In this phishing attack, cybercriminals impersonate MetaMask, a popular cryptocurrency wallet provider, by sending a spoofed email requesting recipients complete their Know Your Customer (KYC) verification. The email urges the target to complete the verification as soon as possible to avoid having their wallet (and, in turn, their ability to store, withdraw, and transfer funds) suspended. If the recipient clicks the link labeled “Verify Your Wallet,” they will be redirected to a phishing page designed to steal sensitive information. The email mimics official MetaMask communication styles, leveraging professional formatting and terminology commonly associated with KYC compliance. This makes the message appear legitimate, increasing the likelihood that recipients will follow the malicious links without scrutiny. This phishing attempt capitalizes on the critical role of KYC verification in cryptocurrency platforms, where regulatory compliance is often necessary for continued service. By exploiting recipients' fear of account suspension and loss of access to their digital assets, attackers manipulate them into providing private information such as login credentials or wallet recovery phrases.

Older, legacy email security tools struggle to accurately identify this email as an attack because it originates from a spoofed address, includes legitimate links, and contains no suspicious attachments. Modern AI-powered email security solutions detect suspicious links in the email body, identify that the email is coming from an unknown sender, and recognize that the sender domain does not match any domains in the message to flag this email as an attack appropriately.

Status Bar Dots
SCR 20241125 mbxk 2

Phishing attack posing as KYC verification request from MetaMask attempting to compromise sensitive information from cryptocurrency users

How Does This Attack Bypass Email Defenses?

This email attack bypasses traditional security solutions for multiple reasons, including the following:

  • Spoofed Email Address: The attacker spoofs a legitimate-sounding email address, bypassing basic email verification checks and adding perceived authenticity.
  • Legitimate Links Included: The email includes links associated with recognizable domains, which can pass through basic link verification checks.
  • Lack of Attachments: By not including any attachments, the email avoids detection by antivirus and anti-malware systems focused on attachment-based threats.

How Did Abnormal Detect This Attack?

This attack was detected using AI and ML by analyzing various factors, including the following:

  • Suspicious Link Analysis: Abnormal's systems scrutinize the presence of links leading to suspicious domains, triggering deeper analysis for possible malicious intent.
  • Unknown Sender Consideration: The email is recognized as coming from an unknown sender who has never communicated with the recipient. Abnormal’s platform maintains a communication history and quickly flags deviations from established sender-recipient interaction patterns.
  • Unusual Sending Behavior: The sender domain does not match any of the domains found in the body links, raising suspicion.

By recognizing established normal behavior and detecting these abnormal indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.

Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.

Analysis Overview

Vector

Link-based

Goal

Credential Theft

Tactic

Spoofed Email Address
Masked Phishing Link

Theme

Suspended Account
Account Verification

Impersonated Party

Brand

Impersonated Brands

MetaMask

See How Abnormal Stops Emerging Attacks

See a Demo