According to Wu Shu, Gate.io News bot, ENS core developer nick eth recently fell victim to a sophisticated phishing attack. An attacker exploited two vulnerabilities in Google's infrastructure to bypass DKIM verification and the Gmail security warning system and send phishing emails disguised as Google's official security alerts.
An attacker uses Google Sites to set up a fake support page to trick users into logging in and steal account credentials. Nick ETH has reported the security issue to Google, but Google has responded that it is "working as intended" and refuses to fix the logic vulnerability.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
The core developer of ENS encountered a sophisticated phishing attack, and Google refused to fix the vulnerability
According to Wu Shu, Gate.io News bot, ENS core developer nick eth recently fell victim to a sophisticated phishing attack. An attacker exploited two vulnerabilities in Google's infrastructure to bypass DKIM verification and the Gmail security warning system and send phishing emails disguised as Google's official security alerts.
An attacker uses Google Sites to set up a fake support page to trick users into logging in and steal account credentials. Nick ETH has reported the security issue to Google, but Google has responded that it is "working as intended" and refuses to fix the logic vulnerability.