Back to Blog

Understanding Profit Sharing in the Inferno Drainer: A Comprehensive Guide

MetaSleuth
April 28, 2024

Recently, web3 phishing websites have resulted in significant user losses. These phishing websites disguise themselves as reputable projects and deceive users into signing transactions that rapidly deplete their crypto assets. Meanwhile, a new form of scam-as-a-service (SaaS) has emerged. Specifically, the service provider supplies collaborators with the phishing toolkit and requires a percentage, typically 20% or 30%, of their earnings in return. Among these service providers, a notorious case is “Inferno Drainer,” which has inflicted millions of dollars in losses upon thousands of victims. In this blog, we take “Inferno Drainer” as an illustrative example to analyze the profit-sharing process.

Exploring How Inferno Drainer Works: A Step-by-Step Operational Guide

In general, the operational process of Inferno Drainer can be divided into five steps.

  1. The provider of “Inferno Drainer” advertises their official promotion channel in TG, discord, and twitter.​

  2. A collaborator, who seeks to monetize his/her traffic but lacks technical expertise, joins the channel and shares his/her account with the provider.

  3. The provider supplies the collaborator with a ready-to-go phishing toolkit and deployment instructions.

  4. The collaborator launches the phishing website.

  5. When a victim falls for the scam, his/her crypto assets are usually transferred to a designated phishing account. Subsequently, the profits are shared between the Drainer admin and the collaborator account.

In the following paragraphs, we will reveal the profit-sharing process by analyzing two phishing scenarios involving ETH and ERC20, respectively.

ETH Phishing Scenario

Figure 1: The profit-sharing process in ETH phishing
Figure 1: The profit-sharing process in ETH phishing

The above diagram illustrates the profit-sharing process in ETH phishing. To deceive users of their ETH, the scammer deploys a phishing contract containing a payable function such as ‘mint’ or ‘airdrop’. Enticed by these function names, the victim mistakenly signs the phishing transaction. Upon receiving the victim’s ETH, the admin swiftly invokes the withdraw function, transferring 80% of the funds to the collaborator account. The remaining 20% is retained within the contract and will be withdrawn at the appropriate time.

Figure 2: A genuine case depicted with MetaSleuth
Figure 2: A genuine case depicted with MetaSleuth

Here is a genuine case depicted with MetaSleuth. Victim_0xb89e unintentionally sent 0.1126 ETH to the phishing contract. Subsequently, 80% of this amount, equivalent to 0.09 ETH, was rapidly withdrawn and transferred to a collaborator account.

You can review the fund flow using the following link: https://metasleuth.io/result/eth/0xfa59f0531af65c0a16b6c1834e3921e7fa519734d4d90675e479e99722d6f4ba

Figure 3: The profit-sharing process in ERC20 token phishing
Figure 3: The profit-sharing process in ERC20 token phishing

This diagram illustrates the profit-sharing process in ERC20 token phishing. Unlike ETH phishing, in this case, the phishing account is an EOA (Externally Owned Account). The phishing website initially prompts the victim to approve their ERC20 tokens to the phishing account. Subsequently, the phishing account transfers 20% of the approved tokens to the admin account, while the remaining 80% are transferred to the collaborator account.

Figure 4: A concrete case of Victim_0x0a0e and Victim_0x1fcd
Figure 4: A concrete case of Victim_0x0a0e and Victim_0x1fcd

Here is a concrete case. Victim_0x0a0e and Victim_0x1fcd unintentionally approved their USDT and DAI to the phishing account. Subsequently, the phishing account transferred 20% and 80% of these tokens to the admin and collaborator accounts, respectively.

You can review the fund flow using the following link: https://metasleuth.io/result/eth/0x1ba31a2751259048e1e559df59bcdf80015e15359674aaf64e936cb98630b810?source=d0a430bd-2b7e-46bb-8788-b0f8ba39f366.

Key Insights and Findings on the Inferno Drainer System

To gather evidence of profit-sharing activities, we have conducted a comprehensive analysis of all history transactions associated with the admin account. It is important to highlight that we solely focus on cases where the profit-sharing percentage is either 20% or 30%. In our investigation, we discovered 3,223 profit-sharing transactions totaling $5.02 million in funds. Among these transactions, the admin account has received $1.07 million as fees from 351 collaborators. Additionally, our phishing detection system has identified 574 related phishing websites.

To protect users from Inferno Drainer, we have promptly reported all of these websites to MetaMask (https://github.com/blocksecscamreport/eth-phishing-detect/commits?author=blocksecscamreport&before=01bf4f680061bc39ecd2d55425774fc3092aa3cc+35).

Summary

This particular form of SaaS, involving profit-sharing, is rapidly evolving. We will remain vigilant, continually monitoring related phishing accounts and transactions. We urge users to exercise caution and diligently review transaction details before approving any actions. This blog aims to help users understand the profit-sharing process and protect themselves against potential phishing websites in the blockchain domain.

About MetaSleuth

MetaSleuth is a comprehensive platform developed by BlockSec to assist users in effectively tracking and investigating all crypto activities. With MetaSleuth, users can easily track funds, visualize fund flows, monitor real-time fund movements, save important information, and collaborate by sharing their findings with others. Currently, we support 13 different blockchains, including Bitcoin (BTC), Ethereum (ETH), Tron (TRX), Polygon (MATIC), and more.

Website: https://metasleuth.io/

Twitter: @MetaSleuth

Telegram: https://t.me/MetaSleuthTeam

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation