អ្នក​ប្រើ​ត្រូវ​បាន​កំណត់​គោលដៅ​ដោយ​ការ​វាយ​ប្រហារ​បន្លំ​តាម​រយៈ​កូដ​ផ្សាយ​ពាណិជ្ជកម្ម​ព្យាបាទ​ជាក់ស្តែង​នៅ​លើ​គេហទំព័រ​ទិន្នន័យ​គ្រីបតូ

ធ្វើបច្ចុប្បន្នភាព (6:15 រសៀល ET)៖ In a follow-up message, CoinGecko បាននិយាយថា: that its investigation pointed to crypto ad platform Coinzilla as the source of the phishing attack code, saying:

“The situation is caused by a malicious ad script by Coinzilla, a crypto ad network – we have disabled it now but there may be some delay due to CDN caching. We are monitoring the situation further. Do stay on alert and don’t connect your Metamask on CoinGecko.”

The headline of this report has been updated.


Word emerged late Friday afternoon about an apparent phishing attack targeting users of popular crypto data sites like Etherscan and CoinGecko.

Affected users received prompts to connect their MetaMask wallets to a website called “nftapes.win”.

នៅក្នុងធ្វីតធរ កាក់ហ្គេកកូ said: “If you are on the CoinGecko website and you are being prompted by your Metamask to connect to this site, this is a SCAM. Don’t connect it. We are investigating the root cause of this issue.”

ទទួលបានព័ត៌មានសង្ខេបប្រចាំថ្ងៃ Crypto របស់អ្នក។

ដឹកជញ្ជូនជារៀងរាល់ថ្ងៃ ត្រង់ទៅកាន់ប្រអប់សំបុត្ររបស់អ្នក។

Etherscan said in a tweet on the matter: We’ve received reports of phishing popups via a 3rd party integration and are currently investigating. Please be careful not to confirm any transactions that pop up on the website.”

“Interim we’ve taken immediate action to disable the said 3rd party integration on Etherscan,” the site said in a subsequent tweet. 

Though the precise cause has not been confirmed, initial indications suggest that malicious code via ads on the affected sites is the vector for the phishing attack.

DexTools, another crypto-focused app site, is also affected. In its tweet, DexTools appeared to blame a crypto ad platform known as Coinzilla. 

“We are disabling all ads until the situation is clarified by @adsbycoinzilla. Please be aware and don’t sign suspicious requests at your wallet. DEXTools does not automatically request any permissions.”

This is a breaking news story and will be updated as more information becomes available.

Source: https://www.theblockcrypto.com/linked/146937/users-targeted-by-phishing-attack-via-third-party-integrations-on-crypto-data-sites?utm_source=rss&utm_medium=rss