Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲74277.34
+
3.58%
ETHETH
💲2341.63
+
10.97%
SOLSOL
💲94.86
+
7.09%
XRPXRP
💲1.54
+
8.45%
DOGEDOGE
💲0.1020
+
7.04%
USDCUSDC
💲0.9999
+
0.01%

ENS Chief Developer Reveals Vulnerability Allowing Phishers to Imitate Google Official Alert

PANews
PANews|4月 17, 2025 00:26
According to Bitcoin.com, ENS chief developer Nick Johnson has revealed a sophisticated phishing attack that exploits vulnerabilities in Google's system, particularly the recently fixed OAuth vulnerability. According to Johnson's description, the attacker first sent a fraudulent email that appeared to be from Google's legal department, falsely claiming that the recipient's account was involved in a subpoena investigation. These emails have genuine DKIM digital signatures and are sent from Google's official no reply domain, making it easy to bypass Gmail's spam filtering. Johnson pointed out that the credibility of the scam is due to a link to a fake support portal site (Google. com) has seen a significant increase in hyperlinks. This forged Google login page exposes two major security vulnerabilities: firstly, the Google Sites platform allows for the execution of arbitrary scripts, enabling criminals to create pages that steal credentials; The second issue is that the OAuth protocol itself has flaws. Johnson condemned Google for initially viewing this vulnerability as "in line with design expectations" and emphasized that the vulnerability posed a serious threat. Even worse, fake portals exploit sites The trusted domain name (Google. com) serves as a cover, greatly reducing users' vigilance. In addition, the abuse reporting mechanism of Google Sites is not perfect, which makes it difficult for illegal pages to be closed in a timely manner. Under public pressure, Google eventually admitted to having problems. Johnson subsequently confirmed that Google plans to fix the flaws in the OAuth protocol. Security experts remind users to remain vigilant, be skeptical of any unexpected legal documents, and carefully verify the authenticity of the website before entering credentials.
+6
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

5月 15, 21:12【JPM fixes 914B resolution failure issue on public chain】
5月 14, 12:56【Blockchain brings transparency to the balance sheet】
5月 12, 22:12【NibiruChain provides faster and unified multi virtual machine blockchain】
5月 12, 09:28【Solana Smart Contract Security Best Practices Major Update】
5月 11, 01:01【Google (Gemini) is the best artificial intelligence model】
5月 09, 07:52【New vulnerabilities in TON virtual machines may cause abnormal contract execution】
5月 09, 00:23【Optimistic about OpenAI's deep research model】
5月 08, 21:48【Expanding Ethereum L1 cannot fix Ethereum】
5月 08, 16:46【Google Gemini 2.5 Pro performs excellently in AI testing】
5月 08, 13:34【Precautions for BSC users using MetaMask】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads