Sunday, April 20, 2025

Angel Drainer targets users with malicious Safe contract: $403K stolen



Infamous phishing group Angel Drainer has reportedly stolen over $400,000 from 128 crypto wallets by a brand new assault vector that has leveraged Etherscan’s verification instrument to cowl up the malicious nature of a sensible contract.

The assault began at 6:40 am Feb. 12 when Angel Drainer deployed a malicious Protected (previously Gnosis Protected) vault contract, wrote blockchain safety agency Blockaid in a Feb. 13 post to X.

At whole of 128 wallets then signed a “Permit2” transaction on the Protected vault contract, resulting in $403,000 in funds being stolen.

Blockaid mentioned the scammers used a Protected vault contract particularly to ship a “false sense of safety,” as Etherscan mechanically provides a verification flag to substantiate it as a reliable contract.

Blockaid careworn the incident wasn’t a direct assault on Protected and that its consumer base had not been “broadly impacted.” The safety agency added it had notified Protected of the assault and was working to restrict additional harm.

“This isn’t an assault on Protected […] somewhat they determined to make use of this Protected vault contract as a result of Etherscan mechanically provides a verification flag to Protected contracts, which might present a false sense of safety because it’s unrelated to validating whether or not or not the contract is malicious.”

Associated: ‘Haunts me to this day’ — Crypto project hacked for $4M in a hotel lobby

Angel Drainer has solely been in operation for 12 months however has managed to empty over $25 million from practically 35,000 wallets, Blockaid said in a Feb. 5 put up X.

The $484,000 Ledger Connect Kit hack and the Eigenlayer restake farming assault are among the many most notable assaults dedicated by Angel Drainer in current months.

The restake farming assault concerned Angel Drainer implementing a malicious queueWithdrawal perform which, as soon as signed by customers, would withdraw staking rewards to an deal with of the attacker’s selecting, Blockaid explained.

“As a result of it is a new type of approval methodology, most safety suppliers or inner safety tooling doesn’t parse and validate this approval sort. So usually it’s marked as a benign transaction.”

Roughly 40,000 customers on OpenSea, Optimism, zkSync, Manta Community, and SatoshiVM fell sufferer to phishing assaults in January, dropping a mixed $55 million, according to Rip-off Sniffer, a Web3 rip-off tracker.

The determine is on observe to surpass 2023’s figure of $295 million, in line with Rip-off Sniffer’s 2023 Pockets Drainers Report.

Journal: DeFi’s billion-dollar secret: The insiders responsible for hacks