A crypto drainer is a malicious script designed to steal cryptocurrency from your wallet. Unlike regular phishing attacks that try to capture login credentials, a crypto drainer tricks you into connecting your wallets, such as MetaMask or Phantom, and unknowingly authorizing transactions that grant them access to your funds.
Disguised as a legitimate Web3 project, a crypto drainer is usually promoted via compromised social media accounts or Discord groups. Once you fall prey to the fraud, the drainer can instantly transfer assets from the wallet.
Crypto drainers may take various forms:
Crypto drainers are a growing threat in Web3, enabling quick, automated theft of crypto assets from unsuspecting users through deception. Common methods of crypto drainers include:
DaaS elevates the threat of crypto drainers by commercializing them. Just like software-as-a-service (SaaS) platforms, DaaS platforms sell ready-to-use malware kits to cybercriminals, often in exchange for a percentage of the stolen funds.
In the DaaS model, developers offer turnkey draining scripts, customizable phishing kits and even integration help in exchange for a share of the stolen funds. A DaaS offer might be bundled with social engineering support, anonymization services and regular updates, making them attractive even to low-skill scammers.
Types of crypto DaaS tools include:
Did you know? According to Scam Sniffer, phishing campaigns using wallet drainers siphoned off over $295 million in NFTs and tokens from unsuspecting users in 2023.
What crypto DaaS kits include
Crypto DaaS kits are pre-built toolsets sold to scammers, enabling them to steal digital assets with minimal technical skill. These kits typically include phishing page templates, malicious smart contracts, wallet-draining scripts and more.
This is what crypto DaaS kits generally include:
With DaaS kits available for as little as $100 to $500, or through subscription models, sophisticated crypto attacks are no longer limited to experienced hackers. Even the inexperienced can now access these scripts with a small budget, effectively democratizing this type of crime.
Did you know? Advanced DaaS tools often update scripts to evade detection from browser extensions like WalletGuard and security alerts issued by MetaMask or Trust Wallet.
Evolution of crypto drainers as prominent fraudulent activity
The threat landscape of cryptocurrency fraud is constantly evolving. Emerging around 2021, crypto drainers have rapidly transformed the landscape. Their ability to stealthily siphon funds from users' wallets has made them a threat that demands vigilance.
Drainers specifically designed to target MetaMask began to emerge around 2021 and were openly advertised on illicit online forums and marketplaces.
Here are some prominent drainers that have been around for some time:
In the wake of the US Securities and Exchange Commission’s X account being compromised in January 2024, Chainalysis found a crypto drainer acting as the SEC. This led users to connect their wallets in an attempt to claim nonexistent airdropped tokens.
According to a Kaspersky Security Bulletin, dark web threads discussing crypto drainers rose sharply in 2024, jumping by 135% to 129 threads from 55 in 2022. These conversations encompass a wide range of topics, including buying and selling malicious software and forming distribution teams.
As the following chart demonstrates, crypto drainers have been stealing crypto at a faster quarterly growth rate than even ransomware.
Spotting a crypto wallet drainer attack early is crucial to minimizing potential losses and securing your assets. You must be careful, as a sophisticated drainer attack can sometimes evade standard alert mechanisms. You must remain vigilant even while relying on automated tools.
Here are a few indicators that your wallet may be under threat:
To protect your crypto wallet from DaaS attackers, adopting strong, proactive security practices is essential. Blockchain monitoring tools can help identify suspicious patterns linked to drainer activity, allowing you to respond quickly.
Here are key strategies to help protect your digital assets:
Swift action is essential if you suspect your crypto wallet has been compromised. Though fund recovery is rare, quick action can limit further losses.
Here are the steps you need to take if you suffer from a crypto DaaS attack:
All Rights Reserved. Copyright , Central Coast Communications, Inc.