$494 Million Stolen From Crypto Wallets By Drainers In 2024
Written by Karolis Liucveikis on
According to a recent blog post by Scam Sniffer, a cryptocurrency monitoring service specializing in tracking illicit activity across blockchains, wallet drainers have been used to steal 494 million USD from crypto wallets in 2024.
Wallet drainers are a family of malware typically deployed on phishing websites that steal crypto assets by tricking users into signing off on malicious transactions.
Scam Sniffer reports that year-on-year, incidents in, 2024 increased by 67%. The number of victims also increased by 3.7% over 2023, with over 332,000 wallet addresses having funds stolen from them in 2024.
Other alarming numbers given by Scam Sniffer include that in 2024, there were 30 large-scale attacks; these are classified as amounting to losses of over 1 million USD per attack. The largest of these attacks resulted in a loss of 55.4 million USD. This attack occurred at the start of the year when Bitcoin's price was trending upwards, driving phishing attacks.
Scam Sniffer divided the year into three attack phases based on the data they accrued. The firm went on to define those three phases as follows:
- The first quarter saw the heaviest losses, reaching 187.2 million USD with 175,000 victims. March recorded the highest losses at 75.2 million USD.
- The second and third quarter's combined losses totaled 257 million USD, with victims decreasing to 90,000.
- Fourth quarter losses dropped to 51 million USD, with victims reducing to 30,000, indicating improved security.
As for theft analysis trends, particularly involving large-scale attacks, the firm discovered that the first half of the year saw frequent but smaller-scale incidents, with individual losses ranging from one to eight million USD.
The peak activity occurred during July and September, with major losses of 55.48 million USD and 32.51 million USD in August and September, respectively. This accounted for 52% of the year's total large-scale losses.
The final quarter showed a significant reduction in the frequency and scale of attacks, with individual losses mostly ranging from two to six million USD, indicating an overall improvement in market security awareness.
As for the future outlook, Scam Sniffer stated,
As of 2024, known losses from phishing signature attacks have reached $790 million. Although these types of attacks decreased in the second half of the year, this might indicate that attackers are shifting towards other attack methods, such as malware and other more covert approaches…As the Web3 ecosystem continues to develop, the challenges of protecting user assets remain. Regardless of how attack methods evolve, continuous security awareness and building protective capabilities remain key to safeguarding assets.
Evolution of Wallet Drainers
Wallet Drainers were deployed to compromised WordPress sites in thousands in 2024. Still, security researchers are particularly interested in the evolution of wallet drainers and different attack methodologies.
As mentioned above, the first half of the year was the most prolific in terms of attacks. This is due in part to popular wallet-draining malware like Pink Drainer being used extensively. There was a considerable drop-off in activity from the second quarter when Pink Drainer announced their exit.
Pink Drainer relied on impersonating journalists in phishing attacks to compromise Discord and Twitter accounts for cryptocurrency-stealing attacks. One such attack resulted in Pink Drainer successfully compromising the accounts of 1,932 victims to steal roughly three million USD worth of digital assets through Mainnet and Arbitrum platforms.
Once the attacker has gained the potential victim's trust, the attacker tells the targets they must conduct a KYC (know your customer) validation to prove their identity. The victim is then guided to websites used to steal Discord authentication tokens.
These sites impersonate malicious bots like a Carl verification bot, where they are told to add bookmarks containing malicious JavaScript code using a "Drag Me" button on the malicious page. This code steals Discord tokens, enabling the attackers to hijack the accounts without knowing the user credentials or having a way to intercept the two-factor authentication code.
Following Pink Drainer's exit, activity dropped generally until the mid-third quarter, when a spike in Inferno wallet drainer activity occurred. The malware was behind the thefts of approximately 110 million USD during August and September.
Finally, the activity subsided in the year's final quarter, which only accounted for about 10.3% of the total losses recorded in 2024. At that time, Ace Drainer also emerged as a major player, taking 20% of the drainer market, according to data.
Inferno Drainer is offered as a malware-as-a-service, while threat actors have deployed Ace Drainer by compromising popular libraries and frameworks developers use in the Web3 space. If you have crypto assets stored in popular web-based wallets, Kaspersky provides the following advice to secure those assets as best as possible:
- Don't put all your eggs in one basket: try to keep only a portion of your funds that you need for day-to-day project management in hot crypto wallets and store the bulk of your crypto assets in cold wallets.
- To be on the safe side, use multiple hot wallets: one for your Web3 activities, such as drop hunting, another to keep operating funds for these activities, and transfer your profits to cold wallets. You'll have to pay extra commission for transfers between the wallets, but malicious actors could hardly steal anything from the empty wallet used for airdrops.
- Keep checking the websites you visit repeatedly. Any suspicious detail should prompt you to stop and double-check everything.
- Don't click on sponsored links in search results: only use links in organic search results – those that aren't marked "sponsored".
▼ Show Discussion