MailerLite has confirmed reports of the hackers gaining access to customers’ accounts that led to a calculated crypto phishing exploit targeted at popular web3 firms.
On Jan 23, the email marketing company released a detailed explanation of the events leading up to the hack and subsequent phishing attacks on web3 firms. The attack led to approximately $3.3 million in crypto assets drained from users.
“Today on January 23rd, 2024, at 7:52 am UTC time MailerLite, providing email marketing services to you became aware of a cyber security incident that happened on January 23rd, 2024 at 00:11 AM UTC time that affected several accounts in the cryptocurrency sphere.”
The firm mentioned that upon notice of the incident, it blocked the bad actor’s method of entry, resolving all issues, and can confirm that the breach was “fully stopped.”
According to the firm’s internal investigation, a customer support team staff member was the point of access by hackers after the team member responding to an inquiry clicked on an image.
Linked to a fraudulent Google sign-in page, the user authenticated the process through a mistaken phone confirmation leading to the broader breach in the admin panel.
Per the report, the hackers took it further by executing a password reset in the admin panel of the impersonator user email accounts. What’s more, only cryptocurrency-related accounts were targeted.
The incident that rocked crypto spaces saw a total of 177 MailerLite accounts impacted, although the phishing campaign targeted a small number of companies.
“This breach underscored the need for heightened vigilance and robust security protocol, especially in handling seemingly routine support interactions,” the company added.
Blockchain security firm
Read more on cryptonews.com