Web Analytics
Cryptopolitan
2026-04-30 23:34:19

StepDrainer drains crypto wallets across +20 networks

A crypto-stealing tool called StepDrainer is draining money from wallets across Ethereum, BNB Chain, Arbitrum, Polygon, and at least 17 other networks. StepDrainer operates as a malware-as-a-service kit. It uses fake but realistic Web3 wallet pop-ups to trick people into approving transfers. Some of those screens are made to look like Web3Modal wallet connections. Once someone connects their wallet, StepDrainer looks for the most valuable tokens first and automatically sends them to wallets controlled by the attackers, according to LevelBlue. StepDrainer misuses smart contract tools StepDrainer misuses real smart contract tools like Seaport and Permit v2 to show wallet approval pop-ups that look normal. But the details inside those pop-ups are fake. In one case, cybersecurity researchers found that victims saw a fake message saying they were receiving “+500 USDT,” making the approval look safe. StepDrainer loads its harmful code through changing scripts and gets its setup from decentralized on-chain accounts. That setup helps the attackers dodge normal security tools because the harmful code is not stored in one fixed place where it can be easily scanned. StepDrainer is not just one person’s project. Researchers said there is a developed underground market selling ready-made drainer kits, making it easier for many attackers to add wallet-stealing features to scams they already run. EtherRAT siphons crypto from Windows users *]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn-id="request-WEB:b93dee1f-593f-4310-9139-c5471d4463a0-18" data-testid="conversation-turn-12" data-scroll-anchor="false" data-turn="assistant"> Researchers also found another malware besides StepDrainer, called EtherRAT. It targets Windows through a fake version of the Tftpd64 network admin tool. According to LevelBlue, EtherRAT hides Node.js inside a fake installer, makes sure it stays on the computer through the Windows registry, and uses PowerShell to check the system. EtherRAT first targeted Linux. Now it is bringing malware tricks and crypto theft to Windows. EtherRAT quietly runs in the background. It checks things like antivirus tools, system settings, domain details, and hardware before it starts stealing. According to a recent Cryptopolitan report , over 500 Ethereum wallets have been drained in the past 24 hours. The attacker siphoned more than $800K in crypto assets and then swapped the funds via ThorChain. Many of the drained wallets have been inactive for over 7 years, according to on-chain research Wazz. The drained funds were directed by a single wallet address controlled by the attacker. Cybersecurity researchers advise users connecting wallets to unknown sites to verify the domain, read the transaction details before signing, and remove any unlimited token approvals. Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free .

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约