• Home
  • Blockchain
  • Targeting Users with Malicious Smart Contracts: Angel Drainer Strikes
Targeting Users with Malicious Smart Contracts: Angel Drainer Strikes

Targeting Users with Malicious Smart Contracts: Angel Drainer Strikes

Phishing Group Angel Drainer Steals Over $400,000 from Crypto Wallets

An infamous phishing group known as Angel Drainer has successfully stolen more than $400,000 from 128 crypto wallets using a malicious Safe vault contract. This attack exploited Etherscan’s verification tool to conceal the contract’s malicious nature. Blockaid, a blockchain security firm, exposed the attack and its consequences.

Angel Drainer Targets Unsuspecting Users

The attack began on February 12 when Angel Drainer deployed a malicious Safe vault contract, specifically targeting 128 users who had signed a Permit2 transaction. As a result, $403,000 was stolen from these users.

“Today, our researchers discovered yet another emerging attack vector from the Angel Drainer group — this time phishing users and leading them to a single Safe Vault contract where 128 wallets have been drained of $403k+ so far. All Blockaid-protected users are safe.”

Exploiting Etherscan’s Verification Tool

Angel Drainer utilized Etherscan’s verification tool to legitimize the contract and deceive victims into thinking it was secure. This strategy masked the malicious intent of the contract, resulting in a successful attack. However, Blockaid clarified that this was not a direct attack on Safe and that its user base was not significantly affected. Safe has already been informed and is taking measures to minimize any further consequences.

“This is not an attack on Safe […]. Rather, they decided to use this Safe vault contract because Etherscan automatically adds a verification flag to Safe contracts, which can provide a false sense of security as it’s unrelated to validating whether or not the contract is malicious.”

Identifying Angel Drainer

Angel Drainer is a notorious phishing group that has been active for about a year. Within this timeframe, they have managed to steal over $25 million from nearly 35,000 individual wallets. Notable attacks include the $484,000 Ledger Connect Kit hack and the Eigenlayer restake farming attack, where a malicious queueWithdrawal function allowed them to withdraw staking rewards from unsuspecting users.

“Because this is a new kind of approval method, most security providers or internal security tooling does not parse and validate this approval type. So in most cases, it’s marked as a benign transaction.”

Increasing Phishing Attacks

The number of phishing attacks targeting crypto and web3 users has been steadily rising. In January alone, over 40,000 users fell victim to these attacks on platforms such as OpenSea, zkSync, Manta Network, Optimism, and SatoshiVM. Scam Sniffer data shows that these attacks resulted in a combined loss of over $55 million.

Read Disclaimer
This content is aimed at sharing knowledge, it's not a direct proposal to transact, nor a prompt to engage in offers. Lolacoin.org doesn't provide expert advice regarding finance, tax, or legal matters. Caveat emptor applies when you utilize any products, services, or materials described in this post. In every interpretation of the law, either directly or by virtue of any negligence, neither our team nor the poster bears responsibility for any detriment or loss resulting. Dive into the details on Critical Disclaimers and Risk Disclosures.

Share it

Targeting Users with Malicious Smart Contracts: Angel Drainer Strikes