How scammers steal your crypto in two clicks, how to protect yourself, and where to report fraud
A crypto drainer is malicious code hidden on fake websites that tricks you into signing a wallet transaction. Once you approve it — your tokens, NFTs, and coins are irreversibly transferred to the scammer's wallet.
Scammers create perfect copies of real crypto projects and promise free token airdrops. The "Claim" button connects your wallet to a drainer.
Thousands of fake Telegram channels impersonate real projects. Bots automatically post scam "airdrop" announcements with phishing links.
Professional criminal teams sell drainer kits (like Inferno Drainer). Affiliates pay 20% commission and keep 80% of stolen funds.
You see "$TOKEN Airdrop is LIVE!" in a Telegram channel that looks official. It has the project's logo, description, and a "Claim" button.
The link takes you to a convincing website hosted on IPFS. It shows token info, a progress bar, and a "Connect Wallet" button.
You connect MetaMask, Phantom, or another wallet. The site detects your balances across all chains (ETH, SOL, BNB, BTC, TRON).
The drainer asks you to sign a transaction — disguised as "Claim Tokens". In reality, it is an approve() or setApprovalForAll() that gives the attacker access to ALL your tokens.
Within seconds, the drainer transfers all your assets to the attacker's wallet. The transaction is irreversible. There is no undo.
approve and permitIf you interacted with a suspicious site, act immediately:
Go to revoke.cash and revoke ALL token approvals you don't recognize
Transfer remaining assets to a new, clean wallet immediately. Do NOT reuse the compromised wallet.
File a report with ChainAbuse and local authorities. Include transaction hashes.
A real-world example of a Drainer-as-a-Service operation discovered by anti-phishing researchers:
This network operated 2,200+ fake Telegram airdrop channels, each impersonating legitimate crypto projects.
The drainer code was hidden behind fake CDN domains and IPFS, using request proxying to evade detection.
Identified by anti-phishing researchers through exposed configuration files containing 2,215 bot tokens
and project databases. The operation used the Inferno Drainer kit, identifiable by its
/secureproxy.php endpoint and multi-chain wallet draining capabilities.