MetaMask Users Under Attack: Fake 2FA Scam Draining Wallets in Seconds

ccn.comPublicado em 2026-01-05Última atualização em 2026-01-05

Resumo

MetaMask users are being targeted by a sophisticated phishing scam that uses fake two-factor authentication (2FA) prompts to steal seed phrases and drain wallets within seconds. The attack begins with fraudulent emails or social media messages impersonating MetaMask support, urging users to enable "mandatory 2FA" under false urgency. Victims are directed to convincing phishing sites that mimic MetaMask’s interface, complete with countdown timers. Once users enter their seed phrase, attackers gain full control of their wallets and immediately transfer all assets. Security firm SlowMist first reported the scam on January 5. While specific loss figures are still emerging, similar recent phishing campaigns have already stolen over $107,000 from hundreds of wallets. MetaMask emphasizes that it never asks for seed phrases via email and advises users to ignore unsolicited security alerts, verify sender addresses, manually type URLs, and use hardware wallets for high-value assets. Enabling authenticator-based 2FA and regularly revoking token approvals are also recommended precautions.

Key Takeaways

  • Scammers are targeting MetaMask users with fake “2FA security verification” pages that mimic official alerts.
  • The phishing sites use countdown timers and urgency to trick victims into entering their seed phrases.
  • Once the seed phrase is submitted, attackers gain complete control and can instantly drain wallets.

MetaMask, the leading non-custodial Ethereum wallet, is facing an active two-factor authentication (2FA) scam that has recently drained multiple user wallets.

Cybersecurity firm SlowMist flagged the attack on Jan. 5, noting that scammers lure victims through a series of fake web pages designed to closely mimic official MetaMask interfaces, ultimately tricking users into revealing their wallet seed phrases.

Try Our Recommended Crypto Exchanges
Sponsored
Disclosure
We sometimes use affiliate links in our content, when clicking on those we might receive a commission at no extra cost to you. By using this website you agree to our terms and conditions and privacy policy.
"}' data-trk="68df7fd8872238d510dfbf06" href="https://clicks.pipaffiliates.com/c?c=1104900&l=en&p=1" rel="nofollow" target="_blank">
XM.com<\/h3>"}' data-trk="68df7fd8872238d510dfbf06" href="https://clicks.pipaffiliates.com/c?c=1104900&l=en&p=1" rel="nofollow" target="_blank">

XM.com

promotions
Get 100% Bonus up to $100 on your first Deposit.<\/strong>"}' data-trk="68df7fd8872238d510dfbf06" href="https://clicks.pipaffiliates.com/c?c=1104900&l=en&p=1" rel="nofollow" target="_blank"> Get 100% Bonus up to $100 on your first Deposit.
Coins
28
Claim Offer
"}' data-trk="6899b9831836d97539c51aa6" href="https://www.bitunix.com/" rel="nofollow" target="_blank">
Bitunix<\/h3>"}' data-trk="6899b9831836d97539c51aa6" href="https://www.bitunix.com/" rel="nofollow" target="_blank">

Bitunix

promotions
Receive up to $100,000 worth of exclusive gifts for newcomers upon registration.<\/strong>"}' data-trk="6899b9831836d97539c51aa6" href="https://www.bitunix.com/" rel="nofollow" target="_blank"> Receive up to $100,000 worth of exclusive gifts for newcomers upon registration.
Coins
151
Claim Offer
"}' data-trk="67adf8d4f12aaec7e4808bf5" href="https://bonus.bitget.com/CCN12" rel="nofollow" target="_blank">
Bitget<\/h3>"}' data-trk="67adf8d4f12aaec7e4808bf5" href="https://bonus.bitget.com/CCN12" rel="nofollow" target="_blank">

Bitget

promotions
Earn rewards worth up to 5,000 USDT on your first deposit<\/strong>"}' data-trk="67adf8d4f12aaec7e4808bf5" href="https://bonus.bitget.com/CCN12" rel="nofollow" target="_blank"> Earn rewards worth up to 5,000 USDT on your first deposit
Coins
88
Claim Offer

What Happened?

The attack typically begins with a phishing email or link shared via social media, direct messages, or compromised websites.

Unlike legitimate 2FA setups, which rely on codes generated by apps or devices, this scam ultimately prompts users to enter their seed phrase.

This grants attackers full control and enables them to drain funds within seconds.

Users receive unsolicited emails posing as “MetaMask Support,” with subject lines such as “2FA – Protect Your Wallet” or “Action Required: Secure Your Wallet with 2FA.”

The emails claim that 2FA is becoming mandatory to prevent unauthorized access and often impose a fake deadline to create urgency.

They feature the MetaMask fox logo and include a button labeled “Enable 2FA Now!”

Metamask users received malicious emails asking them to update their seed phrase. Source: X

Clicking the button redirects users to a phishing site with a domain closely resembling MetaMask’s, often using typosquatting techniques such as “matamask” instead of “metamask.”

The site displays a fake security alert warning of potential risks and urges immediate action.

Users are then guided to a counterfeit 2FA verification interface that includes realistic elements, such as countdown timers (e.g., “Complete in 5 minutes or risk account restriction”), to pressure quick compliance.

The final step asks users to enter their 12- or 24-word seed phrase under the pretense of “verifying wallet ownership” or “completing security setup.”

Some versions include a fake “authenticity check” to build trust.

Once entered, the phrase is sent to the attackers, who can import the wallet elsewhere and transfer all assets instantly.

Users Risk Losing Their Total Holdings

MetaMask itself is not technically vulnerable; the exploit relies on social engineering and user error.

As this specific 2FA variant was first publicly reported on Jan. 5, 2026, detailed loss figures have not yet been widely disclosed.

However, early indicators suggest a rapid potential for loss due to the direct theft of seed phrases.

Similar MetaMask phishing campaigns, such as the “mandatory update” scam, were flagged by on-chain investigator ZachXBT just days prior.

These scams have drained over $107,000 from hundreds of wallets across EVM chains.

Victims typically lose small amounts per wallet ($500–$2,000), making the thefts initially harder to detect and trace.

Funds are funneled to attacker-controlled addresses, often in stablecoins or ETH, with total ecosystem losses from MetaMask-related scams estimated in the millions annually.

If you’ve fallen victim, immediately disconnect the wallet from suspicious sites and transfer any remaining funds to a new wallet.

Staying vigilant is key in Web3; MetaMask emphasizes that security begins with user awareness.

How To Avoid Such Scams

First and foremost, it’s crucial for users holding assets in online wallets and self-custodial wallets to be wary of such attacks.

Always remember: no wallet, whether hardware or software, custodial or non-custodial, should ever ask for your seed phrase.

However, due to the sophistication of these scams, it’s hard to detect them all the time.

Here’s a step-by-step guide to always double-check any such emails, creating urgency:

  • Ignore unsolicited emails claiming to be from MetaMask; official ones never create a sense of urgency or request seed phrases.
  • Check the sender domains for legitimacy: [email protected] or [email protected].
  • Manually type URLs instead of clicking links. Hover over buttons to inspect destinations.
  • Never enter your seed phrase anywhere except during initial wallet setup or recovery on a trusted device. Store it offline and use a hardware wallet for high-value assets to require physical confirmation for transactions.
  • Enable real 2FA on related accounts using authenticator apps instead of SMS. Disable iCloud backups for sensitive apps to prevent access via Apple ID scams.
  • Regularly revoke token approvals using tools like MetaMask Portfolio to limit access to malicious contracts.

Top Picks for Ethereum
  • Best Exchanges for Ethereum Get A Great Offer When You Join These Exchanges
  • Buy Ethereum Fast & Easy How To Buy Ethereum With a Credit Card Now
  • Best Online Casinos for Ethereum See Our Picks for the Best Crypto Gambling Sites

Perguntas relacionadas

QWhat is the main tactic scammers use in the fake 2FA attack on MetaMask users?

AScammers use phishing emails or links that mimic official MetaMask alerts, complete with countdown timers and a sense of urgency, to trick users into entering their seed phrases on fake websites.

QWhat is the ultimate goal of the attackers once they obtain a user's seed phrase?

AOnce the seed phrase is obtained, attackers gain complete control over the user's wallet and can instantly drain all the funds and assets from it.

QAccording to the article, what is a key indicator that an email claiming to be from MetaMask support is a scam?

AA key indicator is that the email creates a sense of urgency, such as imposing a fake deadline, and requests the user's seed phrase, which legitimate MetaMask support would never do.

QWhat proactive step can users take to limit the damage from malicious smart contracts?

AUsers can regularly revoke token approvals using tools like the MetaMask Portfolio to limit the access that malicious contracts have to their funds.

QWhat type of wallet does the article recommend for users holding high-value assets, and why?

AThe article recommends using a hardware wallet for high-value assets because it requires physical confirmation for transactions, adding a significant layer of security.

Leituras Relacionadas

Trading

Spot
Futuros
活动图片