The post What to check before you ‘update’ appeared on BitcoinEthereumNews.com. On-chain security researcher ZachXBT flagged hundreds of wallets across multipleThe post What to check before you ‘update’ appeared on BitcoinEthereumNews.com. On-chain security researcher ZachXBT flagged hundreds of wallets across multiple

What to check before you ‘update’

On-chain security researcher ZachXBT flagged hundreds of wallets across multiple EVM chains getting drained for small amounts, typically under $2,000 per victim, funneling into a single suspicious address.

The theft total climbed past $107,000 and kept rising. The root cause is still unknown, but users reported receiving a phishing email disguised as a mandatory MetaMask upgrade, complete with a party-hat fox logo and a “Happy New Year!” subject line.

This attack arrived when developers were on holiday, support channels were running skeleton crews, and users were scrolling through inboxes cluttered with New Year promotions.

Attackers exploit that window. The small per-victim amounts suggest the drainer operates off contract approvals rather than full seed-phrase compromise in many cases, which keeps individual losses below the threshold where victims immediately sound alarms but allows the attacker to scale across hundreds of wallets.

The industry is still processing a separate Trust Wallet browser extension incident in which malicious code in Chrome extension v2.68 harvested private keys and drained at least $8.5 million from 2,520 wallets before Trust Wallet patched to v2.69.

Two different exploits, same lesson: user endpoints remain the weakest link.

Anatomy of a phishing email that works

The MetaMask-themed phishing email demonstrates why these attacks succeed.

The sender identity shows “MetaLiveChain,” a name that sounds vaguely DeFi-adjacent but has no connection to MetaMask.

The email header contains an unsubscribe link for “[email protected],” revealing that the attacker lifted templates from legitimate marketing campaigns. The body features MetaMask’s fox logo wearing a party hat, blending seasonal cheer with manufactured urgency about a “mandatory update.”

That combination bypasses the heuristics most users apply to obvious scams.

The phishing email impersonates MetaMask with a party-hat fox logo, falsely claiming a “mandatory” 2026 system upgrade is required for account access.

MetaMask’s official security documentation establishes clear rules. Support emails come only from verified addresses, such as [email protected], and never from third-party domains.

The wallet provider does not send unsolicited emails demanding verification or upgrades.

Additionally, no representative will ever ask for a Secret Recovery Phrase. Yet these emails work because they exploit the gap between what users know intellectually and what they do reflexively when an official-looking message arrives.

Four signals expose phishing before damage occurs.

First, brand-sender mismatch, as MetaMask branding from “MetaLiveChain” signals template theft. Second, manufactured urgency around mandatory updates that MetaMask explicitly says it will not send.

Third, destination URLs that don’t match claimed domains, hovering before clicking reveals the actual target. Fourth, requests that violate core wallet rules, such as asking for seed phrases or prompting for signatures on opaque off-chain messages.

The ZachXBT case demonstrates signature-phishing mechanics. Victims who clicked the fake upgrade link likely signed a contract approval granting the drainer permission to move tokens.

That single signature opened the door to ongoing theft across multiple chains. The attacker chose small per-wallet amounts because contract approvals often carry unlimited spend caps by default, but draining everything would trigger immediate investigations.

Spreading theft across hundreds of victims at $2,000 each flies under the individual radar while accumulating six-figure totals.

Revoking approvals and shrinking blast radius

Once a phishing link is clicked or a malicious approval is signed, priority shifts to containment. MetaMask now lets users view and revoke token allowances directly inside MetaMask Portfolio.

Revoke.cash walks users through a simple process: connect your wallet, inspect approvals per network, and send revoke transactions for untrusted contracts.

Etherscan’s Token Approvals page offers the same functionality for manual revocation of ERC-20, ERC-721, and ERC-1155 approvals. These tools matter because victims who act fast could cut off the drainer’s access before losing everything.

The distinction between approval compromise and seed-phrase compromise determines whether a wallet can be salvaged. MetaMask’s security guide draws a hard line: if you suspect your Secret Recovery Phrase has been exposed, stop using that wallet immediately.

Create a new wallet on a fresh device, transfer remaining assets, and treat the original seed as permanently burned. Revoking approvals helps when the attacker only holds contract permissions; if your seed is gone, the entire wallet must be abandoned.

Chainalysis documented roughly 158,000 personal wallet compromises affecting at least 80,000 people in 2025, even as total stolen value fell to approximately $713 million.

Personal wallet losses as a share of total crypto theft climbed from roughly 10% in 2022 to nearly 25% in 2025, per Chainalysis data.

Attackers hit more wallets for smaller amounts, the pattern ZachXBT identified. The practical implication: organizing wallets to limit blast radius matters as much as avoiding phishing.

A single compromised wallet should not mean total portfolio loss.

Building defense-in-depth

Wallet providers have shipped features that would have contained this attack if adopted.

MetaMask now encourages setting spending caps on token approvals rather than accepting the default “unlimited” permissions. Revoke.cash and De.Fi’s Shield dashboard advocate treats approval reviews as routine hygiene alongside hardware wallet use for long-term holdings.

MetaMask enables transaction security alerts from Blockaid by default, flagging suspicious contracts before signatures are executed.

The Trust Wallet extension incident reinforces the need for defense-in-depth. That exploit bypassed user decisions, and malicious code in an official Chrome listing automatically harvested keys.

Users who segregated holdings across hardware wallets (cold storage), software wallets (warm transactions), and burner wallets (experimental protocols) limited exposure.

That three-tier model creates friction, but friction is the point. A phishing email that captures a burner wallet costs hundreds or a few thousand dollars. The same attack against a single wallet holding an entire portfolio costs life-changing money.

The ZachXBT drainer succeeded because it targeted the seam between convenience and security. Most users keep everything in one MetaMask instance because managing multiple wallets feels cumbersome.

The attacker bet that a professional-looking email on New Year’s Day would catch enough people off guard to generate profitable volume. That bet paid off, with $107,000 and counting.

MetaMask’s official guidance identifies three phishing red flags: wrong sender addresses, unsolicited urgent upgrade demands, and requests for Secret Recovery Phrases or passwords.

What’s at stake

This incident poses a deeper question: who bears responsibility for endpoint security in a self-custodial world?

Wallet providers build anti-phishing tools, researchers publish threat reports, and regulators warn consumers. Yet the attacker needed only a fake email, a cloned logo, and a drainer contract to compromise hundreds of wallets.

The infrastructure that enables self-custody, permissionless transactions, pseudonymous addresses, and irreversible transfers also makes it unforgiving.

The industry treats this as an education problem: if users verified sender addresses, hover over links, and revoke old approvals, attacks would fail.

Yet, Chainalysis’s data on 158,000 compromises suggests education alone doesn’t scale. Attackers adapt faster than users learn. The MetaMask phishing email evolved from crude “Your wallet is locked!” templates to polished seasonal campaigns.

The Trust Wallet extension exploit proved that even careful users can lose funds if distribution channels get compromised.

What works: hardware wallets for meaningful holdings, ruthless approval revocation, wallet segregation by risk profile, and skepticism toward any unsolicited message from wallet providers.

What doesn’t work: assuming wallet interfaces are safe by default, treating approvals as one-time decisions, or consolidating all assets in a single hot wallet for convenience. The ZachXBT drainer will be shut down because the address is flagged, and exchanges will freeze deposits.

But another drainer will launch next week with a slightly different template and a new contract
address.

The cycle continues until users internalize that the convenience of crypto creates an attack surface that eventually gets exploited. The choice isn’t between security and usability, but somewhat between friction now and loss later.

Mentioned in this article

Source: https://cryptoslate.com/hundreds-of-evm-wallets-drained-what-to-check-before-you-update/

Market Opportunity
Checkmate Logo
Checkmate Price(CHECK)
$0.073087
$0.073087$0.073087
+7.64%
USD
Checkmate (CHECK) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Google Calendar’s Secret Engineering Weapon: Restraint

Google Calendar’s Secret Engineering Weapon: Restraint

Google Calendar is a simple CRUD calendar app with a powerful REST API. The client is a masterpiece of restraint, with a simple frontend framework. The API is primitive
Share
Hackernoon2026/01/05 03:00
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Whitelist Access & Early Opportunities

Whitelist Access & Early Opportunities

The post Whitelist Access & Early Opportunities appeared on BitcoinEthereumNews.com. Crypto Projects Explore the top crypto presale opportunities for 2025, starting
Share
BitcoinEthereumNews2026/01/05 07:18