The group employs social engineering attacks to gain access to these projects. By impersonating journalists from reputable media outlets like Decrypto and Cointelegraph, they conduct interviews with Discord administrators. The interview process typically lasts for 1-3 days and requires KYC authentication, embedding phishing techniques related to Discord in the final stages. They guide administrators to open a malicious Carl verification bot and add bookmarks containing malicious code. These steps enable the theft of the user’s Discord Token.
To prolong their attacks, Pink Drainer removes other administrators, sets up a malicious account as an administrator, and conducts violations that result in the main account being blocked by Discord. Through their efforts, the type of data stolen by cybercriminals in this case amounted to approximately $3 million in assets, affecting nearly 1,932 victims across various chains such as Mainnet, Arbitrum, BNB, Polygon, and Optimism.
ScamSniffer discovered Pink Drainer through their on-chain monitor bot. One victim lost nearly $320,000 in NFTs, and the assets were transferred to an address called pink-drainer.eth, leading to the group’s identification.
You are currently viewing a placeholder content from Wistia. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information