
MetaMask itself is not technically vulnerable; the exploit relies on social engineering and user error. | Credit: Noam Galai/Getty Images
* Scammers are targeting MetaMask users with fake “2FA security verification” pages that mimic official alerts.
* The phishing sites use countdown timers and urgency to trick victims into entering their seed phrases.
* Once the seed phrase is submitted, attackers gain complete control and can instantly drain wallets.
MetaMask, the leading non-custodial Ethereum wallet, is facing an active two-factor authentication (2FA) scam that has recently drained multiple user wallets.
Cybersecurity firm SlowMist flagged the attack on Jan. 5, noting that scammers lure victims through a series of fake web pages designed to closely mimic official MetaMask interfaces, ultimately tricking users into revealing their wallet seed phrases.
What Happened?
The attack typically begins with a phishing email or link shared via social media, direct messages, or compromised websites.
Unlike legitimate 2FA setups, which rely on codes generated by apps or devices, this scam ultimately prompts users to enter their seed phrase.
This grants attackers full control and enables them to drain funds within seconds.
Users receive unsolicited emails posing as “MetaMask Support,” with subject lines such as “2FA – Protect Your Wallet” or “Action Required: Secure Your Wallet with 2FA.”
The emails claim that 2FA is becoming mandatory to prevent unauthorized access and often impose a fake deadline to create urgency.
They feature the MetaMask fox logo and include a button labeled “Enable 2FA Now!”
Clicking the button redirects users to a phishing site with a domain closely resembling MetaMask’s, often using typosquatting techniques such as “matamask” instead of “metamask.”
The site displays a fake security alert warning of potential risks and urges immediate action.
Users are then guided to a counterfeit 2FA verification interface that includes realistic elements, such as countdown timers (e.g., “Complete in 5 minutes or risk account restriction”), to pressure quick compliance.
The final step asks users to enter their 12- or 24-word seed phrase under the pretense of “verifying wallet ownership” or “completing security setup.”
Some versions include a fake “authenticity check” to build trust.
Once entered, the phrase is sent to the attackers, who can import the wallet elsewhere and transfer all assets instantly.
Users Risk Losing Their Total Holdings
MetaMask itself is not technically vulnerable; the exploit relies on social engineering and user error.
As this specific 2FA variant was first publicly reported on Jan. 5, 2026, detailed loss figures have not yet been widely disclosed.
However, early indicators suggest a rapid potential for loss due to the direct theft of seed phrases.
Similar MetaMask phishing campaigns, such as the “mandatory update” scam, were flagged by on-chain investigator ZachXBT just days prior.
These scams have drained over $107,000 from hundreds of wallets across EVM chains.
Victims typically lose small amounts per wallet ($500-$2,000), making the thefts initially harder to detect and trace.
Funds are funneled to attacker-controlled addresses, often in stablecoins or ETH, with total ecosystem losses from MetaMask-related scams estimated in the millions annually.
If you’ve fallen victim, immediately disconnect the wallet from suspicious sites and transfer any remaining funds to a new wallet.
Staying vigilant is key in Web3; MetaMask emphasizes that security begins with user awareness.
How To Avoid Such Scams
First and foremost, it’s crucial for users holding assets in online wallets and self-custodial wallets to be wary of such attacks.
Always remember: no wallet, whether hardware or software, custodial or non-custodial, should ever ask for your seed phrase.
However, due to the sophistication of these scams, it’s hard to detect them all the time.
Here’s a step-by-step guide to always double-check any such emails, creating urgency:
Read more on CCN – Capital & Celeb News

