• We just launched and are currently in beta. Join us as we build and grow the community.

Massive Theft of Solana Assets in Recent CLINKSINK Drainer Campaigns

Patrick Star123

Pentest Workflow Optimizer
P Rep
0
0
0
Rep
0
P Vouches
0
0
0
Vouches
0
Posts
168
Likes
33
Bits
1 MONTH
1 1 MONTH OF SERVICE
LEVEL 1 400 XP
Since December 2023, multiple actors have initiated operations using the CLINKSINK drainer to illicitly acquire funds and tokens from Solana (SOL) cryptocurrency users. Drainers are harmful scripts and smart contracts that enable the drainage of funds or digital assets like non-fungible tokens from victims' wallets through deceitful transactions.
These campaigns involved at least 35 affiliate IDs linked to a drainer-as-a-service (DaaS) system utilizing CLINKSINK. The DaaS's operator(s) supply these drainer scripts to their affiliates, receiving about 20% of the ill-gotten gains in return. The total estimated value of assets stolen in these recent operations is over $900,000 USD.
Details of the CLINKSINK Drainer Operations:Recent activities saw threat actors leveraging social media and messaging platforms, such as X and Discord, to spread phishing pages with cryptocurrency themes to engage victims with the CLINKSINK drainer. These phishing sites, posing as legitimate crypto resources like Phantom, DappRadar, and BONK, used various fake token airdrop lures to load malicious CLINKSINK JavaScript code, thereby enabling wallet connections and fund theft.
Victims visiting these phishing sites are tricked into linking their wallets to claim a supposed token airdrop. Upon wallet connection, they are prompted to authorize a transaction, unknowingly granting the drainer service access to siphon their funds.
Screenshot of $PHNTM airdrop-themed phishing page
of DappRadar-themed phishing page
of BONK-themed phishing page
 

414,034

309,575

309,584

Top