Back

Phishing Emails Targeting Robinhood Users Exploit Legitimate Infrastructure

Severity: High (Score: 69.0)

Sources: Mexc, Bitget

Summary

Ripple's former CTO David Schwartz has issued a warning about a phishing campaign targeting Robinhood users through seemingly legitimate emails. These emails appear to originate from Robinhood's own email system, successfully passing authentication checks like SPF, DKIM, and DMARC. Schwartz highlighted that the emails include details such as login times, device information, and case IDs, prompting users to 'Review Activity Now.' This sophisticated attack method makes it difficult for users to distinguish between legitimate and malicious communications. The phishing emails are designed to capture user credentials by embedding malicious elements within what appears to be official correspondence. Robinhood has advised users to avoid clicking links in emails and to report any suspicious activity. The campaign comes at a time when Robinhood is expanding its operations in Asia, raising additional scrutiny around the platform's security. Schwartz's warning reflects a broader trend of evolving phishing tactics targeting crypto and trading platforms. Key Points: • Phishing emails mimic Robinhood's legitimate communication, increasing user trust. • Attackers exploit Robinhood's email infrastructure to bypass standard security checks. • Users are advised to report suspicious emails and avoid clicking links in messages.

Key Entities

  • Phishing (attack_type)
  • Robinhood (company)
  • Singapore (country)
  • robinhood.com (domain)
  • Financial (industry)
  • T1566.002 - Spearphishing Link (mitre_attack)
  • T1566 - Phishing (mitre_attack)
  • Gmail (tool)
  • MetaMask (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed