Back to Blog

Inside Ethereum’s Shadow Economy: New Research Unmasks the $135M Drainer-as-a-Service Industry

Phalcon Compliance
October 21, 2025

A new academic paper, "Unmasking the Shadow Economy: A Deep Dive into Drainer-as-a-Service Phishing on Ethereum," has provided the first systematic look into a sophisticated criminal enterprise plaguing the Web3 space. This joint research by Zhejiang University and Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) uncovers the mechanics of "Drainer-as-a-Service" (DaaS)—a thriving underground economy that has stolen over 💲135 million from 76,582 victims.

We at BlockSec are especially proud that the paper's first author, Bowen He, conducted part of this pivotal research during his internship with our team.

The DaaS Business Model: Industrializing Cybercrime

Unlike traditional, ad-hoc phishing, DaaS operates like a structured B2B software company. The paper details a clear operational pipeline:

  1. Operators (The Developers): These are the masterminds who develop and maintain sophisticated "wallet drainer" toolkits. These kits include phishing website templates and, crucially, automated profit-sharing smart contracts.
  2. Affiliates (The Distributors): They "lease" or acquire these toolkits. Their job is to deploy the phishing sites and drive traffic, luring victims through social media, fake airdrops, and compromised accounts. Once a victim is deceived into signing a malicious transaction, the stolen funds are automatically divided by the smart contract. The paper finds that the most common split is 20% to the operator and 80% to the affiliate. This high commission powerfully incentivizes affiliates to maximize their reach and scale the attacks, fueling the entire ecosystem.

Mapping a $135M Heist: The "Snowball Sampling" Approach

To quantify this shadow economy, the researchers developed an innovative "snowball sampling" approach. Starting from a seed set of known phishing addresses, they traced on-chain profit-sharing transactions to recursively discover new operators, affiliates, and contracts.

The findings from March 2023 to April 2025 are staggering:

  • Total Stolen: 💲135 million ($23.1M for operators, $111.9M for affiliates)

  • Criminal Infrastructure: 1,910 profit-sharing contracts and 87,077 profit-sharing transactions.

  • Criminal Network: 56 core operator accounts and 6,087 affiliate accounts.

The attacks are technically sophisticated. The paper reveals that drainers use different methods depending on the asset:

  • For ETH: Victims are tricked into calling a payable function (e.g., named "claim" or "mint").

  • For ERC-20s & NFTs: Phishing sites prompt victims to approve their assets to the drainer contract. The operator then uses a TransferFrom function to execute multiple transfer calls in a single transaction, draining various assets at once.

The Dominant Crime Families

The DaaS landscape is not a fragmented market. The research identifies nine major "families," with three groups dominating the network and capturing 93.9% of all illicit profits:

  1. Angel Drainer ($53.1M)
  2. Inferno Drainer ($59.0M)
  3. Pink Drainer ($14.7M) These are not just brand names; they are distinct organizations with unique operational strategies. The paper highlights how they manage their affiliate networks:
  • Advanced Management: Top families like Angel and Inferno Drainer provide affiliates with dedicated admin panels to track their earnings in real-time.

  • Gamified Incentives: They employ leveling systems. For instance, Inferno Drainer categorizes affiliates into tiers based on profit ($10k, $100k, $1M), offering top-tier members better support and rewards.

  • Bonus Rewards: To motivate performance, Angel Drainer randomly awards NFTs to high-earning affiliates, while Inferno Drainer periodically gives out rewards in ETH and even BTC to top performers.

A Massive Security Blind Spot

Using toolkit file fingerprints and monitoring Certificate Transparency logs for suspicious domain names, the researchers actively hunted for DaaS websites. They successfully identified and reported 32,819 phishing sites.

However, the most alarming discovery was the inadequacy of current industry defenses. The study found that only 10.8% of the DaaS-related addresses in their dataset were previously flagged on public trackers like Etherscan. This reveals a vast blind spot, allowing these criminal networks to operate with relative impunity.

Why This Research Is a Critical Wake-Up Call

The DaaS phenomenon proves that Web3 phishing has evolved from a simple scam into an industrialized, service-based criminal economy. It expertly exploits the permissionless and composable nature of DeFi for malicious ends.

This research underscores an urgent need for multi-layered security:

  • Proactive Threat Detection: Going beyond simple blacklists to identify criminal infrastructure as it's being built.

  • Advanced Wallet Security: Implementing robust transaction simulation and clear, human-readable warnings before users sign away their assets.

  • Ecosystem-Wide Collaboration: Creating faster, more comprehensive channels for sharing threat intelligence and labeling malicious addresses.

This research marks a turning point. Phishing on Ethereum is no longer a side hustle—it’s an industrialized, revenue-sharing economy operating in plain sight. At BlockSec, we will continue to leverage cutting-edge research to build the next generation of security tools that can effectively counter these evolving, professionalized threats.

See the paper: https://assets.blocksec.com/pdf/1761189308551-2.pdf

Sign up for the latest updates
Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Newsletter -  March 2026
Security Insights

Newsletter - March 2026

In March 2026, the DeFi ecosystem experienced three major security incidents. Resolv Protocol lost ~$80M due to compromised privileged infrastructure keys, BitcoinReserveOffering suffered ~$2.7M from a double-minting logic flaw, and Venus Protocol incurred ~$2.15M following a donation attack combined with market manipulation.

Start Real-Time AML with Phalcon Compliance

Turn Phalcon Network alerts into actions with Phalcon Compliance. Use verified blockchain intelligence to screen wallets, monitor transactions and investigate risks. This helps you respond quickly and stay compliant in the digital assets ecosystem.

Phalcon Compliance