The cryptocurrency industry has had a concerning rise in sophisticated phishing attacks.
By employing a crypto wallet-draining technique, these threats are distinct in that they target a broad spectrum of blockchain networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and nearly twenty more networks.
A cryptocurrency draining kit is designed to simplify cyber theft by draining money from digital wallets.
It mostly uses phishing scams to trick victims into entering their wallet information on fake websites.
Crypto drainers, or cryptocurrency stealers, are malicious programs or scripts that steal cryptocurrency from users' wallets without their permission.
According to Check Point's research, attackers create phishing or fake airdrop campaigns, which are frequently advertised via email or social media and offer free tokens to entice consumers.
When users try to claim these tokens, they are redirected to a fake website that seems like an official platform for token distribution.
Users are asked to connect their wallets to the website, preparing for the subsequent attack phase.
Under the pretense of claiming an airdrop, the user is tricked into interacting with a malicious smart contract that covertly increases the attacker's allowance by using features like approve or permit.
By unintentionally giving the attacker access to their money, the user permits token theft to occur without additional user input.
The attackers employ techniques like mixers and numerous transfers to hide their traces and sell the stolen items.
Token holders can authorize a spender, like a smart contract, to move tokens on their behalf using the permit feature in ERC-20 tokens.
This process eliminates the need for an on-chain transaction for each approval.
Researchers discovered a recurring address: 0x412f10aad96fd78da6736387e2c84931ac20313f and 0x0000d38a234679F88dd6343d34E26DCB50C30000, which is known as the Angel Drainer address.
The group has been connected to some criminal operations, such as draining cryptocurrency wallets using sophisticated phishing scams.
Using technology tools and being vigilant is the key to preventing these phishing attacks.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 26 Dec 2023 14:45:04 +0000