Step-by-step instructions to set up a MetaMask wallet

Bryant Nielson | January 31, 2024

Step 1: Install MetaMask

  • Go to the official MetaMask website (
  • Click on “Download Now”.
  • Choose the platform you’re using (Chrome, Firefox, Brave, or Edge).
  • Click on “Install MetaMask for Chrome” (or whichever platform you’re using).
  • You’ll be redirected to the Google Chrome web store. Click on “Add to Chrome” to install the extension.
  • After installation, click on the MetaMask fox icon at the top right of your browser to open MetaMask.

Step 2: Create a Wallet

  • Click on “Get Started”.
  • You’ll have the option to “Import Wallet” or “Create a Wallet”. Choose “Create a Wallet”.
  • You’ll be asked if you want to help improve MetaMask. Choose “I Agree” or “No Thanks” based on your preference.
  • Set a strong password and click “Create”.
  • MetaMask will now show you a secret backup phrase. This phrase is very important; it’s the only way to restore your MetaMask account. Write it down and store it somewhere safe. Click “Next” when done.
  • Confirm your secret backup phrase by selecting the previously shown words in the correct order.
  • Once your secret backup phrase is confirmed, click “All Done”.

Step 3: Funding Your Wallet

  • Open MetaMask and click on “Buy.”
  • You’ll see a few options to buy Ether. Click on the “Continue to Wyre” or “Continue to Transak” option. (Availability of these services may depend on your location)
  • You’ll be redirected to the Wyre or Transak interface. Here, you can enter the amount of USD you wish to spend.
  • Choose your payment method (debit/credit card or bank transfer).
  • Enter your billing information and click “Next.”
  • Review your order, agree to the terms and conditions, and click “Authorize Purchase.”
  • Complete the security verification.

Once the transaction is approved, the purchased Ether will be deposited into your MetaMask wallet. When you buy Ether through Wyre or Transak, the Ether is automatically purchased and sent to your MetaMask wallet, so you don’t need to perform any additional steps to purchase Ether.

Please note that depending on the payment method and service you use, the process might take some time, and fees may apply.

Also, it’s essential to double-check all information before completing the transaction, as cryptocurrency transactions are irreversible.

Step 4: Make a Transaction

  • Once you see your $5 worth of Ether in your MetaMask wallet, you’re ready to make a transaction.
  • Click on “Send” on the main MetaMask interface.
  • Enter the recipient’s Ethereum address in the “Add Recipient” field.
  • Enter the amount of Ether you wish to send.
  • Click “Next”, then “Confirm” to send the transaction.

Please note that all transactions on the Ethereum network require gas fees, which are paid in Ether, so you’ll need to have enough Ether in your wallet to cover both the transaction amount and the gas fee.

Also, keep in mind that cryptocurrency transactions are irreversible, so always double-check the recipient’s address and the amount you’re sending.

To buy Ether directly with US dollars in your MetaMask wallet, you can use services such as Wyre or Transak which are integrated into MetaMask. These services allow you to purchase cryptocurrencies using various payment methods, including debit/credit cards and bank transfers. 

Step 5: Protecting your MetaMask Wallet

Protecting your MetaMask wallet involves a variety of security practices. Here are some steps you can take to ensure the safety of your wallet:

  • Secure Your Computer: Make sure your computer is secure and free from malware. Keep your operating system and your web browser up-to-date. Use reliable security software and regularly scan your computer for malware.
  • Use a Strong Password: When you set up your MetaMask wallet, choose a strong password. It should be unique and not used for any other accounts.
  • Backup Your Seed Phrase: When you create your wallet, you’ll be given a seed phrase. This is a list of words that can be used to recover your wallet if you forget your password or lose access to your wallet. Write it down and store it somewhere safe and secure. Never share your seed phrase with anyone, and never enter it into any website or software other than the official MetaMask wallet.
  • Enable Phishing Protection: MetaMask has a built-in phishing detector. Make sure it’s enabled to protect against malicious websites.
  • Beware of Scams: Be wary of any communication asking for your password or seed phrase. MetaMask or any legitimate service will never ask for these details. Be cautious of any offers that seem too good to be true – they probably are.
  • Regularly Check Your Login URL: Always ensure you are on the official MetaMask website or using the official MetaMask browser extension. Be careful of fake websites or extensions that imitate MetaMask.
  • Use Hardware Wallets for Large Amounts: If you’re storing a large amount of cryptocurrency, consider using a hardware wallet. Hardware wallets store your private keys offline, making them immune to online hacking attempts. MetaMask can integrate with hardware wallets like Ledger and Trezor.

Hackers typically employ several techniques to attack a MetaMask wallet or any other type of cryptocurrency wallet. Below, I’ve outlined these methods along with the steps to mitigate such attacks.

  • Phishing: Hackers create fake websites or emails that resemble MetaMask or other trusted entities. They trick users into providing their private keys or seed phrases.
    Mitigation: Never give your private keys or seed phrases to anyone. MetaMask or any other service will never ask for these details. Always check the URL of the website you’re on to ensure it’s the correct one.
  • Malware: Malware on a user’s computer can log keystrokes to capture passwords or even directly steal private keys or seed phrases if they’re stored insecurely.
    Mitigation: Install a reliable security solution on your computer and regularly scan for malware. Don’t download files or apps from untrusted sources. Store your seed phrase offline and not on your computer.
  • SIM Swapping: In this attack, the hacker manages to convince the phone carrier to transfer the victim’s phone number to a new SIM card which is under the hacker’s control. This can be used to bypass 2-factor authentication (2FA).
    Mitigation: Use an authenticator app for 2FA instead of SMS. You can also set up additional security with your phone carrier to prevent unauthorized SIM swaps.
  • Man-in-the-Middle Attacks: In this type of attack, the hacker intercepts the communication between you and the MetaMask servers to steal sensitive information.
    Mitigation: Always make sure you’re on a secure (HTTPS) connection. Be cautious when using public Wi-Fi, and consider using a VPN for an extra layer of security.
  • Impersonation/Scam ICOs: Hackers impersonate legitimate services or Initial Coin Offerings (ICOs), tricking users into sending them money.
    Mitigation: Always double-check the address you’re sending funds to. Conduct thorough research before participating in an ICO or using a new service.
  • Browser Extension Attacks: Some malicious browser extensions can interact with MetaMask or even replace the MetaMask extension entirely.
    Mitigation: Be careful when installing new browser extensions. Only install extensions from trusted sources and avoid installing unnecessary extensions.

Remember, security is a continuous process and requires constant vigilance. It’s important to stay informed about the latest threats and recommended security practices.