StepDrainer drains crypto wallets across 20+ networks

A malware-as-a-service called StepDrainer is siphoning crypto from victims across 20+ blockchain networks, including Ethereum, BNB Chain, Arbitrum, and Polygon. It tricks users with realistic fake Web3 wallet-connection pop-ups, sometimes mimicking Web3Modal, to get approvals for token transfers. StepDrainer misuses real smart-contract tools (notably Seaport and Permit v2) so the approval screens look normal, even showing a “safe” message such as “+500 USDT” despite being fraudulent. Once connected, it prioritizes the most valuable tokens and automatically sends them to attacker-controlled wallets. Researchers say the malicious setup is loaded via dynamic scripts and sourced from on-chain accounts, helping it evade standard security scanning. Separately, researchers also flagged EtherRAT, a malware that targets Windows (via a fake Tftpd64 installer). EtherRAT hides Node.js inside the installer, persists via Windows registry, and uses PowerShell for environment checks, after initially targeting Linux. Cryptographers warn the malware blend signals a continued convergence of traditional malware tooling with crypto theft. The article cites on-chain reporting (Wazz) and a prior report claiming over 500 Ethereum wallets drained in 24 hours, with more than $800K taken, then swapped through ThorChain. Many drained wallets were inactive for 7+ years. Mitigations highlighted: verify the website domain before connecting, review transaction details before signing, and revoke any unlimited token approvals—especially when interacting with unfamiliar sites and wallet prompts.
Neutral
这条消息本质上是针对 Web3 用户与钱包权限的安全事件,而不是协议层面或宏观基本面变化。类似的“drainer/伪造签名弹窗”事件通常会引发短期风险厌恶与交易者更谨慎的链上操作,但很少对整体代币供需、流动性或长期价值产生直接影响。因此对市场稳定性的直接传导有限。 不过,短期内可能出现“交易摩擦”式影响:例如投资者更频繁地撤销无限授权、减少对陌生 dApp 的互动,相关代币与生态的链上活动可能短暂降温;而攻击者换汇(文中提到通过 ThorChain)也可能带来局部波动。 历史上,关于 StepDrainer、Pink Drainer 等钱包清空/权限钓鱼的新闻往往集中打击用户侧资金安全,市场更多表现为情绪层面的谨慎,而非趋势性利好或利空。综合来看,本次影响更偏中性。