Solana Crypto Heist: Massive Losses in CLINKSINK Drain Attacks

John Darbie
Photo: Finoracle.me

Recent Campaigns Exploit CLINKSINK Drainer to Steal Solana Cryptocurrency

A series of campaigns have surfaced since December 2023 that exploit the CLINKSINK drainer to steal funds and tokens from Solana (SOL) cryptocurrency users. These campaigns involve the use of malicious scripts and smart contracts known as drainers to siphon funds and digital assets from unsuspecting victims. The identified campaigns involved at least 35 affiliate IDs associated with a common drainer-as-a-service (DaaS) that utilizes CLINKSINK. The operators of this service provide the drainer scripts to affiliates in exchange for a percentage of the stolen funds.

CLINKSINK Drainer: Overview and Analysis

In these campaigns, threat actors have used social media and chat applications to distribute cryptocurrency-themed phishing pages that entice victims to interact with the CLINKSINK drainer. These phishing pages masquerade as legitimate cryptocurrency resources, such as token airdrops from popular platforms like Phantom, DappRadar, and BONK. Once victims connect their wallet and sign a transaction, the drainer service gains access to their funds and proceeds to steal them.

Analysis of the CLINKSINK drainer reveals an obfuscated JavaScript code that targets the Phantom Desktop Wallet. Upon loading the sample, it verifies the presence of the wallet and makes a POST request to a specific URL. The server responds with an AES-encrypted Telegram chat group ID and configuration, which contains information about the drainer service, including Solana wallet addresses, percentage splits of stolen funds, and other configuration details.

Distribution of Stolen Funds in CLINKSINK Campaigns

Mandiant has identified at least 35 different affiliate IDs and 42 unique Solana wallet addresses associated with recent CLINKSINK campaigns. Stolen funds are typically split between the affiliate and the DaaS operator based on a predetermined percentage. In these campaigns, a portion of the stolen funds was sent to a specific Solana address, believed to be associated with the DaaS operator. The total value of assets stolen by affiliates in these recent campaigns is estimated to be at least $900,000 USD.

Multiple DaaS Offerings Utilize CLINKSINK Drainer

Interestingly, Mandiant has discovered multiple DaaS offerings that appear to use the CLINKSINK drainer or a variant. One such DaaS is known as “Chick Drainer” and may now operate partially as “Rainbow Drainer.” While it is unclear if these offerings are operated by the same threat actor, there is evidence suggesting that the CLINKSINK source code has been leaked and is being used by multiple actors. These findings indicate the potential for independent draining operations and the creation of additional DaaS offerings for malicious purposes.

Outlook and Implications of CLINKSINK Drainer Campaigns

The popularity of cryptocurrency draining operations has increased over the past year, with actors distributing drainers and advertising draining tools on underground forums. The CLINKSINK drainer activity is particularly notable due to its correlation with the rising value of Solana’s native cryptocurrency (SOL). As the value of cryptocurrencies continues to soar, financially motivated threat actors are likely to target cryptocurrency users and services with even greater frequency. The availability and low cost of drainers, coupled with the potential for significant profit, make them attractive to various actors. Therefore, the drainer operations are expected to persist in the foreseeable future.

In conclusion, the CLINKSINK drainer has become a key tool utilized in recent campaigns to steal funds and tokens from Solana cryptocurrency users. The distribution of stolen funds, the presence of multiple DaaS offerings, and the increasing interest in draining operations underscore the ongoing threat to cryptocurrency users and services. As the cryptocurrency market continues to thrive, it is crucial for users to remain vigilant and take necessary security measures to protect their assets.

Analyst comment

This news can be evaluated as negative. The recent campaigns exploiting the CLINKSINK drainer pose a significant threat to Solana cryptocurrency users, with funds and tokens being stolen. There are multiple affiliate IDs and Solana wallet addresses involved, indicating widespread involvement. The availability and low cost of drainers make them attractive to threat actors, and as the cryptocurrency market continues to grow, these operations are expected to persist. Users must remain vigilant and take necessary security measures to protect their assets.

Share This Article
Follow:
John Darbie is a seasoned cryptocurrency analyst and writer with over 10 years of experience in the blockchain and digital assets industry. A graduate of MIT with a degree in Computer Science and Engineering, John specializes in blockchain technology, cryptocurrency markets, and decentralized finance (DeFi). His insights have been featured in leading publications such as CoinDesk, CryptoSlate, and Bitcoin Magazine. John’s articles are renowned for their thorough research, clear explanations, and practical insights, making them a reliable source of information for readers interested in cryptocurrency. He actively follows industry trends and developments, regularly participating in blockchain conferences and webinars. With a strong reputation for expertise, authoritativeness, and trustworthiness, John Darbie continues to provide high-quality content that helps individuals and businesses navigate the evolving world of digital assets.