Angel Drainer used a crypto phishing attack to exploit Etherscan’s verification tool to conceal its malicious smart contract.
Phishing group Angel Drainer stole over $400,000 from 128 crypto wallets after deploying a malicious vault contract yesterday.
According to an X post published on February 13 by blockchain security firm Blockaid, Angel Drainer employed a new attack vector that exploited Etherscans verification tool to conceal the malicious characteristics of a smart contract.
Angel Drainer Goes Crypto Phishing
The attack occurred at 6:40 am on February 12 when Angel Drainer deployed a malicious Safe vault contract, Blockaid said.
At 6:41am UTC on Monday, February 12th, Angel Drainer group deployed a Safe vault contract— 0xbaee148df4bf81abf9854c9087f0d3a0ffd93dbb— which they have since used to phish and scam users, prompting them to sign a Permit2 with this Safe Vault as the operator.
— Blockaid (@blockaid_) February 13, 2024
Following the deployment, users unknowingly authorized a ‘Permit2’ transaction on the compromised contract, culminating in the theft of $403,000.
The blockchain security firm noted that Angel Drainer specifically chose to use a Safe vault contract to instill an unfounded sense of security among usersa common tactic in crypto phishing schemesas Etherscan automatically adds a verification flag to Safe contracts.
Blockaid emphasized that the attack was not a direct assault on Safe, clarifying that its user base had not experienced widespread consequences. The security firm also said that it had informed Safe about the attack and was working to mitigate any potential additional damage.
“This is not an attack on Safe […] rather they decided to use this Safe vault contract because Etherscan automatically adds a verification flag to Safe contracts, which can provide a false sense of security as its unrelated to validating whether or not the contract is malicious,” Blockaid said.
Angel Drainers Track Record
In just 12 months of operation, Angel Drainer has managed to siphon off more than $25 million from nearly 35,000 wallets in that short period, according to a February 5 post by Blockaid.
Additionally, the group executed other major breaches, including the 2023 Ledger Connect Kit hack and the recent EigenLayer restake farming attack.
The restake farming attack conducted by Angel Drainer involved the usage of a malicious queueWithdrawal function. Once users sign, this function would withdraw staking rewards to an address chosen by the attackers, the security firm explained.
Disclaimer:
The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.
North Korean Malware Targets macOS Users by Evading Apple Notarization
Thune helped cosponsor a crypto bill in 2022 called the Digital Commodities Consumer Protection Act
DeltaPrime Protocol Attacked on Arbitrum and Avalanche, Resulting in $4.8 Million Loss
Polymarket Founder Raided by FBI After Trump Win, Company Says
0.00