top of page

Emerging Threats to Cryptocurrency Security: Info Stealers and Wallet Drainers

Updated: Dec 25, 2024


Overview

The cryptocurrency sector is increasingly vulnerable to a growing array of sophisticated cyber threats. Among these, Info Stealers and Wallet Drainers have emerged as potent tools for executing unauthorized transactions and extracting sensitive data such as private keys. Widely available on hidden forums and Telegram channels, these malicious tools pose a serious risk to individuals, organizations, and the broader financial ecosystem.

The implications extend beyond direct theft: these tools undermine trust in cryptocurrency platforms and challenge Anti-Money Laundering (AML) compliance by enabling illicit actors to launder stolen funds through obfuscation techniques. Mitigating these risks requires vigilance, strong cybersecurity practices, and enhanced AML protocols.


Tools and Tactics



1. Info Stealers and Wallet Drainers

Malicious tools like Zenyx Drainer and Inferno Drainer have gained popularity due to their accessibility and ease of use. These tools are marketed as complete service packages, offering seamless integration with major wallet providers, including MetaMask and TrustWallet. They come with step-by-step guides, pre-written scripts, and even customer support in underground communities.

An example of such a guide explicitly advertises:

“This code enables you to drain all main and alt-coins from any connected wallet.”

These tools eliminate the technical barrier traditionally associated with cyberattacks, allowing even non-technical users to exploit wallet vulnerabilities. Consequently, the pool of potential attackers has expanded significantly, amplifying the threat to the cryptocurrency sector.


screenshot of wallet drainer
screenshot of wallet drainer
screenshot of drainer

2. Phishing Evolution

Cybercriminals have evolved their phishing tactics, targeting the cryptocurrency ecosystem with increasingly sophisticated strategies. One such example is the case of Inferno Drainer, where claims like “Angel has taken over the entire project” circulate in underground forums to lure victims into a false sense of security. [ source


message from 'inferno team'



3. Fake Verification Bots

These bots infiltrate Telegram groups, particularly those associated with newly launched memecoins or tokens, and present themselves as legitimate security measures.

  • How They Work:

    • When users attempt to join a Telegram group, the bot requests their phone number and verification code to "authenticate" their identity.

    • Once this information is provided, attackers use it to gain access to the victim's Telegram account.

    • With access, attackers compromise connected wallets, trading bots, or impersonate the victim to propagate further phishing schemes.

  • Impact: Victims may lose funds stored in trading bots or connected wallets. Additionally, their accounts are often used to target others, creating a cascading effect of fraud.


screenshot of fake verification bot


4. Misleading DEX Screener Updates

DEX screener platforms, which provide real-time cryptocurrency data, are manipulated by attackers to mislead users into joining fake Telegram groups.

  • How They Work:

    • Attackers update the metadata of legitimate tokens on a DEX screener to include links to fraudulent Telegram groups.

    • Users who trust the DEX screener's credibility follow these links, unknowingly joining fake groups where they are subjected to phishing scams.

    • Scams include requests for private keys, wallet connections for fake airdrops, or direct fund transfers.

  • Impact: Once users fall victim, their funds are drained from wallets, and their participation in the fake group may further legitimize the scam to new entrants.



Implications for the Crypto Community


The proliferation of Info Stealers, Wallet Drainers, and advanced phishing tactics has wide-ranging consequences:

  1. Erosion of Trust: Users and investors may lose confidence in the security of cryptocurrency platforms and projects. This loss of trust can deter adoption and investment, especially among institutional players.

  2. AML Compliance Challenges: Stolen funds are often laundered using mixers, privacy coins, and cross-chain swapping, complicating compliance efforts. Criminals leverage these techniques to obscure the origin of stolen funds, bypassing traditional AML controls and enabling further illicit activities.

  3. Increased Risk of Insider Threats: The availability of these tools lowers the barrier for potential bad actors, including insiders, to execute wallet-draining schemes within organizations.


  4. Financial Losses and Ecosystem Disruption:

    • Private Key Theft: Attackers gaining access to private keys can result in the irreversible loss of cryptocurrency holdings.

    • Unauthorized Transactions: Sophisticated tools automate fund drainage, leaving victims with no recourse.

    • Compromised Communication Platforms: Telegram accounts connected to trading bots or wallets are exploited, leading to cascading financial losses and further victimization.

bottom of page