Scammers to Use MetaMask Removal From Chrome Store

It is not known whether they were able to benefit from their actions
26 July 2018   682

In the evening of July 25, Chrome Web Store removed the Ethereum extension MetaMask. However, the next day the plugin appeared again.

According to the MetaMask team on Twitter, the Google Chrome removed the app without warning and explainations.

MetaMask Twitter Account
MetaMask Twitter Account

Scammers used the situation. They uploaded the phishing app to the store. The attackers had five hours to realize their intentions. It is not known whether they were able to benefit from their actions.

MetaMask is an extension for Chrome, Opera, Firefox, Brave, through which the user can accept and send payments in the Ethereum and ERC-20 tokens.

Ethereum VM May Have Vulnerability

The vulnerability is reported by NettaLab Twitter account
12 November 2018   129

On November 9, a statement appeared in Netta Lab’s Twitter account that the organization discovered a vulnerability in the Ethereum virtual machine that allows to execute smart contracts endlessly without paying for gas online. The researchers also allegedly turned to the operator of the American database of vulnerabilities, where they registered the corresponding discovery.

Netta Labs discovered an Ethereum EVM vulnerability, which could be exploited by hackers. The vulnerability can cause smart contracts can be executed indefinitely without gas being paied.

Netta Lab's Twitter

At Netta Lab's request, Google demonstrates the site of the project, which specializes in auditing smart contracts under the Netta Lab brand, but the Twitter accounts of the projects do not match. Note that the profile that reported the vulnerability was registered in November.

Many users expressed doubts about the authenticity of the information that appeared, but then the creator of the NEO project Da Hongwei said that he spoke with the CEO of Netta Labs and asked the researchers to audit the NEO virtual machine.

Nevertheless, Vitalik Buterin wrote on Reddit that this is a vulnerability in the Python-implementation of the virtual machine, which was first reported on GitHub 9 days ago. This means that the main clients (go-ethereum; parity and cpp-ethereum) are not affected.