{"id":22356,"date":"2024-02-06T19:53:53","date_gmt":"2024-02-06T15:53:53","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22356"},"modified":"2024-02-06T19:53:53","modified_gmt":"2024-02-06T15:53:53","slug":"what-is-a-crypto-wallet-drainer","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/22356\/","title":{"rendered":"What crypto drainers are, and how to fend them off"},"content":{"rendered":"<p>A new category of malicious tools has been gaining popularity with crypto scammers lately: crypto wallet drainers. This post will explain what crypto drainers are, how they work, what makes them dangerous\u00a0\u2014 even for experienced users\u00a0\u2014 and how to defend against them.<\/p>\n<h2>What a crypto (wallet) drainer is<\/h2>\n<p>A crypto drainer \u2014 or crypto wallet drainer \u2014 is a type of malware that\u2019s been targeting crypto owners since it first appeared just over a year ago. A crypto drainer is designed to (quickly) empty crypto wallets automatically by siphoning off either all or just the most valuable assets they contain, and placing them into the drainer operators\u2019 wallets.<\/p>\n<p>As an example of this kind of theft, let us review the <a href=\"https:\/\/fullycrypto.com\/14-bored-apes-stolen-through-social-engineering-scheme\" target=\"_blank\" rel=\"nofollow noopener\">theft of 14 Bored Ape NFTs with a total value of over $1 million<\/a>, which occurred on December 17, 2022. The scammers set up a fake website for the real Los Angeles-based movie studio Forte Pictures, and contacted a certain NFT collector on behalf of the company. They told the collector that they were making a film about NFT. Next, they asked the collector if they wanted to license the intellectual property (IP) rights to one of their Bored Ape NFTs so it could be used in the movie.<\/p>\n<p>According to the scammers, this required signing a contract on \u201cUnemployd\u201d, ostensibly a blockchain platform for licensing NFT-related intellectual property. However, after the victim approved the transaction, it turned out that all 14 Bored Ape NFTs belonging to them were <a href=\"https:\/\/etherscan.io\/tx\/0xd82484e970a1a0a065f4e710da84990df5cee35e2305fcf88db44271a24c5ceb\" target=\"_blank\" rel=\"nofollow noopener\">sent<\/a> to the malicious actor for a paltry 0.00000001 ETH (about US\u00a20.001 at the time).<\/p>\n<div id=\"attachment_50494\" style=\"width: 1279px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194436\/what-is-a-crypto-wallet-drainer-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50494\" class=\"size-full wp-image-50494\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194436\/what-is-a-crypto-wallet-drainer-01.png\" alt=\"The scam crypto transaction\" width=\"1269\" height=\"882\"><\/a><p id=\"caption-attachment-50494\" class=\"wp-caption-text\">What the request to sign the \u201ccontract\u201d looked like (left), and what actually happened after the transaction was approved (right). <a href=\"https:\/\/twitter.com\/Serpent\/status\/1604074483899588608\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The scheme relied to a large extent on social engineering: the scammers courted the victim for more than a month with email messages, calls, fake legal documents, and so on. However, the centerpiece of this theft was the transaction that transferred the crypto assets into the scammers\u2019 ownership, which they undertook at an opportune time. Such a transaction is what drainers rely on.<\/p>\n<h2>How crypto drainers work<\/h2>\n<p>Today\u2019s drainers can automate most of the work of emptying victims\u2019 crypto wallets. First, they can help to find out the approximate value of crypto assets in a wallet and identify the most valuable ones. Second, they can create transactions and smart contracts to siphon off assets quickly and efficiently. And finally, they obfuscate fraudulent transactions, making them as vague as possible, so that it\u2019s difficult to understand what exactly happens once the transaction is authorized.<\/p>\n<p>Armed with a drainer, malicious actors create fake web pages posing as websites for cryptocurrency projects of some sort. They often register lookalike domain names, taking advantage of the fact that these projects tend to use currently popular domain extensions that resemble one another.<\/p>\n<p>Then the scammers use a technique to lure the victim to these sites. Frequent pretexts are an airdrop or NFT minting: these models of rewarding user activity are popular in the crypto world, and scammers don\u2019t hesitate to take advantage of that.<\/p>\n<div id=\"attachment_50495\" style=\"width: 1442px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194448\/what-is-a-crypto-wallet-drainer-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50495\" class=\"size-full wp-image-50495\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194448\/what-is-a-crypto-wallet-drainer-02.jpg\" alt=\"These X (Twitter) ads promoted NFT airdrops and new token launches on sites that contain the drainer\" width=\"1432\" height=\"410\"><\/a><p id=\"caption-attachment-50495\" class=\"wp-caption-text\">These X (Twitter) ads promoted NFT airdrops and new token launches on sites that contain the drainer. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/crypto-drainer-steals-59-million-from-63k-people-in-twitter-ad-push\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Also commonplace are some totally unlikely schemes: to draw users to a fake website, malicious actors recently <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/web3-security-firm-certiks-x-account-hacked-to-push-crypto-drainer\/\" target=\"_blank\" rel=\"nofollow noopener\">used<\/a> a hacked Twitter account that belonged to a\u2026 blockchain security company!<\/p>\n<div id=\"attachment_50496\" style=\"width: 1121px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194502\/what-is-a-crypto-wallet-drainer-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50496\" class=\"size-full wp-image-50496\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194502\/what-is-a-crypto-wallet-drainer-03.jpg\" alt=\"X (Twitter) ads for a supposedly limited-edition NFT collection on scam websites\" width=\"1111\" height=\"1133\"><\/a><p id=\"caption-attachment-50496\" class=\"wp-caption-text\">X (Twitter) ads for a supposedly limited-edition NFT collection on scam websites. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/crypto-drainer-steals-59-million-from-63k-people-in-twitter-ad-push\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Scammers have also been known to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/crypto-drainer-steals-59-million-from-63k-people-in-twitter-ad-push\/\" target=\"_blank\" rel=\"nofollow noopener\">place ads on social media and search engines<\/a> to lure victims to their forged websites. In the latter case, it helps them intercept customers of real crypto projects as they search for a link to a website they\u2019re interested in. Without looking too closely, users click on the \u201csponsored\u201d scam link, which is always displayed above organic search results, and end up on the fake website.<\/p>\n<div id=\"attachment_50497\" style=\"width: 877px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194512\/what-is-a-crypto-wallet-drainer-04.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50497\" class=\"size-full wp-image-50497\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194512\/what-is-a-crypto-wallet-drainer-04.png\" alt=\"Scam sites containing crypto drainers in Google ads\" width=\"867\" height=\"380\"><\/a><p id=\"caption-attachment-50497\" class=\"wp-caption-text\">Google search ads with links to scam websites containing crypto drainers. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/crypto-drainer-steals-59-million-from-63k-people-in-twitter-ad-push\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Then, the unsuspecting crypto owners are handed a transaction generated by the crypto drainer to sign. This can result in a direct transfer of funds to the scammers\u2019 wallets, or more sophisticated scenarios such as transferring the rights to manage assets in the victim\u2019s wallet to a smart contract. One way or another, once the malicious transaction is approved, all the valuable assets get siphoned off to the scammers\u2019 wallets as quickly as possible.<\/p>\n<h2>How dangerous crypto drainers are<\/h2>\n<p>The popularity of drainers among crypto scammers is growing rapidly. According to a recent <a href=\"https:\/\/drops.scamsniffer.io\/post\/scam-sniffer-2023-crypto-phishing-scams-drain-300-million-from-320000-users\/\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a> on crypto drainer scams, more than 320,000 users were affected in 2023, with total damage of just under $300 million. The fraudulent transactions recorded by the researchers included around a dozen \u2014 worth more than a million dollars each. The largest value of loot taken in a single transaction amounted to a little over $24 million!<\/p>\n<p>Curiously, experienced cryptocurrency users fall prey to scams like this just like newbies. For example, the founder of the startup behind Nest Wallet <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/crypto-wallet-founder-loses-125-000-to-fake-airdrop-website\/\" target=\"_blank\" rel=\"nofollow noopener\">was recently robbed<\/a> of $125,000 worth of stETH by scammers who used a fake website promising an airdrop.<\/p>\n<h2>How to protect against crypto drainers<\/h2>\n<ul>\n<li>Don\u2019t put all your eggs in one basket: try to keep only a portion of your funds that you need for day-to-day management of your projects in hot crypto wallets, and store the bulk of your crypto assets in cold wallets.<\/li>\n<li>To be on the safe side, use multiple hot wallets: use one for your Web3 activities \u2014 such as drop hunting, use another to keep operating funds for these activities, and transfer your profits to cold wallets. You\u2019ll have to pay extra commission for transfers between the wallets, but malicious actors would hardly be able to steal anything from the empty wallet used for airdrops.<\/li>\n<li>Keep checking the websites you visit time and time again. Any suspicious detail is a reason to stop and double-check it all again.<\/li>\n<li>Don\u2019t click on sponsored links in search results: only use links in organic search results \u2013 that is, those that aren\u2019t marked \u201csponsored\u201d.<\/li>\n<li>Review every transaction detail carefully.<\/li>\n<li>Use companion browser extensions to verify transactions. These help identify fraudulent transactions and highlight what exactly will happen as a result of the transaction.<\/li>\n<li>Finally, be sure to install <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security<\/a> on all devices you use to manage crypto assets.<\/li>\n<\/ul>\n<div id=\"attachment_50498\" style=\"width: 1061px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194524\/what-is-a-crypto-wallet-drainer-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50498\" class=\"wp-image-50498 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/06194524\/what-is-a-crypto-wallet-drainer-05.jpg\" alt=\"Protection from crypto threats in Kaspersky solutions\" width=\"1051\" height=\"671\"><\/a><p id=\"caption-attachment-50498\" class=\"wp-caption-text\">How protection from crypto threats works in Kaspersky solutions<\/p><\/div>\n<p>By the way, Kaspersky solutions offer <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2023_new-kaspersky-consumer-portfolio-now-protects-users-crypto-assets\" target=\"_blank\" rel=\"noopener nofollow\">multi-layered protection against crypto threats<\/a>. Be sure to use comprehensive security on all your devices: phones, tablets, and computers. <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> is a good cross-platform solution. Check that all <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-home-products-2022\/45268\/\" target=\"_blank\" rel=\"noopener nofollow\">basic and advanced security features<\/a> are enabled and read our detailed instructions on protecting both <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">hot<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">cold<\/a> crypto wallets.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-fraud\">\n","protected":false},"excerpt":{"rendered":"<p>Today we\u2019re talking about crypto drainers \u2014 one of the most serious threats to crypto owners \u2014 and offer tips on fending it off.<\/p>\n","protected":false},"author":2513,"featured_media":22359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486,9],"tags":[374,1308,2731,2641,1505,282,2732,1504,2578,76,192,521],"class_list":{"0":"post-22356","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-bitcoin","10":"tag-blockchain","11":"tag-crypto-drainers","12":"tag-crypto-wallets","13":"tag-cryptocurrencies","14":"tag-cybersecurity","15":"tag-drainers","16":"tag-ethereum","17":"tag-nft","18":"tag-phishing","19":"tag-protection","20":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/22356\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-a-crypto-wallet-drainer\/27046\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/11398\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/29713\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-a-crypto-wallet-drainer\/27215\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/27019\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-is-a-crypto-wallet-drainer\/29613\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-is-a-crypto-wallet-drainer\/28517\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-a-crypto-wallet-drainer\/36920\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-a-crypto-wallet-drainer\/12037\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-a-crypto-wallet-drainer\/50490\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-is-a-crypto-wallet-drainer\/21454\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-is-a-crypto-wallet-drainer\/22224\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-is-a-crypto-wallet-drainer\/30894\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-a-crypto-wallet-drainer\/35783\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-is-a-crypto-wallet-drainer\/29042\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-a-crypto-wallet-drainer\/27432\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-a-crypto-wallet-drainer\/33228\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-a-crypto-wallet-drainer\/32852\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cryptocurrencies\/","name":"cryptocurrencies"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2513"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22356"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22356\/revisions"}],"predecessor-version":[{"id":22361,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22356\/revisions\/22361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22359"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}