Back to Blog

爆红项目“Inferno Drainer”利润分享详解:全面指南

MetaSleuth
April 28, 2024
4 min read

近期,web3钓鱼网站导致用户遭受巨额损失。这些钓鱼网站伪装成知名项目,诱骗用户签署交易,从而迅速耗尽其加密资产。与此同时,一种新型的“诈骗即服务”(SaaS)模式应运而生。具体而言,服务提供商向合作者提供钓鱼工具包,并要求其利润的百分比,通常为20%或30%作为回报。在这些服务提供商中,“Inferno Drainer”是一个臭名昭著的案例,已给数千名受害者造成数百万美元的损失。在这篇博文中,我们将以“Inferno Drainer”为例,分析其利润分享过程。

探索Inferno Drainer的工作原理:分步操作指南

总的来说,Inferno Drainer 的操作过程可分为五个步骤。

  1. “Inferno Drainer”的提供商在 TG、Discord 和 Twitter 上宣传其官方推广渠道。

  2. 寻求将其流量变现但缺乏技术专长的合作者加入该频道,并与提供商共享其账户。

  3. 提供商向合作者提供现成的钓鱼工具包和部署说明。

  4. 合作者上线钓鱼网站。

  5. 当受害者上当受骗时,其加密资产通常会被转移到一个指定的钓鱼账户。随后,利润会在 Drainer 管理员和合作者账户之间进行分配。

在接下来的段落中,我们将通过分析涉及 ETH 和 ERC20 的两种钓鱼场景来揭示利润分享过程。

ETH 钓鱼场景

Figure 1: The profit-sharing process in ETH phishing
Figure 1: The profit-sharing process in ETH phishing

上图展示了 ETH 钓鱼场景中的利润分享过程。为了欺骗用户获取其 ETH,诈骗者部署了一个包含可支付函数(如 'mint' 或 'airdrop')的钓鱼合约。受这些函数名称的诱惑,受害者错误地签署了钓鱼交易。在收到受害者的 ETH 后,管理员会迅速调用提现函数,将 80% 的资金转入合作者账户。剩余的 20% 保留在合约中,并在适当的时候进行提取。

Figure 2: A genuine case depicted with MetaSleuth
Figure 2: A genuine case depicted with MetaSleuth

这是 MetaSleuth 描绘的一个真实案例。Victim_0xb89e 无意中向钓鱼合约发送了 0.1126 ETH。随后,该金额的 80%,即 0.09 ETH,被迅速提取并转入合作者账户。

您可以使用以下链接查看资金流向: https://metasleuth.io/result/eth/0xfa59f0531af65c0a16b6c1834e3921e7fa519734d4d90675e479e99722d6f4ba

Figure 3: The profit-sharing process in ERC20 token phishing
Figure 3: The profit-sharing process in ERC20 token phishing

该图展示了 ERC20 代币钓鱼场景中的利润分享过程。与 ETH 钓鱼不同,在这种情况下,钓鱼账户是 EOA(外部拥有账户)。钓鱼网站最初会提示受害者批准其 ERC20 代币转移到钓鱼账户。随后,钓鱼账户将批准代币的 20% 转给管理员账户,而剩余的 80% 则转给合作者账户。

Figure 4: A concrete case of Victim_0x0a0e and Victim_0x1fcd
Figure 4: A concrete case of Victim_0x0a0e and Victim_0x1fcd

这是一个具体案例。Victim_0x0a0eVictim_0x1fcd 无意中批准了他们的 USDT 和 DAI 转移到钓鱼账户。随后,钓鱼账户分别将这些代币的 20% 和 80% 转给了管理员和合作者账户。

您可以使用以下链接查看资金流向: https://metasleuth.io/result/eth/0x1ba31a2751259048e1e559df59bcdf80015e15359674aaf64e936cb98630b810?source=d0a430bd-2b7e-46bb-8788-b0f8ba39f366.

关于 Inferno Drainer 系统的关键见解和发现

为了收集利润分享活动的证据,我们对与管理员账户相关的所有历史交易进行了全面分析。需要强调的是,我们仅关注利润分享比例为 20% 或 30% 的情况。在我们的调查中,我们发现了 3,223 笔利润分享交易,涉及总计 502 万美元的资金。在这些交易中,管理员账户已从 351 名合作者处收取了 107 万美元的费用。此外,我们的钓鱼检测系统已识别出 574 个相关的钓鱼网站。

为了保护用户免受 Inferno Drainer 的侵害,我们已将所有这些网站 promptly 报告给 MetaMask (https://github.com/blocksecscamreport/eth-phishing-detect/commits?author=blocksecscamreport&before=01bf4f680061bc39ecd2d55425774fc3092aa3cc+35)。

总结

这种涉及利润分享的 SaaS 模式正在迅速发展。我们将保持警惕,持续监控相关的钓鱼账户和交易。我们敦促用户在批准任何操作之前,提高警惕,并仔细审查交易详情。本博客旨在帮助用户了解利润分享过程,并保护他们在区块链领域免受潜在钓鱼网站的侵害。

关于 MetaSleuth

MetaSleuth 是 BlockSec 开发的一个综合性平台,旨在协助用户有效地追踪和调查所有加密活动。通过 MetaSleuth,用户可以轻松追踪资金、可视化资金流、监控实时资金动向、保存重要信息,并通过与他人分享发现进行协作。目前,我们支持包括比特币 (BTC)、以太坊 (ETH)、波场 (TRX)、Polygon (MATIC) 等在内的 13 种不同的区块链。

网站:https://metasleuth.io/

Twitter:@MetaSleuth

Telegram:https://t.me/MetaSleuthTeam

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation