Recently, MetaMask users are facing a highly disguised new phishing scam. According to the latest reports, blockchain security firm SlowMist warns that attackers are exploiting the guise of “enabling two-factor authentication (2FA)” to induce users to voluntarily disclose their wallet seed phrases. Such scams have caused actual losses, including the theft of hundreds of EVM wallets and over $100,000 in stolen funds. The key question is: How convincing do these scams look, and can you spot them?
Scam Techniques: Step-by-Step into the Trap
Complete scam process
The attacker’s approach involves four steps:
Step 1: Sending fake emails. Victims receive emails that appear to be from MetaMask official, containing branding and security tips, claiming that immediate activation of two-factor authentication is needed to “protect assets”
Step 2: Creating urgency. The email includes a countdown prompt, encouraging users to quickly click the “Activate Now” button under pressure
Step 3: Redirecting to fake pages. Once the link is clicked, users are directed to a simulated page built by the attacker, with an appearance almost indistinguishable from the real one
Step 4: Tricking users into inputting seed phrases. The fake page requests users to complete a so-called 2FA verification process, but the real goal is to steal the seed phrase
Why seed phrase leaks are the most dangerous
It’s important to clarify: seed phrases are equivalent to the highest permissions of your wallet. Once leaked, attackers can transfer assets within a short period, and recovery is nearly impossible. This is not about frozen accounts, but about completely losing control of your wallet.
Flaws in Scam Detection
Although these phishing emails are cleverly disguised, they are not perfect. According to security analysts, there are subtle but critical anomalies in the scam pages and emails:
Detection Point
Specific Manifestation
Explanation
Domain spelling
This scam uses “mertamask” instead of “metamask”
Carefully check URLs; official domains will not have spelling errors
Sender email
Comes from unrelated accounts or public email domains like Gmail
Official MetaMask emails should come from official domains
Design details
Spelling mistakes, inconsistent design
Official products tend to have more meticulous details
Request content
Asking for seed phrases or account verification
Official channels will never proactively request these
The Most Critical Defense Principles
MetaMask’s official stance
It must be emphasized: MetaMask’s official position is that they will never ask users via email to verify accounts, enable security features, or input seed phrases. Any such request can almost certainly be a scam.
What users should do
Never disclose your seed phrase to any website or email, regardless of the reason
Always obtain wallet updates and security information through official channels
Be highly cautious of unfamiliar emails, especially those involving security verification requests
Regularly review wallet permissions, using tools like Rabby to audit risk permissions
For large assets, consider migrating to hardware wallets (such as Ledger, Trezor)
Broader Context: Phishing Scams Are Evolving
This is not an isolated incident. Recently, cryptocurrency users have encountered multiple phishing and malware attacks, including fake MetaMask app updates, malicious code embedded in Trust Wallet browser extensions, and fake Eternl Desktop applications targeting Cardano users. These attacks span multiple EVM-compatible networks, affecting a wide range of victims.
Interestingly, according to recent data, the total losses from cryptocurrency phishing scams in 2025 have decreased by nearly 88% year-over-year. But this does not mean the threat has disappeared; rather, attack methods are becoming more sophisticated and “trustworthy.” In other words, success rates may be higher.
Summary
This MetaMask phishing incident reminds us of three core points:
First, seed phrases are the key to your wallet; once leaked, it means complete loss of control. No reason is worth risking this.
Second, official channels will not proactively seek you out for verification. If you receive such an email, stay calm, verify through the official website or social media, and do not click links in the email.
Finally, defense requires multiple layers. Besides staying vigilant, use professional tools (like Rabby Wallet, Revoke.cash) to regularly audit permissions, and isolate large assets with hardware wallets. In the blockchain world, maintaining a “paranoia” about being victimized is actually a rational choice.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
MetaMask New Phishing Scam Exposed: Fake 2FA Induces Mnemonic Input, These Flaws Can Save You
Recently, MetaMask users are facing a highly disguised new phishing scam. According to the latest reports, blockchain security firm SlowMist warns that attackers are exploiting the guise of “enabling two-factor authentication (2FA)” to induce users to voluntarily disclose their wallet seed phrases. Such scams have caused actual losses, including the theft of hundreds of EVM wallets and over $100,000 in stolen funds. The key question is: How convincing do these scams look, and can you spot them?
Scam Techniques: Step-by-Step into the Trap
Complete scam process
The attacker’s approach involves four steps:
Why seed phrase leaks are the most dangerous
It’s important to clarify: seed phrases are equivalent to the highest permissions of your wallet. Once leaked, attackers can transfer assets within a short period, and recovery is nearly impossible. This is not about frozen accounts, but about completely losing control of your wallet.
Flaws in Scam Detection
Although these phishing emails are cleverly disguised, they are not perfect. According to security analysts, there are subtle but critical anomalies in the scam pages and emails:
The Most Critical Defense Principles
MetaMask’s official stance
It must be emphasized: MetaMask’s official position is that they will never ask users via email to verify accounts, enable security features, or input seed phrases. Any such request can almost certainly be a scam.
What users should do
Broader Context: Phishing Scams Are Evolving
This is not an isolated incident. Recently, cryptocurrency users have encountered multiple phishing and malware attacks, including fake MetaMask app updates, malicious code embedded in Trust Wallet browser extensions, and fake Eternl Desktop applications targeting Cardano users. These attacks span multiple EVM-compatible networks, affecting a wide range of victims.
Interestingly, according to recent data, the total losses from cryptocurrency phishing scams in 2025 have decreased by nearly 88% year-over-year. But this does not mean the threat has disappeared; rather, attack methods are becoming more sophisticated and “trustworthy.” In other words, success rates may be higher.
Summary
This MetaMask phishing incident reminds us of three core points:
First, seed phrases are the key to your wallet; once leaked, it means complete loss of control. No reason is worth risking this.
Second, official channels will not proactively seek you out for verification. If you receive such an email, stay calm, verify through the official website or social media, and do not click links in the email.
Finally, defense requires multiple layers. Besides staying vigilant, use professional tools (like Rabby Wallet, Revoke.cash) to regularly audit permissions, and isolate large assets with hardware wallets. In the blockchain world, maintaining a “paranoia” about being victimized is actually a rational choice.