A deep dive into the ENS phishing scam that impersonated Google legal threats, revealing how Web3 identity remains vulnerable to social engineering.
Share
Subscribe to the AlphaWire Newsletter
It started with an email—clean, professional, and terrifying. Sent from what appeared to be legal@google.com, the message warned users of a subpoena related to trademark infringement. The target? Their Ethereum Name Service (ENS) domains.
This scam, highlighted by Nick Johnson, a senior developer and founder of ENS, exploits Google’s infrastructure to appear legitimate, posing a significant risk to the 1.8 billion Gmail users worldwide
The email didn’t ask for passwords or seed phrases. Instead, it led recipients to a spoofed website mimicking Google’s legal request portal. From there, users were instructed to “confirm ownership” by signing a wallet transaction. But behind the scenes, that signature triggered a smart contract function, draining their assets.
This wasn’t your average phishing attempt. The attackers used DNS spoofing, forged SPF/DKIM email headers, and even included PDF attachments with fabricated legal threats. Many victims reported seeing exact replicas of Google’s subpoena documentation, adding to the credibility of the fraud.
The entire scheme weaponized one powerful assumption: that a legal threat from a tech giant must be real. For many users, especially those operating under their real ENS identities, the fear of lawsuits or account bans was enough to comply, no matter how suspicious the situation seemed.
The attackers behind the Google subpoena scam executed a highly sophisticated phishing campaign that exploited both technical vulnerabilities and psychological manipulation.
This multi-layered attack underscores the evolving tactics of cybercriminals, who now leverage legitimate platforms and sophisticated techniques to deceive users. The combination of technical exploitation and psychological manipulation made this phishing campaign particularly effective and dangerous.
ENS users weren’t chosen at random—they were targeted because of how visible and personalized their on-chain identities are.
Unlike random wallet addresses, ENS domains often carry real names, brands, or affiliations (like vitalik.eth or yourcompany.eth). This makes them easier to track, more trustworthy in social contexts, and perfect bait for phishing attacks.
To an attacker, an ENS name does two things:
Because ENS names are tied to Web3 usernames, they create a layer of pseudo-transparency that can be used against the user. Attackers can scrape ENS name registries, find active wallets, and build custom scams that feel personal, like the fake legal threats seen in this campaign.
In short, ENS domains are both a badge of identity and a soft target. That visibility, while great for branding and UX, can backfire when bad actors are watching.
The recent ENS-targeted phishing scam underscores the evolving sophistication of cyber threats. To safeguard against such attacks, it’s crucial to understand their mechanics and adopt proactive security measures.
By staying vigilant and adopting these practices, you can significantly reduce the risk of falling victim to sophisticated phishing scams.
This wasn’t just a scam—it was a preview of a new category of attacks: legal engineering. Rather than brute-forcing wallets or stealing private keys, attackers used the illusion of law to pressure users into compliance.
As crypto matures, its interfaces are becoming more personal, thanks to services like ENS, Lens, and Farcaster. These tools create recognizable digital identities, but they also introduce attack surfaces shaped by trust, not code.
Fake subpoenas, impersonated law firms, and manipulated legal threats are harder to detect than malware. They feel real. And because Web3 users are often self-custodied and self-managed, they’re also more isolated, with no support desk to double-check a legal email.
The takeaway is this: Web3 identity brings great UX benefits, but also introduces new forms of social and psychological risk. Scams are evolving beyond fake tokens and airdrops. Now, they’re blending code, context, and credibility.
As modular identity systems expand, developers and users will need to build defenses not just against technical exploits, but narrative ones too.
The recent phishing attacks targeting ENS users highlight a critical vulnerability in the Web3 ecosystem: the exploitation of trust. As decentralized technologies evolve, so do the tactics of malicious actors who seek to undermine them.
Web3 aims to eliminate the need for intermediaries, placing trust in code and decentralized protocols. However, this shift doesn’t eradicate the human element. Users still rely on interfaces, domain names, and perceived authority figures, making them susceptible to social engineering attacks.
ENS domains, while enhancing user experience by replacing complex wallet addresses with readable names, inadvertently introduce new attack vectors. These human-readable identifiers can be easily targeted, as they often correlate with public personas or brands, making phishing attempts more convincing.
To enhance trust within the Web3 ecosystem, several key strategies are essential. First, implementing rigorous verification systems is crucial to enable users to confidently distinguish genuine communications from fraudulent ones, reducing the risk of deception.
Additionally, providing continuous user education on potential risks and safe practices is vital, encouraging individuals to approach unsolicited messages, particularly those using urgency or authority—with caution.
Furthermore, fostering collaborative efforts across the community is necessary to quickly identify and mitigate threats, with members sharing critical information about scams and vulnerabilities to strengthen collective security. By pursuing these approaches, Web3 can build a more trustworthy and resilient environment for all users.
Share
