Definition:
A wallet drainer is a malicious smart contract or script that, once a user signs a transaction or off-chain permit signature, immediately sweeps all tokens and NFTs from the victim’s wallet to an attacker-controlled address. Unlike traditional hacks that exploit protocol code, wallet drainers target users directly — they rely on social engineering, phishing sites, and malicious NFT airdrops to trick users into signing what appears to be a harmless interaction. The drain happens in seconds; funds are typically irretrievable.
How It Works
Wallet drainers exploit legitimate Ethereum signing mechanisms rather than code vulnerabilities:
Method 1: Seaport / Blur Signature Abuse
The attacker creates a phishing site mimicking a legitimate NFT mint or marketplace. The user is prompted to “claim” something by signing an off-chain Seaport order. This signature — though it costs no gas — authorizes the transfer of the user’s NFTs to the attacker. The attacker fulfills the order on-chain, draining the NFTs.
Method 2: Permit Signature (EIP-2612)
ERC-20 tokens with permit support allow token approvals via off-chain signatures (no on-chain approve() transaction needed). A drainer presents a fake site that asks the user to sign a permit granting unlimited allowance to the attacker’s contract. The attacker then calls transferFrom() to take all tokens.
Method 3: Unlimited approve() + transferFrom()
The user is tricked into calling approve() on a malicious contract, granting it unlimited token allowance. The drainer contract immediately calls transferFrom() to pull all tokens.
Method 4: Malicious NFT Airdrop
An NFT is airdropped to the user. When they try to view or interact with it, the NFT’s metadata triggers a phishing site or wallet interaction request. Trying to sell or burn the unwanted NFT initiates the drain.
Drainer-as-a-Service
Wallet drainers have evolved into industrialized tools. Since 2022, underground markets offer “Drainer-as-a-Service” (DaaS): ready-made drainer kits that anyone can deploy for a percentage of stolen funds (typically 20–30%). Notable kits include Inferno Drainer (drained ~$80M before shutting down in 2023), Pink Drainer, Venom Drainer, and Angel Drainer.
Typical attack lifecycle:
- Attacker rents a drainer kit (or purchases access)
- Attacker runs a phishing campaign: fake social media, compromised Discord/Twitter accounts, Google Ads
- User lands on phishing site and connects wallet
- User signs a “harmless” signature request
- Drainer script monitors mempool and submits drain transaction
- Funds bridge through mixers (Tornado Cash) and OTC desks
Notable Incidents
- Premint (July 2022): ~$400K in NFTs stolen after the Premint verification website was compromised to serve a malicious signing request.
- Ledger Connect Kit (December 2023): Supply chain attack injected drainer code into the Ledger Connect Kit library, briefly affecting multiple DeFi frontends simultaneously.
- Inferno Drainer (2023): Responsible for draining ~$80M across thousands of victims before the authors announced retirement.
- Pink Drainer (2023–2024): Drained ~$85M in total; responsible for high-profile incident around EigenLayer airdrop phishing.
Prevention
- Revoke approvals: Use tools like Revoke.cash or Etherscan’s token approval manager to revoke unnecessary ERC-20 allowances.
- Read what you sign: Check the exact contract address and function being called before confirming any transaction or signature.
- Use permit-aware wallets: Wallets like Rabby decode permit signatures and display exactly what allowance you’re granting.
- Bookmark official sites: Never navigate to a project’s mint page via social media links. Always use bookmarked URLs.
- Limit approvals: Set approvals to exact amounts rather than unlimited.
Related Terms
- Token Approval Exploit
- Crypto Phishing
- ERC-20 Token Standard
- Flash Loan Attack
- Hardware Wallet Security
Sources
- Chainanalysis — 2024 Crypto Crime Report — Covers wallet drainer trends and total losses.
- Rekt.news — Ledger Connect Kit Post-Mortem — Supply chain drainer attack on major hardware wallet library.
- Revoke.cash — Tool for auditing and revoking ERC-20 allowances.
- Scam Sniffer — 2023 Phishing Report — Data on drainer prevalence and stolen amounts per kit.
Last updated: 2026-04