back to top
HomeNewsRipple’s CTO  flags phishing emails targeting Robinhood users

Ripple’s CTO  flags phishing emails targeting Robinhood users

-

Ripple’s former CTO David Schwartz has warned that a targeted phishing campaign has begun exploiting Robinhood users through seemingly legitimate emails ahead of the firm’s earnings report.

According to Schwartz, the attack involves emails that appear to originate from Robinhood’s own system, with authentication checks such as SPF, DKIM, and DMARC passing successfully, making the messages appear genuine to recipients. 

“WARNING: Any emails you get that appear to be from Robinhood (and may actually be from their email system) are phishing attempts,” he wrote in a post on X.

Details shared by Schwartz show that the emails include a login alert listing time, device, and a case ID, alongside a prompt urging users to “Review Activity Now.” The message layout and branding mirror official communication, yet the embedded button reportedly initiates a phishing sequence designed to capture user credentials.

Explaining the unusual delivery method, Schwartz said he believes the emails were “somehow injected into Robinhood’s actual email infrastructure,” later describing the exploit as “quite sneaky.” 

The ability to pass standard authentication checks increases the likelihood of users trusting the communication, according to his observation.

Exploit tied to email system manipulation

Insight referenced by Schwartz from Abdel Sabbah outlines a possible attack vector involving Gmail’s “dot trick,” which allows multiple variations of the same email address. Sabbah said attackers created a Robinhood account using such variations and assigned a device name embedded with malicious HTML code.

Robinhood’s system, according to Sabbah, does not sanitize this field, allowing the HTML payload to render inside official emails sent from [email protected]. The result is a fully authenticated message that appears legitimate but contains hidden malicious elements.

Phishing scams continue to target crypto users

Phishing attacks have continued to pose a persistent risk to cryptocurrency users, with multiple campaigns reported across wallet platforms in recent days.

As previously reported by crypto.news, MetaMask users were targeted by a phishing campaign that promoted a fake two-factor authentication process, according to blockchain security firm SlowMist. The spoofed emails used MetaMask branding and included a countdown timer designed to pressure users into immediate action.

SlowMist said victims who clicked the “Enable 2FA Now” prompt were redirected to a malicious website that requested their seed phrase, giving attackers full access to wallet funds. The firm noted that such campaigns often rely on small inconsistencies, including misspelled domains and unusual sender addresses, to bypass initial scrutiny.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

LATEST POSTS

Hyperliquid price forms bearish double top, will it crash back to $35?

Hyperliquid price dropped toward $39 as a bearish double top and MACD crossover raised the risk of a correction toward $35 support.

Will Toncoin price drop under $2 as bearish crossover nears confirmation?

Toncoin price slipped toward $2 after failing to hold gains near $2.90, while a bearish MACD crossover signaled rising downside risk.

Solana price climbs toward overbought zone, can buyers push past $100?

Solana price climbed above $96 as spot ETF optimism and recovering network activity fueled bullish momentum toward $100 resistance.

BNB price eyes double bottom pattern breakout, will it move past $700?

BNB price nears the $680 double bottom neckline as Grayscale and VanEck spot ETF speculation boosts bullish sentiment.

Most Popular