In recent weeks, a deceptive phishing scam has been targeting MetaMask users via email. The scam email carries the subject line “ACTION REQUIRED!!” and claims to be from MetaMask Online. It states that a suspicious login attempt has been detected, instructing the recipient to review their account settings and take action due to an alleged threat.
This is a scam designed to steal users’ private keys and drain their cryptocurrency wallets. MetaMask would never send an email asking users to connect their wallets or input private information. While the email contains some convincing details like a fake IP address and location, it should be regarded as fraudulent.
In this guide, we’ll break down exactly how the scam works, what to do if you receive the email, and steps to take if you have fallen victim to protect your funds.

Overview of the Metamask “Action Required” Scam
The deceptive email follows a standard phishing format, instructing the recipient to take urgent action to secure their account. It contains:
- A subject line of “ACTION REQUIRED!!,” styled with two exclamation points to spur urgency in the reader. This is a common tactic of phishing scams to get recipients to open the email quickly.
- Claims that MetaMask Online has detected a “suspicious login attempt” to the recipient’s account. MetaMask Online is a completely fabricated entity, not associated with the real MetaMask service. Scammers utilize false claims of detecting suspicious activity to create urgency.
- Details of the alleged suspicious login attempt including the location, IP address, and user agent associated with it. For example, the email may state the attempt came from China, listing a random IP address, and false user agent like “Mozzila/5.0”. These types of credible details are fabricated by scammers to add legitimacy to phishing emails.
- Instructions stating that the recipient must review their account settings immediately and verify the activity by connecting their crypto wallet. This is the trap! Scammers give firm instructions to connect wallets urgently in order to steal funds. No genuine service would make such requests by email.
- Recommended actions for the recipient to take, such as restoring their account access by entering private keys or seed phrases. This grants the scammer full access to steal cryptocurrency.
The scam creatively combines several effective phishing techniques including:
- Subject lines styled for urgency like “ACTION REQUIRED” in all caps with exclamation points. This triggers recipients to open the email quickly.
- Claims of detecting “suspicious activity” to make the user feel their account is compromised. Fear is used as a powerful motivator.
- Fake entities like “MetaMask Online” to create a false sense of legitimacy in the sender.
- Fabulous specific details like IP addresses, locations, and browser user agents to lend credibility.
- Firm instructions and recommended actions to “restore access” or “verify activity” by connecting wallets or inputting private keys. This grants scammers access.
The email cleverly combines urgency, official branding, and credible details to convince recipients to click links and connect their wallets. But it is entirely fraudulent, aimed at stealing funds once scammers gain wallet access. No action should be taken.
How the Metamask “Action Required” Scam Works
The Metamask “Action Required” phishing scam operates in distinct steps designed to steal cryptocurrency funds from victims:
1. Scam Email is Sent Out
The scammers acquire email addresses through illegal means such as malware attacks, data breaches, or purchasing lists on the dark web. They then send out the phishing email en masse to MetaMask user inboxes. The urgent “Action Required” subject line encourages recipients to open the scam message quickly.
2. Recipient Opens the Deceptive Email
Seeing the subject styled with urgency, the recipient opens the email to read further. The fabricated details seem legitimate and security concerns are raised for the recipient about their wallet’s safety.
3. Fake Sender Name and Story Builds Trust
The email claims to be from “MetaMask Online,” a fake entity name crafted to sound like the real service. Claims of detecting suspicious activity such as an unauthorized login attempt build trust and heighten urgency.
Here is how the email scam might look:
Subject: ACTION REQUIRED !!
METAMASK ONLINE<supports@flowcreativeevents.com></supports@flowcreativeevents.com>to XXXXX
Suspicious login attempt detected.
Review your account settings for any signs of suspicious activity.
This access was from the following source:
Location
ChinaIP Address
61.121.143.22Agent
Mozzila/5.0 (Linux; U; Android 2.2)Verify activity
Here are some recommended actions you might want to take.
In this case, your account might be at risk. Follow these steps immediately:
Connect your wallet to restore access to your account and lift the quarantine status.
4.Technical Details Add Legitimacy
Specifics like an alleged source IP address, physical location, and browser user agent make the suspicious activity alert seem real. But the IP and user agent are completely fabricated.
5.Instructions Trigger Immediate Action
Instructions in the email urge the recipient to “connect wallet immediately” and “restore access” to verify the suspicious activity. This creates urgency to take action through the provided links.
6. Recipient Clicks Fraudulent Links
Believing the urgency and details in the scam email, the recipient clicks on a fraudulent link provided. This leads to a fake site cloned to mimic the real MetaMask login page.
7. User Inputs Private Key on Fake Site
On the cloned scam site, the recipient enters their seed phrase or private account key believing they are securing their wallet. But this grants the scammer full access.
8. Scammer Empties the Victim’s Wallet
Within minutes of gaining access through the inputted private key, the scammers rapidly drain the victim’s cryptocurrency wallet, transferring funds to their own wallets.
9. Scam Completes as Victim Losses Funds
The victim is disconnected from their drained wallet, having lost all of their cryptocurrency funds to the scammers in a matter of minutes. The phishing scam is complete.
10. Scammer Vanishes Without a Trace
With the victim’s funds in their possession, the scammers disconnect and disappear. They cover their tracks to remain anonymous, leaving the victim with no recourse to recover stolen funds.
By understanding each step in the scam process, MetaMask users can recognize warning signs and missteps to avoid before it’s too late. Never input private keys or seed phrases from unsolicited email links.
What to Do If You Receive the Scam Email
If the fraudulent MetaMask email lands in your inbox, here are the steps to take:
- Do Not Click Any Links: The email contains fraudulent links. Do not click them under any circumstances.
- Check the Send Address: The email does not come from an official MetaMask domain. Double check the sender address.
- Forward to Phishing@metamask.io: Forward the scam email to MetaMask’s phishing address to report it. This helps them identify threats.
- Ignore Instructions: Disregard all instructions in the email urging you to restore access or verify activity. MetaMask would never make such requests by email.
- Do Not Reply: Do not engage with the scammer or reply to the email in any way.
- Refresh Bookmarks: Refresh your MetaMask bookmarks in case the scam email came from a compromised legitimate address.
- Run Security Checks: Scan your device for malware in case your address was compromised through malware or a breach.
- Monitor Account Activity: Log into your verified MetaMask account to monitor activity and ensure no unauthorized access has occurred.
Following these steps can help protect you from being deceived or falling victim to the scam.
What to Do If You Fell Victim to the Scam
If you already connected your wallet or input your private key into a fake MetaMask site through the scam email, here are the steps to take immediately:
- Disconnect Wallet: If still connected, immediately disconnect your wallet from the scam site.
- Transfer Remaining Funds: Check your wallet balance and transfer any remaining funds out to a new safe wallet address not compromised.
- Get New Wallet: Generate a wholly new wallet with a fresh seed phrase. Make sure your device is clean.
- Inform Exchanges: Contact any linked exchanges to inform them your previous wallet was compromised. Enact enhanced security protocols.
- Scan for Malware: Run malware scans to check if any remote access malware was installed. Remove any infections found.
- Reset Passwords: Change passwords on all crypto-related accounts, including exchanges. Enable 2FA for enhanced security.
- Contact MetaMask Support: Reach out to MetaMask support to notify them of the scam so they can attempt to track the scammers.
- Report to Authorities: File reports about the scam with local law enforcement and cybercrime authorities so they can investigate further. Provide all details available.
Though losses may not be recoverable, these steps can help secure your new wallet and re-establish protections against future scams. Learn from the experience and arm yourself with knowledge against the next attempt.
Frequently Asked Questions About the Metamask “Action Required” Scam
1. What is the Metamask “Action Required” scam email?
The “Action Required” scam is a phishing email sent to Metamask users claiming that a suspicious login attempt was detected. It instructs users to urgently connect their wallet to verify activity. This is a scam to steal crypto funds. The email is not from MetaMask.
2. What details are included in the phishing email?
The email includes a subject line “ACTION REQUIRED!!” to spur urgency. It claims to be from “Metamask Online” and states suspicious activity was seen from an IP address and location. It provides instructions to connect your wallet immediately.
3. Is MetaMask Online a real company?
No, MetaMask Online is a fake entity used by scammers to make the email seem legitimate. MetaMask would never contact users this way.
4. What is the goal of this phishing scam?
The goal is to trick users into clicking links in the email and connecting their cryptocurrency wallets. This grants the scammers access to steal funds from the wallet.
5. How can I identify this Metamask scam email?
Look for an urgent subject line demanding action, claims of suspicious activity, instructions to connect your wallet, and an entity like “Metamask Online” as the sender.
6. What should I do if I receive this scam email?
Do not click any links, forward the email to phishing@metamask.io, check the sender address, ignore all instructions, and monitor your verified MetaMask wallet account.
7. What steps should I take if I fell for the scam?
Disconnect your wallet immediately, get a new wallet and seed phrase, inform exchanges, run malware scans, reset account passwords, contact MetaMask support, and report the scam to authorities.
8. How can I prevent falling for the Metamask phishing scam?
Never click links in unsolicited emails, double check sender addresses, avoid entering seed phrases anywhere, use 2FA on your wallet, and monitor account activity closely.
9. Who is responsible for this phishing scam targeting Metamask users?
Cybercriminal groups are likely behind the scam, obtaining email lists through illegal means. MetaMask is not responsible but does assist law enforcement investigations.
10. Where can I learn more about cryptocurrency phishing scams?
MetaMask’s website has guides on identifying phishing scams. Crypto news sites also provide scam warnings as new threats emerge targeting the crypto community.
The Bottom Line
The MetaMask “Action Required” phishing scam is a crafty deception aimed at draining victims’ crypto wallets by exploiting urgency and emotion. But armed with the knowledge of how the scam operates, users can avoid the trap.
Be vigilant against phishing, never click suspicious links, use 2FA, and monitor wallet activity closely. If unfortunately ensnared, cut losses, get a new secure wallet, and report the scam to all appropriate authorities. There are always nefarious actors looking to steal crypto through deception – but an informed community can guard against them.