{"id":71381,"date":"2024-02-14T05:20:26","date_gmt":"2024-02-14T09:20:26","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=71381"},"modified":"2024-02-14T05:20:29","modified_gmt":"2024-02-14T09:20:29","slug":"angel-drainer-steals-over-400k-from-several-crypto-wallets","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/angel-drainer-steals-over-400k-from-several-crypto-wallets\/","title":{"rendered":"Angel Drainer Steals Over $400K From Several Crypto Wallets"},"content":{"rendered":"\n<p>Reportedly, over $400,000 was stolen from 128 cryptocurrency wallets by the infamous phishing group Angel Drainer using a new attack vector that utilized Etherscan's verification utility to obscure the malicious nature of a<a href=\"https:\/\/coinscreed.com\/staging\/simplifying-legal-agreements-how-smart-contracts-are-changing-industries.html\"> smart contract<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"838\" height=\"573\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40.png\" alt=\"Angel Drainer Steals Over $400K From Several Crypto Wallets\" class=\"wp-image-71383\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40.png 838w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40-300x205.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40-768x525.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40-750x513.png 750w\" sizes=\"(max-width: 838px) 100vw, 838px\" \/><figcaption class=\"wp-element-caption\">Angel Drainer Steals Over $400K From Several Crypto Wallets<\/figcaption><\/figure>\n\n\n\n<p>Angel Drainer initiated the attack at 6:40 a.m. on February 12 by deploying a malicious Safe (formerly Gnosis Safe) vault contract, according to a blockchain security firm Blockaid's February 13 X post.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Today our researchers discovered yet another emerging attack vector from the Angel Drainer group \u2014 this time phishing users and leading them to a single Safe Vault contract where 128 wallets have been drained of $403k+ so far. All Blockaid-protected users are safe. \ud83e\uddf5 <a href=\"https:\/\/t.co\/niffQDlciG\" target=\"_blank\">pic.twitter.com\/niffQDlciG<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/p>&mdash; Blockaid (@blockaid_) <a href=\"https:\/\/twitter.com\/blockaid_\/status\/1757469196236243294?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">February 13, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Following the signature of 128 accounts on a &#8220;Permit2&#8221; transaction on the Safe Vault contract, $403,000 in funds was stolen.<\/p>\n\n\n\n<p>Blockaid stated that the swindle artists utilized a Safe Vault contract to create a &#8220;false sense of security,&#8221; given that <a href=\"https:\/\/coinscreed.com\/staging\/etherscan-acquires-solana-blockchain-explorer-solscan.html\" target=\"_blank\" rel=\"noreferrer noopener\">Etherscan <\/a>verifies the contract's legitimacy automatically by appending a verification flag.<\/p>\n\n\n\n<p>Blockaid emphasized that its user base had not been &#8220;significantly impacted&#8221; and that the incident was not a direct assault on Safe. In addition to notifying Safe of the assault, the security firm stated it was attempting to prevent additional damage.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThis is not an attack on Safe [\u2026] rather they decided to use this Safe vault contract because Etherscan automatically adds a verification flag to Safe contracts, which can provide a false sense of security as it\u2019s unrelated to validating whether or not the contract is malicious.\u201d<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Despite operating for only twelve months, Angel Drainer has reportedly emptied more than $25 million from close to 35,000 wallets, according to a post on Blockaid's X on February 5.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Today, the Angel Drainer Group celebrated one year in operation. <br><br>They&#39;ve drained over $25M from nearly 35k wallets and are behind high profile drains like last year&#39;s Ledger Connect Kit and last week&#39;s Restake Farming attack.<br><br>We seek to protect every web3 user and put them out\u2026 <a href=\"https:\/\/t.co\/U1Sg6sajd6\" target=\"_blank\">pic.twitter.com\/U1Sg6sajd6<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Blockaid (@blockaid_) <a href=\"https:\/\/twitter.com\/blockaid_\/status\/1754589237956292786?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">February 5, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>The EigenLayer restake farming attack and the $484,000 Ledger Connect Kit breach are two of the most notable attacks Angel Drainer has mounted recently.<\/p>\n\n\n\n<p>Blockaid explained that in the restake farming attack, Angel Drainer implemented a malicious queueWithdrawal function that, after users sign, would withdraw staking rewards to an address specified by the attackers.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cBecause this is a new kind of approval method, most security providers or internal security tooling does not parse and validate this approval type. So in most cases it\u2019s marked as a benign transaction.\u201d<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Scam Sniffer, a Web3 scam tracker, reports that in January, an estimated 40,000 users across various platforms, including OpenSea, Optimism, zkSync,<a href=\"https:\/\/manta.network\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> Manta Network<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>, and SatoshiVM, unfortunately, encountered phishing assaults, resulting in a cumulative loss of $55 million.<\/p>\n\n\n\n<p>The amount is projected to exceed the $295 million recorded in 2023, as stated in the 2023 Wallet Drainers Report by Scam Sniffer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reportedly, over $400,000 was stolen from 128 cryptocurrency wallets by the infamous phishing group Angel Drainer using a new attack vector that utilized Etherscan&#8217;s verification utility to obscure the malicious nature of a smart contract. Angel Drainer initiated the attack at 6:40 a.m. on February 12 by deploying a malicious Safe (formerly Gnosis Safe) vault [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":71383,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[6845,18414,1652,2118],"class_list":["post-71381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-etherscan","tag-angel-drainer","tag-crypto-wallets","tag-hacker"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/image-40.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/71381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=71381"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/71381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/71383"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=71381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=71381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=71381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}