THE SIGNAL
BY
THE ARCH

Where Web3 founders, talent, and partners meet.

Directory

  • Partners Directory
  • All Categories
  • Compare Partners
  • For Founders
  • Find Your Match
  • Pricing

Get Involved

  • Get Listed
  • Submit an Event
  • Become an Operative
  • Refer a Client
  • Get Your Badge
  • 📅 Book a Call

News & Intelligence

  • Web3 News
  • Daily Digests
  • Intelligence Reports
  • Web3 Events
  • RSS Feed
  • Substack Newsletter

Company

  • About
  • How It Works
  • Manifesto
  • Demo

Legal

  • Privacy
  • Terms
  • Cookies

Resources

  • Guides
  • Sales Decks
  • Docs

© 2026 THE SIGNAL. All rights reserved.

THE SIGNAL
BY
THE ARCH

Where Web3 founders, talent, and partners meet.

Directory

  • Partners Directory
  • All Categories
  • Compare Partners
  • For Founders
  • Find Your Match
  • Pricing

Get Involved

  • Get Listed
  • Submit an Event
  • Become an Operative
  • Refer a Client
  • Get Your Badge
  • 📅 Book a Call

News & Intelligence

  • Web3 News
  • Daily Digests
  • Intelligence Reports
  • Web3 Events
  • RSS Feed
  • Substack Newsletter

Company

  • About
  • How It Works
  • Manifesto
  • Demo

Legal

  • Privacy
  • Terms
  • Cookies

Resources

  • Guides
  • Sales Decks
  • Docs

© 2026 THE SIGNAL. All rights reserved.

The Signal Logo
THE SIGNAL
PARTNERSINSIGHTSEVENTS
GET LISTED
News
MetaMask Wallets Drained in Phishing Attack: How t...
CryptoSlate•Saturday, January 3, 2026 at 10:55 PM•1 min read

MetaMask Wallets Drained in Phishing Attack: How to Spot Fake Updates

Share:
The Signal TakeBearish
MetaMaskHackPhishingDeFi

Hundreds of MetaMask wallets were drained across multiple EVM chains, with losses totaling over $107,000, according to reports. The attack involved phishing emails disguised as mandatory MetaMask upgrades, featuring a party-hat fox logo and a "Happy New Year!" subject line. The emails, sent during the holiday period, exploited users with small per-victim amounts, typically under $2,000, suggesting the drainer operated off contract approvals. The phishing email used the sender identity "MetaLiveChain" and an unsubscribe link for "reviews@yotpo.com," indicating template theft from legitimate marketing campaigns. The email falsely claimed a mandatory 2026 system upgrade was required. Users can identify phishing attempts by checking for brand-sender mismatches, manufactured urgency, destination URLs, and requests violating core wallet rules.

Read full story at CryptoSlate
Share:
📱

Never miss a Web3 update

Join our Telegram channel to receive news in real-time, straight to your phone.

Join Channel

Related News

Bitcoin slips below $68,000 heading into the weekend as dollar posts steepest weekly gain in a year

CoinDesk•1h ago

Bitcoin dip may not be over as retail ramps up buying below $70K: Santiment

Cointelegraph•1h ago

Bitcoin could crash by another 30% as four-year cycle gains strength, investment firm says

CoinDesk•1h ago

Trump’s National Cyber Strategy pledges to support crypto and blockchain

Cointelegraph•2h ago
← Back to News Feed
The Signal Logo
THE SIGNAL
PARTNERSINSIGHTSEVENTS
GET LISTED
News
MetaMask Wallets Drained in Phishing Attack: How t...
CryptoSlate•Saturday, January 3, 2026 at 10:55 PM•1 min read

MetaMask Wallets Drained in Phishing Attack: How to Spot Fake Updates

Share:
The Signal TakeBearish
MetaMaskHackPhishingDeFi

Hundreds of MetaMask wallets were drained across multiple EVM chains, with losses totaling over $107,000, according to reports. The attack involved phishing emails disguised as mandatory MetaMask upgrades, featuring a party-hat fox logo and a "Happy New Year!" subject line. The emails, sent during the holiday period, exploited users with small per-victim amounts, typically under $2,000, suggesting the drainer operated off contract approvals. The phishing email used the sender identity "MetaLiveChain" and an unsubscribe link for "reviews@yotpo.com," indicating template theft from legitimate marketing campaigns. The email falsely claimed a mandatory 2026 system upgrade was required. Users can identify phishing attempts by checking for brand-sender mismatches, manufactured urgency, destination URLs, and requests violating core wallet rules.

Read full story at CryptoSlate
Share:
📱

Never miss a Web3 update

Join our Telegram channel to receive news in real-time, straight to your phone.

Join Channel

Related News

Bitcoin slips below $68,000 heading into the weekend as dollar posts steepest weekly gain in a year

CoinDesk•1h ago

Bitcoin dip may not be over as retail ramps up buying below $70K: Santiment

Cointelegraph•1h ago

Bitcoin could crash by another 30% as four-year cycle gains strength, investment firm says

CoinDesk•1h ago

Trump’s National Cyber Strategy pledges to support crypto and blockchain

Cointelegraph•2h ago
← Back to News Feed