About a 5 weeks ago my Metamask/Brave wallet was hacked for 2 eth…had not even opned either wallet for several months prior…no other crypto activity either…contacted both Brave & Metamask…asolutely not help….just accused me of poor stewardship of keys, etc…so wondering if anyone else has had similiar issues…never understoon why, when I set up the Brave wallet it used the same SIP as my metamask and was always linked in a strange way…have had the Brave wallet for a couple of years but never put much in it…havd had the Metamask wallet sinc 2019…never much in that either…put most coins onto a Ledger over a year ago…seems there is something strange somewhere but no one “in authority” at Brave or MM wants to disuss this…
Hello, sorry to hear this happened to you. When did you contact Brave? Do you have a previous ticket number?
Typically, scams and phishing can occur a few ways:
-
Signing a malicious transaction
-
Downloading a malicious third party extension or app
-
If your recovery phrase or private keys have been compromised or provided to someone
-
Copying/Pasting a similar address or potentially becoming a victim of address poisoning
EDIT: It appears we have an open DM with you already and have not heard back since our most recent reply. Please feel free to reach back out through the DM if you would like to discuss any further. Thanks!
Thanks for the note…could dig out the contact details but not sure it would be worth the trouble…all I ever saw was the same list you attached here, to which I emphatically answered NO to all, but no one seems to want to dig deeper…thus the post, wondering if others have had similar experience.
Keep returning to the odd link between Brave and Metamask…always though MM was super secure but that is where the theft occurred…have the Ethscan info…had not opened either wallet for months…
Transaction hash: 0xac608a2d6aee4847d42abaac57e826f93e24ae7c4b4062fde01c9607b1fe4597.
Recipient address: 0xD0b40d3A4d355fA5194a97Bc23D08F3b500a4391.
So again, appreciate your response…am willing to spend some time digging into this if someone would give some specific things to check against those boilerplate possibilities but I am not a SM guy, do only do basic computing, and am aware of the major risk factors with crypto…so find it hard to see how any of those threats were optimized..
Maybe we’ll see a couple more responses to this post…regards, Web Wilson
This is related to the recovery phrase. If you previously used the legacy Import from MetaMask feature when creating a Brave Wallet, the recovery phrase would be the same. If you imported it manually from MM, it would still be the same as MetaMask.
Keep returning to the odd link between Brave and Metamask
If the same recovery phrase was used for both wallets, then the addresses and transactions would be the same, which would explain the link you’re seeing. You can find more on this here: https://support.brave.app/hc/en-us/articles/16291144373261-What-is-a-Recovery-Phrase
Transaction hash: 0xac608a2d6aee4847d42abaac57e826f93e24ae7c4b4062fde01c9607b1fe4597.
The address the ETH was sent from shows no signatures or approvals on it.
It is possible the recovery phrase was compromised or a malicious app or extension was installed.
thanks for the input…sounds like that’s what I did…seemed to make sense at the time but does not make sense now…what is the point in having a SIP that can be transferred over the Internet with just a couple of clicks?…anyhow, after the hack I did run some deep scans on my computer but they turned up nothing…would think that if I had caught something malignent it would show up…if really bad, it would have gone after my other accounts…guess “Revoke Cash” is closing the barn after the horse has escaped?…just odd that both wallets were dormant for months, then hacked, and just a few days later I opened them by chance…also, this is not a good look for MM which I always thought was very secure…
