What would you like to read about?

  1. Homepage
  2. Posts
  3. How to Ensure You’re Running the Legitimate Version of MetaMask

How to Ensure You’re Running the Legitimate Version of MetaMask

December 18th, 2020

I’ve written this as a reaction to the recent news of an attack on a member of the community resulting in a loss of ~$8,000,000 in personal funds. After the story came to light, many people in the community were concerned and wanted to know if they were running a legitimate version of MetaMask.

First, let’s break down the facts of the recent event. Then we’ll discuss different ways you can ensure you’re running an authentic version of MetaMask (or any other browser extension).

What we know happened

  • $8,000,000 worth of NXM was transferred to an address that the user did not intend.
  • The bad actor who received the $8,000,000 had somehow planted a malicious payload into the user’s MetaMask instance.
  • It is reported that the bad actor gained remote access to the user’s machine to “install” the malicious payload.
  • It is reported that the user was not running MetaMask with the namespace nkbihfbeogaeaoehlefnkodbefgpgknn — which would indicate being installed directly from the extension store — but was running an unpacked version (browser in developer mode and extension file installed manually).
  • It is reported that the user was using a hardware wallet (specifically a Ledger device) with MetaMask to interact with, presumably, an internet-connected app.
  • The bad actor looks to have no intentions of accepting the proposed $300k bounty as of block 11462317.

Read our summary thread for more details:

How to Verify Your MetaMask Extension

There are some security controls in place within the browser extension system.

However, if a malicious actor gains remote access to the machine that you conduct cryptocurrency activity on… then you will need to do a much more in-depth audit of your system. For this purpose, we’ve published a lengthy resource, “MyCrypto’s Security Guide For Dummies And Smart People Too,” that outlines the steps that you can take to buff up your security practices.

There are a few different ways to check your instance of MetaMask:

Check the namespace of the extension you are running

This is critical to ensure you are running the extension published by the MetaMask team, especially since we have come across many malicious clones of browser extensions. As long as the author of the extension within these browser stores remains the same (as it should), the following namespaces will remain accurate.

Chromium (Brave, Google Chrome)

  • Namespace: nkbihfbeogaeaoehlefnkodbefgpgknn
Showing the extension ID in Brave


  • Extension Name: ether-metamask
Because FireFox does not have static extension ids by default, this is a way to ensure you have the correct namespace

Check the integrity of the files you’re running

This is especially important if you are running your browser in developer mode and manually installed the extension from source (or downloaded the release zip from GitHub) — this is known as running an unpacked extension.

You will need to generate a hash of each file used by the MetaMask extension and check the hashes against known-good hashes. This is an integrity check — and if the hashes differ for any file then this is a cause for concern!

mtree command to run and output of the head of the file detailing some files and hashes

We can run a command called mtree with specific arguments to create an integrity hash (sha256digest) for each file.

The Chromium engine does a checksum on the extension files before running the installed extension (known as “Extension Content Verification”). If the verification fails, then you will get a notification about the extension becoming corrupted and prompted to reinstall.

Note: The below instructions are assuming you have the extensions loaded manually (unpacked extension) — the browser’s Extension Content Verification is an adequate security control against malware modifying extension content that is downloaded from the web stores. If you have changed some settings/flags (i.e., brave://flags/#extension-content-verification) to disable/relax the ECV then you will need to evaluate your system and threat models some more and consider enforcing ECV.

Note: Your version numbers will change, consider the path in the code blocks below to be an example.


mtree -c -K sha256digest -p ~/Downloads/Extensions/MetaMask/chrome/8.1.6 > 8.1.6.mtree

Windows (you can open powershell by typing it in the address bar)

Open powershell and navigate to the folder/directory where you have the MetaMask files. Then, run the following command:

Get-ChildItem -File -Recurse | Get-FileHash -Algorithm SHA256 | Select-Object @{name="Name";expression={$_.Path}}, @{name="sha256";expression={$_.Hash}} | ConvertTo-Json | Out-File -FilePath ..\8.1.6.json

This will generate a JSON file in the parent directory with filename and sha256 hash properties.

Once you have generated this file, you will see an output of the filenames and their corresponding hashes. You can then compare them against known good hashes below. Keep in mind that these hashes will change for each version of MetaMask.



  • Read this additional great resource about this specific incident and methods to protect against it.
  • Ensure the “Extension Content Verification” flag is enabled and enforced on your browser.
  • Be cautious of malicious browser extensions impersonating a brand you trust.
  • Be aware of the risks of enabling developer mode on your browser profile.
  • Disable/remove any remote access tools from your machine.
  • Whilst it is possible for an attacker to gain the encrypted vault of MetaMask and especially so if the attacker has injected malicious JS, it is paramount you have an entropy strong master password.
  • Refresh your security hygiene knowledge by following MyCrypto Winter and reading our security materials.

Talk To Us & Share Your Thoughts

MyCrypto is an open-source tool that allows you to manage your Ethereum accounts privately and securely. Developed by and for the community since 2015, we’re focused on building awesome products that put the power in people’s hands.

© 2022 MyCrypto, Inc.


Subscribe to MyCrypto

Get updates from MyCrypto straight to your inbox!

By submitting your email, you affirmatively agree to our Privacy Policy