{"id":5234,"date":"2026-01-03T23:37:46","date_gmt":"2026-01-03T23:37:46","guid":{"rendered":"https:\/\/cryptonews.uk.com\/?p=5234"},"modified":"2026-01-03T23:37:46","modified_gmt":"2026-01-03T23:37:46","slug":"what-to-check-before-you-update","status":"publish","type":"post","link":"https:\/\/cryptonews.uk.com\/?p=5234","title":{"rendered":"What to check before you &#8216;update&#8217;"},"content":{"rendered":"<p><\/p>\n<div>\n<p>On-chain security researcher ZachXBT flagged hundreds of wallets across multiple EVM chains getting drained for small amounts, typically under $2,000 per victim, funneling into a single suspicious address.<\/p>\n<p>The theft total climbed past $107,000 and kept rising. The root cause is still unknown, but users reported receiving a phishing email disguised as a mandatory MetaMask upgrade, complete with a party-hat fox logo and a \u201cHappy New Year!\u201d subject line.<\/p>\n<p>This attack arrived when developers were on holiday, support channels were running skeleton crews, and users were scrolling through inboxes cluttered with New Year promotions.<\/p>\n<p>Attackers exploit that window. The small per-victim amounts suggest the drainer operates off contract approvals rather than full seed-phrase compromise in many cases, which keeps individual losses below the threshold where victims immediately sound alarms but allows the attacker to scale across hundreds of wallets.<\/p>\n<p>The industry is still processing a separate Trust Wallet browser extension incident in which malicious code in Chrome extension v2.68 harvested private keys and drained at least $8.5 million from 2,520 wallets before Trust Wallet patched to v2.69.<\/p>\n<p>Two different exploits, same lesson: user endpoints remain the weakest link.<\/p>\n<h2>Anatomy of a phishing email that works<\/h2>\n<p>The MetaMask-themed phishing email demonstrates why these attacks succeed.<\/p>\n<p>The sender identity shows \u201cMetaLiveChain,\u201d a name that sounds vaguely DeFi-adjacent but has no connection to MetaMask.<\/p>\n<p>The email header contains an unsubscribe link for \u201c[email\u00a0protected],\u201d revealing that the attacker lifted templates from legitimate marketing campaigns. The body features MetaMask&#8217;s fox logo wearing a party hat, blending seasonal cheer with manufactured urgency about a \u201cmandatory update.\u201d<\/p>\n<p>That combination bypasses the heuristics most users apply to obvious scams.<\/p>\n<figure id=\"attachment_513510\" aria-describedby=\"caption-attachment-513510\" style=\"width: 509px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-513510 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_Wt4pk3Pdo2.jpg\" alt=\"Phishing scam sent to drained wallets\" width=\"509\" height=\"870\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_Wt4pk3Pdo2.jpg 509w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_Wt4pk3Pdo2-176x300.jpg 176w\" sizes=\"(max-width: 509px) 100vw, 509px\"\/><figcaption id=\"caption-attachment-513510\" class=\"wp-caption-text\">The phishing email impersonates MetaMask with a party-hat fox logo, falsely claiming a \u201cmandatory\u201d 2026 system upgrade is required for account access.<\/figcaption><\/figure>\n<p>MetaMask&#8217;s official security documentation establishes clear rules. Support emails come only from verified addresses, such as [email\u00a0protected], and never from third-party domains.<\/p>\n<p>The wallet provider does not send unsolicited emails demanding verification or upgrades.<\/p>\n<p>Additionally, no representative will ever ask for a Secret Recovery Phrase. Yet these emails work because they exploit the gap between what users know intellectually and what they do reflexively when an official-looking message arrives.<\/p>\n<p>Four signals expose phishing before damage occurs.<\/p>\n<p>First, brand-sender mismatch, as MetaMask branding from \u201cMetaLiveChain\u201d signals template theft. Second, manufactured urgency around mandatory updates that MetaMask explicitly says it will not send.<\/p>\n<p>Third, destination URLs that don&#8217;t match claimed domains, hovering before clicking reveals the actual target. Fourth, requests that violate core wallet rules, such as asking for seed phrases or prompting for signatures on opaque off-chain messages.<\/p>\n<p>The ZachXBT case demonstrates signature-phishing mechanics. Victims who clicked the fake upgrade link likely signed a contract approval granting the drainer permission to move tokens.<\/p>\n<p>That single signature opened the door to ongoing theft across multiple chains. The attacker chose small per-wallet amounts because contract approvals often carry unlimited spend caps by default, but draining everything would trigger immediate investigations.<\/p>\n<p>Spreading theft across hundreds of victims at $2,000 each flies under the individual radar while accumulating six-figure totals.<\/p>\n<h2>Revoking approvals and shrinking blast radius<\/h2>\n<p>Once a phishing link is clicked or a malicious approval is signed, priority shifts to containment. MetaMask now lets users view and revoke token allowances directly inside MetaMask Portfolio.<\/p>\n<p>Revoke.cash walks users through a simple process: connect your wallet, inspect approvals per network, and send revoke transactions for untrusted contracts.<\/p>\n<p>Etherscan&#8217;s Token Approvals page offers the same functionality for manual revocation of ERC-20, ERC-721, and ERC-1155 approvals. These tools matter because victims who act fast could cut off the drainer&#8217;s access before losing everything.<\/p>\n<p>The distinction between approval compromise and seed-phrase compromise determines whether a wallet can be salvaged. MetaMask&#8217;s security guide draws a hard line: if you suspect your Secret Recovery Phrase has been exposed, stop using that wallet immediately.<\/p>\n<div class=\"code-block code-block-5\" style=\"margin: 8px 0; clear: both;\">\n<div class=\"placement desktop us-deny-hide hidden\" style=\"max-height: 107px\">  <img width=\"1456\" height=\"180\" decoding=\"async\" style=\"display: block; width: 728px; max-height: 90px; max-width: 100%; margin: auto; height: 90px;\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/11\/bc_game168_Sposorship_1456x180.gif\" alt=\"BC Game\"\/><img class=\"lazyload\" width=\"1456\" height=\"180\" decoding=\"async\" style=\"display: block; width: 728px; max-height: 90px; max-width: 100%; margin: auto; height: 90px;\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2025\/11\/bc_game168_Sposorship_1456x180.gif\" alt=\"BC Game\"\/> <\/div>\n<\/div>\n<p>Create a new wallet on a fresh device, transfer remaining assets, and treat the original seed as permanently burned. Revoking approvals helps when the attacker only holds contract permissions; if your seed is gone, the entire wallet must be abandoned.<\/p>\n<p>Chainalysis documented roughly 158,000 personal wallet compromises affecting at least 80,000 people in 2025, even as total stolen value fell to approximately $713 million.<\/p>\n<figure id=\"attachment_513511\" aria-describedby=\"caption-attachment-513511\" style=\"width: 1269px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-513511 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N.jpg\" alt=\"Chainalysis data on drains\" width=\"1269\" height=\"821\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N.jpg 1269w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-300x194.jpg 300w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-1024x662.jpg 1024w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-768x497.jpg 768w\" sizes=\"(max-width: 1269px) 100vw, 1269px\"\/><img loading=\"lazy\" decoding=\"async\" class=\"lazyload wp-image-513511 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N.jpg\" alt=\"Chainalysis data on drains\" width=\"1269\" height=\"821\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N.jpg 1269w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-300x194.jpg 300w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-1024x662.jpg 1024w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_cytLzOIO2N-768x497.jpg 768w\" data-sizes=\"(max-width: 1269px) 100vw, 1269px\"\/><figcaption id=\"caption-attachment-513511\" class=\"wp-caption-text\">Personal wallet losses as a share of total crypto theft climbed from roughly 10% in 2022 to nearly 25% in 2025, per Chainalysis data.<\/figcaption><\/figure>\n<p>Attackers hit more wallets for smaller amounts, the pattern ZachXBT identified. The practical implication: organizing wallets to limit blast radius matters as much as avoiding phishing.<\/p>\n<p>A single compromised wallet should not mean total portfolio loss.<\/p>\n<h2>Building defense-in-depth<\/h2>\n<p>Wallet providers have shipped features that would have contained this attack if adopted.<\/p>\n<p>MetaMask now encourages setting spending caps on token approvals rather than accepting the default \u201cunlimited\u201d permissions. Revoke.cash and De.Fi&#8217;s Shield dashboard advocate treats approval reviews as routine hygiene alongside hardware wallet use for long-term holdings.<\/p>\n<p>MetaMask enables transaction security alerts from Blockaid by default, flagging suspicious contracts before signatures are executed.<\/p>\n<p>The Trust Wallet extension incident reinforces the need for defense-in-depth. That exploit bypassed user decisions, and malicious code in an official Chrome listing automatically harvested keys.<\/p>\n<p>Users who segregated holdings across hardware wallets (cold storage), software wallets (warm transactions), and burner wallets (experimental protocols) limited exposure.<\/p>\n<p>That three-tier model creates friction, but friction is the point. A phishing email that captures a burner wallet costs hundreds or a few thousand dollars. The same attack against a single wallet holding an entire portfolio costs life-changing money.<\/p>\n<p>The ZachXBT drainer succeeded because it targeted the seam between convenience and security. Most users keep everything in one MetaMask instance because managing multiple wallets feels cumbersome.<\/p>\n<p>The attacker bet that a professional-looking email on New Year&#8217;s Day would catch enough people off guard to generate profitable volume. That bet paid off, with $107,000 and counting.<\/p>\n<figure id=\"attachment_513512\" aria-describedby=\"caption-attachment-513512\" style=\"width: 413px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-513512 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC.jpg\" alt=\"MetaMask warns of three red flags\" width=\"413\" height=\"616\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC.jpg 413w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC-201x300.jpg 201w\" sizes=\"(max-width: 413px) 100vw, 413px\"\/><img loading=\"lazy\" decoding=\"async\" class=\"lazyload wp-image-513512 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC.jpg\" alt=\"MetaMask warns of three red flags\" width=\"413\" height=\"616\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC.jpg 413w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/01\/brave_2nYnFiWllC-201x300.jpg 201w\" data-sizes=\"(max-width: 413px) 100vw, 413px\"\/><figcaption id=\"caption-attachment-513512\" class=\"wp-caption-text\">MetaMask&#8217;s official guidance identifies three phishing red flags: wrong sender addresses, unsolicited urgent upgrade demands, and requests for Secret Recovery Phrases or passwords.<\/figcaption><\/figure>\n<h2>What&#8217;s at stake<\/h2>\n<p>This incident poses a deeper question: who bears responsibility for endpoint security in a self-custodial world?<\/p>\n<p>Wallet providers build anti-phishing tools, researchers publish threat reports, and regulators warn consumers. Yet the attacker needed only a fake email, a cloned logo, and a drainer contract to compromise hundreds of wallets.<\/p>\n<p>The infrastructure that enables self-custody, permissionless transactions, pseudonymous addresses, and irreversible transfers also makes it unforgiving.<\/p>\n<p>The industry treats this as an education problem: if users verified sender addresses, hover over links, and revoke old approvals, attacks would fail.<\/p>\n<p>Yet, Chainalysis&#8217;s data on 158,000 compromises suggests education alone doesn&#8217;t scale. Attackers adapt faster than users learn. The MetaMask phishing email evolved from crude \u201cYour wallet is locked!\u201d templates to polished seasonal campaigns.<\/p>\n<p>The Trust Wallet extension exploit proved that even careful users can lose funds if distribution channels get compromised.<\/p>\n<p>What works: hardware wallets for meaningful holdings, ruthless approval revocation, wallet segregation by risk profile, and skepticism toward any unsolicited message from wallet providers.<\/p>\n<p>What doesn&#8217;t work: assuming wallet interfaces are safe by default, treating approvals as one-time decisions, or consolidating all assets in a single hot wallet for convenience. The ZachXBT drainer will be shut down because the address is flagged, and exchanges will freeze deposits.<\/p>\n<p>But another drainer will launch next week with a slightly different template and a new contract<br \/>address.<\/p>\n<p>The cycle continues until users internalize that the convenience of crypto creates an attack surface that eventually gets exploited. The choice isn&#8217;t between security and usability, but somewhat between friction now and loss later.<\/p>\n<div class=\"post-bottom\">\n<div class=\"post-mentions\"> <span class=\"heading\">Mentioned in this article<\/span><\/div>\n<\/div>\n<\/div>\n<p>Analysis,Featured,Hacks,Wallets,Web3#check #update1767483466<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On-chain security researcher ZachXBT flagged hundreds of wallets across multiple EVM chains getting drained for small amounts, typically under $2,000 per victim, funneling into a single suspicious address. The theft total climbed past $107,000 and kept rising. The root cause is still unknown, but users reported receiving a phishing email disguised as a mandatory MetaMask<\/p>\n","protected":false},"author":1,"featured_media":5235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[727,728],"class_list":{"0":"post-5234","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-check","9":"tag-update"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to check before you &#039;update&#039; - Crypto News: Latest Cryptocurrency News and Analysis<\/title>\n<meta name=\"description\" content=\"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptonews.uk.com\/?p=5234\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to check before you &#039;update&#039;\" \/>\n<meta property=\"og:description\" content=\"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptonews.uk.com\/?p=5234\" \/>\n<meta property=\"og:site_name\" content=\"Crypto News: Latest Cryptocurrency News and Analysis\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-03T23:37:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u884c\u653f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u884c\u653f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234\",\"url\":\"https:\/\/cryptonews.uk.com\/?p=5234\",\"name\":\"What to check before you 'update' - Crypto News: Latest Cryptocurrency News and Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg\",\"datePublished\":\"2026-01-03T23:37:46+00:00\",\"author\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\"},\"description\":\"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptonews.uk.com\/?p=5234\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage\",\"url\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg\",\"contentUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=5234#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptonews.uk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to check before you &#8216;update&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptonews.uk.com\/#website\",\"url\":\"https:\/\/cryptonews.uk.com\/\",\"name\":\"Crypto News: Latest Cryptocurrency News and Analysis\",\"description\":\"Latest Crypto &amp; Bitcoin News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cryptonews.uk.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\",\"name\":\"\u884c\u653f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"caption\":\"\u884c\u653f\"},\"sameAs\":[\"http:\/\/demo3.aiwalls.com\/coinbase\"],\"url\":\"https:\/\/cryptonews.uk.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What to check before you 'update' - Crypto News: Latest Cryptocurrency News and Analysis","description":"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptonews.uk.com\/?p=5234","og_locale":"en_US","og_type":"article","og_title":"What to check before you 'update'","og_description":"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.","og_url":"https:\/\/cryptonews.uk.com\/?p=5234","og_site_name":"Crypto News: Latest Cryptocurrency News and Analysis","article_published_time":"2026-01-03T23:37:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg","type":"image\/jpeg"}],"author":"\u884c\u653f","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u884c\u653f","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cryptonews.uk.com\/?p=5234","url":"https:\/\/cryptonews.uk.com\/?p=5234","name":"What to check before you 'update' - Crypto News: Latest Cryptocurrency News and Analysis","isPartOf":{"@id":"https:\/\/cryptonews.uk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage"},"image":{"@id":"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage"},"thumbnailUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg","datePublished":"2026-01-03T23:37:46+00:00","author":{"@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf"},"description":"ZachXBT tracked $107,000 drained from hundreds of wallets through fake MetaMask emails. Here&#039;s how to spot phishing, revoke approvals, and segregate holdings before attackers strike.","breadcrumb":{"@id":"https:\/\/cryptonews.uk.com\/?p=5234#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptonews.uk.com\/?p=5234"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/?p=5234#primaryimage","url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg","contentUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/01\/hack-phishing-metamask.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/cryptonews.uk.com\/?p=5234#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptonews.uk.com\/"},{"@type":"ListItem","position":2,"name":"What to check before you &#8216;update&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/cryptonews.uk.com\/#website","url":"https:\/\/cryptonews.uk.com\/","name":"Crypto News: Latest Cryptocurrency News and Analysis","description":"Latest Crypto &amp; Bitcoin News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptonews.uk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf","name":"\u884c\u653f","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","caption":"\u884c\u653f"},"sameAs":["http:\/\/demo3.aiwalls.com\/coinbase"],"url":"https:\/\/cryptonews.uk.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/5234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5234"}],"version-history":[{"count":0,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/5234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/media\/5235"}],"wp:attachment":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}