Angel Drainer Targets Users With Malicious Secure Contracts: $403K Stolen

Angel Drainer Targets Users With Malicious Secure Contracts: $403K Stolen



Infamous phishing group Angel Drainer has reportedly stolen over $400,000 from 128 crypto wallets in a new attack vector designed to mask the smart contract feature of Etherscan's authentication tool.

The attack began at 6:40 p.m. on February 12, when Angel Drenner deployed a malicious Safe (formerly Gnosis Safe) vault contract, blockchain security firm Blockchain wrote to X in a February 13 post.

A total of 128 wallets signed the “Permit2” transaction on the SafeVault contract, resulting in around $403,000 in funds being stolen.

Blockaid said the fraudsters specifically used the Safe Vault contract to deliver a “false sense of security” because EtherScan automatically adds a verification flag to verify it as a legitimate contract.

Minergate

Blockaid said the incident was not a direct attack on Safe and that its user base was “not widely affected”. The security organization has informed security about the attack and is working to limit further damage, he said.

“This is not an attack on a safe. […] Instead, you decide to use this Safe Vault contract because EtherScan automatically adds a verification flag to Safe contracts that is not relevant to verifying whether the contract is malicious or not, which can give a false sense of security.

RELATED: ‘Haunts Me To This Day' – $4M Crypto Project Hacked In Hotel Lobby

Angel Drainer has only been active for 12 months, but it has managed to withdraw more than $25 million from 35,000 wallets, Blockaid said in a Feb. 5 post by X.

The $484,000 Ledger Connect Kit hack and Eigenlayer retake farming attack are among the most notable attacks by Angel Drenner in recent months.

The re-farming attack involves implementing a malicious queue-exiting function that withdraws rewards to an address of the attacker's choosing after Angel Drenner is signed by users, according to Blockaid.

“Since this is a new authentication method, most security vendors or internal security tools do not analyze and verify this type of authentication. So it is marked as good marketing in most cases.

Approximately 40,000 users on OpenSea, Optimism, zkSync, Manta Network and SatoshiVM were victims of phishing attacks in January.

According to Scam Sniffer's 2023 Wallet Drainers report, the figure is That's $295 million more than what was recorded in 2023.

Magazine: Diffie's Billion Dollar Secret: Insiders Responsible for Hacking



Leave a Reply

Pin It on Pinterest