Earning €80 million! Phishing tool Inferno Drainer announces closure: Nothing lasts forever
The phishing tool Inferno Drainer, which has been popular among online criminals, announced yesterday that it is ceasing operations, claiming to have stolen over 80 million dollars. Meanwhile, other services such as Pink and Venom Drainer, which are still operational, have assisted in stealing over 12 million and 27 million dollars respectively, with ongoing updates.
Table of Contents
Phishing Crime Tool Inferno Drainers Shuts Down
On the 27th, Inferno Drainer announced through Telegram that it will permanently close its services, stating, "It's time for us to move on."
The team also explained that all documents and servers related to Inferno Drainer will not be deleted or destroyed. They will continue to operate until all partners can smoothly transition to new services:
Inferno Drainer has been through a long journey with you all, and we sincerely thank you for working with us. However, nothing lasts forever, and we hope you remember us as the best phishing tool drainer ever, successfully helping you make money.
Inferno Drainer Has Stolen Over $70 Million
According to the Web3 scam monitoring platform Scam Sniffer, Inferno Drainer was initially launched in February this year, targeting over 220 protocols on Arbitrum, Polygon, and BSC chains, as well as NFT teams, setting up fake websites and luring users to click on links under the guise of airdrops to sign malicious contracts to steal wallet assets.
Although Inferno Drainer claims to have stolen over $80 million in assets since its inception, data from Dune shows that the total amount stolen is currently around $70 million from over 100,000 victims.
Rise of Internet Phishing Crime Tools
In March this year, another notorious phishing tool Monkey Drainer announced the cessation of its services, having stolen over $13 million since the end of last year.
Subsequently, other phishing products like Pink, Pussy, Venom, and Inferno Drainer have sprung up in large numbers, leading to a surge in the number of phishing incidents and the scale of losses caused by malicious link phishing events, reaching unprecedented levels at the time.
These malicious phishing tool teams offer a range of services, allowing attackers to purchase token stealing code and distribute phishing website links containing the aforementioned code to steal user assets.
On the other hand, attackers can entrust the entire process to the malicious phishing tool team, from creating fake websites, marketing promotions to releasing phishing links, with the team taking a 20% to 30% share of the final stolen amount.
Currently, these malicious phishing tools are still operational, with some tools even releasing updates to help criminals steal assets from more wallets, so users should remain vigilant.