{"id":19635,"date":"2022-03-01T18:49:54","date_gmt":"2022-03-01T17:49:54","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=19635"},"modified":"2022-03-01T18:49:54","modified_gmt":"2022-03-01T17:49:54","slug":"metaverse-users-are-now-being-targeted-by-a-sophisticated-phishing-attack-using-metamask","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/metaverse-users-are-now-being-targeted-by-a-sophisticated-phishing-attack-using-metamask\/","title":{"rendered":"Metaverse&nbsp;users&nbsp;are&nbsp;now&nbsp;being&nbsp;targeted&nbsp;by&nbsp;a&nbsp;sophisticated&nbsp;phishing&nbsp;attack&nbsp;using&nbsp;MetaMask."},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">A\u00a0sophisticated\u00a0phishing\u00a0attempt\u00a0targeting\u00a0crypto\u00a0and\u00a0metaverse\u00a0users\u00a0utilizing\u00a0non-custodial\u00a0wallets\u00a0like\u00a0<a href=\"https:\/\/coinscreed.com\/staging\/netgear-integrates-crypto-wallet-metamask-into-its-meural-smart-picture-frame.html\">MetaMask<\/a>\u00a0has\u00a0been\u00a0discovered\u00a0by\u00a0Guardio,\u00a0a\u00a0cyber\u00a0security\u00a0business.<\/h5>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-1024x550.jpg\" alt=\"Metaverse users are now being targeted by a sophisticated phishing attack using MetaMask.\" class=\"wp-image-19636\" width=\"820\" height=\"440\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-1024x550.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-300x161.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-768x413.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-750x403.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask.jpg 1079w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Phishing\u00a0campaigns\u00a0are\u00a0being\u00a0ramped\u00a0up\u00a0by\u00a0attackers.<\/strong><\/h4>\n\n\n\n<p>The\u00a0Guardio\u00a0research\u00a0team\u00a0noted\u00a0in\u00a0a\u00a0<a href=\"https:\/\/guardiosecurity.medium.com\/how-to-lose-all-your-money-in-the-meta-verse-before-even-getting-started-7edb5b56a108\" target=\"_blank\" rel=\"noopener\">recent\u00a0blog\u00a0post<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>\u00a0that\u00a0the\u00a0illicit\u00a0operation\u00a0is\u00a0operating\u00a0at\u00a0full\u00a0throttle\u00a0in\u00a0terms\u00a0of\u00a0breadth\u00a0and\u00a0depth.\u00a0Hackers\u00a0were\u00a0using\u00a0time-tested\u00a0web\u00a0infiltration\u00a0tactics\u00a0like\u00a0domain\u00a0typo-squatting\u00a0techniques\u00a0accelerated\u00a0by\u00a0malvertising\u00a0campaigns\u00a0where\u00a0victims\u00a0unknowingly\u00a0approve\u00a0payment\u00a0to\u00a0attackers\u00a0via\u00a0cloned\u00a0websites\u00a0of\u00a0leading\u00a0NFT\u00a0and\u00a0metaverse\u00a0brands\u00a0like\u00a0OpenSea\u00a0and\u00a0others,\u00a0according\u00a0to\u00a0the\u00a0cybersecurity\u00a0startup.<\/p>\n\n\n\n<p>These&nbsp;NFT&nbsp;and&nbsp;metaverse&nbsp;websites&nbsp;typically&nbsp;provide&nbsp;a&nbsp;high&nbsp;level&nbsp;of&nbsp;functionality&nbsp;and&nbsp;employ&nbsp;a&nbsp;complicated&nbsp;network&nbsp;of&nbsp;wallet&nbsp;connections,&nbsp;relying&nbsp;mostly&nbsp;on&nbsp;non-custodial&nbsp;wallets,&nbsp;the&nbsp;most&nbsp;popular&nbsp;of&nbsp;which&nbsp;is&nbsp;MetaMask.&nbsp;Cloned&nbsp;and&nbsp;malicious&nbsp;websites&nbsp;are&nbsp;ranked&nbsp;on&nbsp;the&nbsp;first&nbsp;page&nbsp;of&nbsp;search&nbsp;results&nbsp;using&nbsp;black&nbsp;hat&nbsp;SEO&nbsp;and&nbsp;aggressive&nbsp;promotion&nbsp;through&nbsp;paid&nbsp;Google&nbsp;AdWords,&nbsp;resulting&nbsp;in&nbsp;thousands&nbsp;of&nbsp;victims.<\/p>\n\n\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1-1024x343.jpg\" alt=\"\" class=\"wp-image-19638\" width=\"918\" height=\"307\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1-1024x343.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1-300x100.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1-768x257.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1-750x251.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-1.jpg 1094w\" sizes=\"(max-width: 918px) 100vw, 918px\" \/><\/figure><\/div>\n\n\n\n<p>It's\u00a0worth\u00a0noting\u00a0that\u00a0the\u00a0Guardio\u00a0claims\u00a0that\u00a0these\u00a0cloned\u00a0websites,\u00a0which\u00a0number\u00a0in\u00a0the\u00a0thousands,\u00a0are\u00a0&#8220;flying\u00a0under\u00a0the\u00a0radar&#8221;\u00a0and\u00a0are\u00a0undetectable\u00a0by\u00a0in-built\u00a0browser\u00a0protection\u00a0mechanisms\u00a0or\u00a0traditional\u00a0antivirus\u00a0software.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"913\" height=\"561\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-2.jpg\" alt=\"\" class=\"wp-image-19639\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-2.jpg 913w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-2-300x184.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-2-768x472.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/sandbox-2-750x461.jpg 750w\" sizes=\"(max-width: 913px) 100vw, 913px\" \/><\/figure><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">\u00a0<strong>What\u00a0is\u00a0the\u00a0difference\u00a0between\u00a0MetaMask\u00a0and\u00a0Metaverse?<\/strong><\/h5>\n\n\n\n<p>According&nbsp;to&nbsp;the&nbsp;Guardio&nbsp;research&nbsp;team,&nbsp;attackers&nbsp;have&nbsp;amassed&nbsp;tens&nbsp;of&nbsp;thousands,&nbsp;if&nbsp;not&nbsp;hundreds&nbsp;of&nbsp;thousands,&nbsp;of&nbsp;money&nbsp;from&nbsp;vulnerable&nbsp;victims,&nbsp;significantly&nbsp;hurting&nbsp;the&nbsp;user&nbsp;experience&nbsp;and&nbsp;thereby&nbsp;giving&nbsp;the&nbsp;crypto&nbsp;and&nbsp;metaverse&nbsp;scene&nbsp;a&nbsp;poor&nbsp;rap.<\/p>\n\n\n\n<p>Blockchain&nbsp;guarantees&nbsp;complete&nbsp;autonomy&nbsp;and&nbsp;control.&nbsp;These&nbsp;are&nbsp;the&nbsp;guidelines&nbsp;that&nbsp;deployment&nbsp;agents&nbsp;and&nbsp;infrastructure&nbsp;providers&nbsp;follow.&nbsp;For&nbsp;example,&nbsp;the&nbsp;MetaMask&nbsp;non-custodial&nbsp;wallet&nbsp;is&nbsp;simple&nbsp;to&nbsp;use&nbsp;and&nbsp;allows&nbsp;users&nbsp;to&nbsp;store&nbsp;ETH,&nbsp;ERC-20,&nbsp;and&nbsp;other&nbsp;EVM-compatible&nbsp;tokens.&nbsp;Over&nbsp;ten&nbsp;million&nbsp;users&nbsp;are&nbsp;reported&nbsp;to&nbsp;have&nbsp;used&nbsp;the&nbsp;wallet&nbsp;to&nbsp;access&nbsp;multiple&nbsp;NFT,&nbsp;Metaverse,&nbsp;and&nbsp;DeFi&nbsp;portals&nbsp;in&nbsp;Ethereum,&nbsp;the&nbsp;Binance&nbsp;Smart&nbsp;Chain&nbsp;(BSC),&nbsp;Harmony,&nbsp;and&nbsp;other&nbsp;EVM-compatible&nbsp;networks.<\/p>\n\n\n\n<p>DeFi,&nbsp;NFT,&nbsp;and&nbsp;the&nbsp;Metaverse&nbsp;have&nbsp;all&nbsp;grown&nbsp;in&nbsp;popularity&nbsp;in&nbsp;recent&nbsp;years,&nbsp;commanding&nbsp;billions&nbsp;of&nbsp;dollars.&nbsp;All&nbsp;DeFi&nbsp;dApps&nbsp;had&nbsp;a&nbsp;total&nbsp;value&nbsp;of&nbsp;nearly&nbsp;$208&nbsp;billion&nbsp;at&nbsp;the&nbsp;time&nbsp;of&nbsp;writing.&nbsp;NFT&nbsp;trading&nbsp;volumes,&nbsp;on&nbsp;the&nbsp;other&nbsp;hand,&nbsp;rose&nbsp;to&nbsp;much&nbsp;than&nbsp;$5&nbsp;billion&nbsp;in&nbsp;January&nbsp;2022&nbsp;alone,&nbsp;extending&nbsp;their&nbsp;impressive&nbsp;numbers&nbsp;from&nbsp;2021.&nbsp;The&nbsp;overall&nbsp;amount&nbsp;of&nbsp;NFT&nbsp;trading&nbsp;increased&nbsp;to&nbsp;almost&nbsp;$25&nbsp;billion&nbsp;last&nbsp;year.&nbsp;Meanwhile,&nbsp;the&nbsp;Metaverse&nbsp;is&nbsp;gaining&nbsp;traction,&nbsp;despite&nbsp;the&nbsp;fact&nbsp;that&nbsp;it&nbsp;has&nbsp;been&nbsp;receiving&nbsp;attention&nbsp;since&nbsp;Q3&nbsp;2021.&nbsp;The&nbsp;Metaverse,&nbsp;according&nbsp;to&nbsp;predictions,&nbsp;will&nbsp;be&nbsp;revolutionary,&nbsp;completely&nbsp;revamping&nbsp;the&nbsp;internet.&nbsp;Analysts&nbsp;predict&nbsp;that&nbsp;the&nbsp;Metaverse's&nbsp;value&nbsp;will&nbsp;exceed&nbsp;$1&nbsp;trillion&nbsp;in&nbsp;the&nbsp;next&nbsp;decade.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Emphasis\u00a0on\u00a0the\u00a0Metaverse\u00a0and\u00a0Cryptocurrency\u00a0Users<\/strong><\/h4>\n\n\n\n<p>Because&nbsp;most&nbsp;Metaverse,&nbsp;DeFi,&nbsp;and&nbsp;NFT&nbsp;users&nbsp;are&nbsp;tech-savvy&nbsp;and&nbsp;crypto&nbsp;holders,&nbsp;attackers&nbsp;appear&nbsp;to&nbsp;be&nbsp;specifically&nbsp;targeting&nbsp;them.&nbsp;Attackers&nbsp;are&nbsp;cloning&nbsp;and&nbsp;distributing&nbsp;a&nbsp;near-pixel&nbsp;copy&nbsp;of&nbsp;the&nbsp;original&nbsp;site,&nbsp;catching&nbsp;some&nbsp;users&nbsp;off&nbsp;guard.&nbsp;They&nbsp;are&nbsp;aware&nbsp;that&nbsp;users&nbsp;are&nbsp;also&nbsp;on&nbsp;the&nbsp;alert&nbsp;to&nbsp;avoid&nbsp;getting&nbsp;hacked&nbsp;and&nbsp;losing&nbsp;valuable&nbsp;assets.<\/p>\n\n\n\n<p>Because\u00a0blockchain\u00a0solutions\u00a0are\u00a0noncustodial,\u00a0the\u00a0controller\u00a0of\u00a0the\u00a0wallet's\u00a0private\u00a0keys\u00a0must\u00a0first\u00a0validate\u00a0the\u00a0transaction\u00a0before\u00a0it\u00a0can\u00a0be\u00a0irreversibly\u00a0confirmed\u00a0on\u00a0the\u00a0network.\u00a0As\u00a0a\u00a0result,\u00a0by\u00a0publishing\u00a0a\u00a0flawless\u00a0front-end,\u00a0attackers\u00a0may\u00a0concentrate\u00a0on\u00a0exploiting\u00a0end-user\u00a0approval,\u00a0which\u00a0is\u00a0arguably\u00a0the\u00a0only\u00a0weakness\u00a0in\u00a0blockchain\u00a0metaverse\u00a0and\u00a0NFT\u00a0sites.\u00a0Hackers\u00a0have\u00a0also\u00a0successfully\u00a0extracted\u00a0private\u00a0keys,\u00a0which\u00a0are\u00a0passphrases\u00a0required\u00a0for\u00a0transaction\u00a0confirmation,\u00a0according\u00a0to\u00a0Guardio\u00a0analysts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How\u00a0to\u00a0Stay\u00a0Safe\u00a0in\u00a0Crypto<\/strong><\/h4>\n\n\n\n<p>Crypto\u00a0developments\u00a0such\u00a0as\u00a0the\u00a0<a href=\"https:\/\/coinscreed.com\/staging\/south-korean-government-set-to-invest-187m-into-a-national-metaverse-project.html\">Metaverse\u00a0and\u00a0NFT<\/a>s\u00a0are\u00a0intriguing,\u00a0but\u00a0they\u00a0are\u00a0still\u00a0in\u00a0their\u00a0infancy.\u00a0Attackers\u00a0are\u00a0on\u00a0the\u00a0hunt,\u00a0waiting\u00a0to\u00a0extort\u00a0cash\u00a0and\u00a0private\u00a0keys\u00a0from\u00a0unsuspecting\u00a0victims\u00a0at\u00a0any\u00a0time.\u00a0Due\u00a0diligence\u00a0is\u00a0required\u00a0to\u00a0stay\u00a0safe.\u00a0As\u00a0the\u00a0first\u00a0line\u00a0of\u00a0defense,\u00a0always\u00a0use\u00a0a\u00a0reliable\u00a0antivirus\u00a0product.<\/p>\n\n\n\n<p class=\"has-text-align-left\">As&nbsp;a&nbsp;general&nbsp;guideline,&nbsp;never&nbsp;disclose&nbsp;the&nbsp;private&nbsp;keys&nbsp;to&nbsp;your&nbsp;wallet&nbsp;with&nbsp;anyone,&nbsp;no&nbsp;matter&nbsp;how&nbsp;convincing&nbsp;they&nbsp;seem.&nbsp;Users&nbsp;should&nbsp;also&nbsp;double-check&nbsp;that&nbsp;they&nbsp;are&nbsp;accessing&nbsp;the&nbsp;correct&nbsp;website&nbsp;and&nbsp;not&nbsp;a&nbsp;clone&nbsp;with&nbsp;obvious&nbsp;mistakes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00a0sophisticated\u00a0phishing\u00a0attempt\u00a0targeting\u00a0crypto\u00a0and\u00a0metaverse\u00a0users\u00a0utilizing\u00a0non-custodial\u00a0wallets\u00a0like\u00a0MetaMask\u00a0has\u00a0been\u00a0discovered\u00a0by\u00a0Guardio,\u00a0a\u00a0cyber\u00a0security\u00a0business. Phishing\u00a0campaigns\u00a0are\u00a0being\u00a0ramped\u00a0up\u00a0by\u00a0attackers. The\u00a0Guardio\u00a0research\u00a0team\u00a0noted\u00a0in\u00a0a\u00a0recent\u00a0blog\u00a0post \u00a0that\u00a0the\u00a0illicit\u00a0operation\u00a0is\u00a0operating\u00a0at\u00a0full\u00a0throttle\u00a0in\u00a0terms\u00a0of\u00a0breadth\u00a0and\u00a0depth.\u00a0Hackers\u00a0were\u00a0using\u00a0time-tested\u00a0web\u00a0infiltration\u00a0tactics\u00a0like\u00a0domain\u00a0typo-squatting\u00a0techniques\u00a0accelerated\u00a0by\u00a0malvertising\u00a0campaigns\u00a0where\u00a0victims\u00a0unknowingly\u00a0approve\u00a0payment\u00a0to\u00a0attackers\u00a0via\u00a0cloned\u00a0websites\u00a0of\u00a0leading\u00a0NFT\u00a0and\u00a0metaverse\u00a0brands\u00a0like\u00a0OpenSea\u00a0and\u00a0others,\u00a0according\u00a0to\u00a0the\u00a0cybersecurity\u00a0startup. These&nbsp;NFT&nbsp;and&nbsp;metaverse&nbsp;websites&nbsp;typically&nbsp;provide&nbsp;a&nbsp;high&nbsp;level&nbsp;of&nbsp;functionality&nbsp;and&nbsp;employ&nbsp;a&nbsp;complicated&nbsp;network&nbsp;of&nbsp;wallet&nbsp;connections,&nbsp;relying&nbsp;mostly&nbsp;on&nbsp;non-custodial&nbsp;wallets,&nbsp;the&nbsp;most&nbsp;popular&nbsp;of&nbsp;which&nbsp;is&nbsp;MetaMask.&nbsp;Cloned&nbsp;and&nbsp;malicious&nbsp;websites&nbsp;are&nbsp;ranked&nbsp;on&nbsp;the&nbsp;first&nbsp;page&nbsp;of&nbsp;search&nbsp;results&nbsp;using&nbsp;black&nbsp;hat&nbsp;SEO&nbsp;and&nbsp;aggressive&nbsp;promotion&nbsp;through&nbsp;paid&nbsp;Google&nbsp;AdWords,&nbsp;resulting&nbsp;in&nbsp;thousands&nbsp;of&nbsp;victims. It&#8217;s\u00a0worth\u00a0noting\u00a0that\u00a0the\u00a0Guardio\u00a0claims\u00a0that\u00a0these\u00a0cloned\u00a0websites,\u00a0which\u00a0number\u00a0in\u00a0the\u00a0thousands,\u00a0are\u00a0&#8220;flying\u00a0under\u00a0the\u00a0radar&#8221;\u00a0and\u00a0are\u00a0undetectable\u00a0by\u00a0in-built\u00a0browser\u00a0protection\u00a0mechanisms\u00a0or\u00a0traditional\u00a0antivirus\u00a0software. \u00a0What\u00a0is\u00a0the\u00a0difference\u00a0between\u00a0MetaMask\u00a0and\u00a0Metaverse? According&nbsp;to&nbsp;the&nbsp;Guardio&nbsp;research&nbsp;team,&nbsp;attackers&nbsp;have&nbsp;amassed&nbsp;tens&nbsp;of&nbsp;thousands,&nbsp;if&nbsp;not&nbsp;hundreds&nbsp;of&nbsp;thousands,&nbsp;of&nbsp;money&nbsp;from&nbsp;vulnerable&nbsp;victims,&nbsp;significantly&nbsp;hurting&nbsp;the&nbsp;user&nbsp;experience&nbsp;and&nbsp;thereby&nbsp;giving&nbsp;the&nbsp;crypto&nbsp;and&nbsp;metaverse&nbsp;scene&nbsp;a&nbsp;poor&nbsp;rap. Blockchain&nbsp;guarantees&nbsp;complete&nbsp;autonomy&nbsp;and&nbsp;control.&nbsp;These&nbsp;are&nbsp;the&nbsp;guidelines&nbsp;that&nbsp;deployment&nbsp;agents&nbsp;and&nbsp;infrastructure&nbsp;providers&nbsp;follow.&nbsp;For&nbsp;example,&nbsp;the&nbsp;MetaMask&nbsp;non-custodial&nbsp;wallet&nbsp;is&nbsp;simple&nbsp;to&nbsp;use&nbsp;and&nbsp;allows&nbsp;users&nbsp;to&nbsp;store&nbsp;ETH,&nbsp;ERC-20,&nbsp;and&nbsp;other&nbsp;EVM-compatible&nbsp;tokens.&nbsp;Over&nbsp;ten&nbsp;million&nbsp;users&nbsp;are&nbsp;reported&nbsp;to&nbsp;have&nbsp;used&nbsp;the&nbsp;wallet&nbsp;to&nbsp;access&nbsp;multiple&nbsp;NFT,&nbsp;Metaverse,&nbsp;and&nbsp;DeFi&nbsp;portals&nbsp;in&nbsp;Ethereum,&nbsp;the&nbsp;Binance&nbsp;Smart&nbsp;Chain&nbsp;(BSC),&nbsp;Harmony,&nbsp;and&nbsp;other&nbsp;EVM-compatible&nbsp;networks. DeFi,&nbsp;NFT,&nbsp;and&nbsp;the&nbsp;Metaverse&nbsp;have&nbsp;all&nbsp;grown&nbsp;in&nbsp;popularity&nbsp;in&nbsp;recent&nbsp;years,&nbsp;commanding&nbsp;billions&nbsp;of&nbsp;dollars.&nbsp;All&nbsp;DeFi&nbsp;dApps&nbsp;had&nbsp;a&nbsp;total&nbsp;value&nbsp;of&nbsp;nearly&nbsp;$208&nbsp;billion&nbsp;at&nbsp;the&nbsp;time&nbsp;of&nbsp;writing.&nbsp;NFT&nbsp;trading&nbsp;volumes,&nbsp;on&nbsp;the&nbsp;other&nbsp;hand,&nbsp;rose&nbsp;to&nbsp;much&nbsp;than&nbsp;$5&nbsp;billion&nbsp;in&nbsp;January&nbsp;2022&nbsp;alone,&nbsp;extending&nbsp;their&nbsp;impressive&nbsp;numbers&nbsp;from&nbsp;2021.&nbsp;The&nbsp;overall&nbsp;amount&nbsp;of&nbsp;NFT&nbsp;trading&nbsp;increased&nbsp;to&nbsp;almost&nbsp;$25&nbsp;billion&nbsp;last&nbsp;year.&nbsp;Meanwhile,&nbsp;the&nbsp;Metaverse&nbsp;is&nbsp;gaining&nbsp;traction,&nbsp;despite&nbsp;the&nbsp;fact&nbsp;that&nbsp;it&nbsp;has&nbsp;been&nbsp;receiving&nbsp;attention&nbsp;since&nbsp;Q3&nbsp;2021.&nbsp;The&nbsp;Metaverse,&nbsp;according&nbsp;to&nbsp;predictions,&nbsp;will&nbsp;be&nbsp;revolutionary,&nbsp;completely&nbsp;revamping&nbsp;the&nbsp;internet.&nbsp;Analysts&nbsp;predict&nbsp;that&nbsp;the&nbsp;Metaverse&#8217;s&nbsp;value&nbsp;will&nbsp;exceed&nbsp;$1&nbsp;trillion&nbsp;in&nbsp;the&nbsp;next&nbsp;decade. Emphasis\u00a0on\u00a0the\u00a0Metaverse\u00a0and\u00a0Cryptocurrency\u00a0Users Because&nbsp;most&nbsp;Metaverse,&nbsp;DeFi,&nbsp;and&nbsp;NFT&nbsp;users&nbsp;are&nbsp;tech-savvy&nbsp;and&nbsp;crypto&nbsp;holders,&nbsp;attackers&nbsp;appear&nbsp;to&nbsp;be&nbsp;specifically&nbsp;targeting&nbsp;them.&nbsp;Attackers&nbsp;are&nbsp;cloning&nbsp;and&nbsp;distributing&nbsp;a&nbsp;near-pixel&nbsp;copy&nbsp;of&nbsp;the&nbsp;original&nbsp;site,&nbsp;catching&nbsp;some&nbsp;users&nbsp;off&nbsp;guard.&nbsp;They&nbsp;are&nbsp;aware&nbsp;that&nbsp;users&nbsp;are&nbsp;also&nbsp;on&nbsp;the&nbsp;alert&nbsp;to&nbsp;avoid&nbsp;getting&nbsp;hacked&nbsp;and&nbsp;losing&nbsp;valuable&nbsp;assets. Because\u00a0blockchain\u00a0solutions\u00a0are\u00a0noncustodial,\u00a0the\u00a0controller\u00a0of\u00a0the\u00a0wallet&#8217;s\u00a0private\u00a0keys\u00a0must\u00a0first\u00a0validate\u00a0the\u00a0transaction\u00a0before\u00a0it\u00a0can\u00a0be\u00a0irreversibly\u00a0confirmed\u00a0on\u00a0the\u00a0network.\u00a0As\u00a0a\u00a0result,\u00a0by\u00a0publishing\u00a0a\u00a0flawless\u00a0front-end,\u00a0attackers\u00a0may\u00a0concentrate\u00a0on\u00a0exploiting\u00a0end-user\u00a0approval,\u00a0which\u00a0is\u00a0arguably\u00a0the\u00a0only\u00a0weakness\u00a0in\u00a0blockchain\u00a0metaverse\u00a0and\u00a0NFT\u00a0sites.\u00a0Hackers\u00a0have\u00a0also\u00a0successfully\u00a0extracted\u00a0private\u00a0keys,\u00a0which\u00a0are\u00a0passphrases\u00a0required\u00a0for\u00a0transaction\u00a0confirmation,\u00a0according\u00a0to\u00a0Guardio\u00a0analysts. How\u00a0to\u00a0Stay\u00a0Safe\u00a0in\u00a0Crypto Crypto\u00a0developments\u00a0such\u00a0as\u00a0the\u00a0Metaverse\u00a0and\u00a0NFTs\u00a0are\u00a0intriguing,\u00a0but\u00a0they\u00a0are\u00a0still\u00a0in\u00a0their\u00a0infancy.\u00a0Attackers\u00a0are\u00a0on\u00a0the\u00a0hunt,\u00a0waiting\u00a0to\u00a0extort\u00a0cash\u00a0and\u00a0private\u00a0keys\u00a0from\u00a0unsuspecting\u00a0victims\u00a0at\u00a0any\u00a0time.\u00a0Due\u00a0diligence\u00a0is\u00a0required\u00a0to\u00a0stay\u00a0safe.\u00a0As\u00a0the\u00a0first\u00a0line\u00a0of\u00a0defense,\u00a0always\u00a0use\u00a0a\u00a0reliable\u00a0antivirus\u00a0product. As&nbsp;a&nbsp;general&nbsp;guideline,&nbsp;never&nbsp;disclose&nbsp;the&nbsp;private&nbsp;keys&nbsp;to&nbsp;your&nbsp;wallet&nbsp;with&nbsp;anyone,&nbsp;no&nbsp;matter&nbsp;how&nbsp;convincing&nbsp;they&nbsp;seem.&nbsp;Users&nbsp;should&nbsp;also&nbsp;double-check&nbsp;that&nbsp;they&nbsp;are&nbsp;accessing&nbsp;the&nbsp;correct&nbsp;website&nbsp;and&nbsp;not&nbsp;a&nbsp;clone&nbsp;with&nbsp;obvious&nbsp;mistakes.<\/p>\n","protected":false},"author":32,"featured_media":19645,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,5794,21],"tags":[132,7748,4617],"class_list":["post-19635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrencies","category-metaverse-news","category-news","tag-crypto","tag-matamask","tag-metaverse"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/03\/metamask-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/19635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=19635"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/19635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/19645"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=19635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=19635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=19635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}