to new ATH

    April 1, 2026

    Lithic Powers the Next Generation of Web4 Infrastructure

    March 16, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    MiCA deadline, CLARITY Act, and UK/JP hardening

    April 22, 2026

    Justin Sun goes to war with World Liberty Financial

    April 22, 2026

    Shipping an L1 zkEVM #2: The Security Foundations

    April 22, 2026
    Most Popular

    Synthetix price forms compression as buyback plan emerges

    March 16, 202611 Views

    Here’s why StakeStone price exploded 136% to new ATH

    April 1, 20269 Views

    Lithic Powers the Next Generation of Web4 Infrastructure

    March 16, 20266 Views
    © 2026 - 2026

    Type above and press Enter to search. Press Esc to cancel.