Web3 Security Firm Discovers New Solana Drainers
Blowfish, a web3 security firm, has recently uncovered two new types of Solana drainers known as ‘Aqua’ and ‘Vanish’. These malicious programs have the ability to steal users’ cryptocurrency by modifying transaction conditions even after the users’ private keys have approved the transaction. This discovery highlights the increasing complexity of cyber threats in the blockchain space and the need for enhanced security measures.
Surge in Solana Drainers
The emergence of Aqua and Vanish has raised concerns within the Solana network. These drainers exploit the authority granted to decentralized applications (dApps) to submit transactions on behalf of users. By altering a condition in the transaction data, these drainers can switch from sending to draining SOL from the victim’s account. Hackers have weaponized this bit-flip attack method to target the Solana network.
The Spread of Scam-as-a-Service
Aqua and Vanish scripts are being sold in scam-as-a-service (SaaS) tool marketplaces, enabling threat actors to execute these stealers without extensive technical knowledge. The commercialization of cybercrime tools has led to an increase in attacks targeting cryptocurrency users, particularly on Solana. Chainalysis reports a significant community surrounding a Sellana wallet drainer kit with over 6,000 individuals, underscoring the widespread nature of this threat.
Prevention Efforts Against Drainer Dangers
In response to the detection of Aqua and Vanish, Blowfish has implemented defenses to automatically thwart these drainers and closely monitor on-chain activity for suspicious behavior. However, countering these threats remains challenging as threat actors continuously develop new techniques to evade security measures. The involvement of Russian developers in creating and distributing these drainers adds an international dimension to the cybersecurity issues faced by the Solana community.
The broader blockchain security community is also coming together to address this emerging threat. Wallet Guard, for instance, offers protection for users seeking to defend themselves against such attacks, which often begin with phishing attempts. By leveraging social engineering tactics, attackers lure victims to fake DeFi platforms that mimic legitimate ones and prompt them to approve malicious transactions.