Back to Blog

恶魔提款机中的利润分享:全面指南

MetaSleuth
April 28, 2024

近期,web3网络钓鱼网站已导致用户遭受重大损失。这些钓鱼网站冒充知名项目,诱骗用户签署快速耗尽其加密资产的交易。与此同时,一种新的“诈骗即服务”(SaaS)模式也随之出现。具体而言,服务提供商向协作者提供钓鱼工具包,并要求从中获得部分收益,通常为20%或30%。在这些服务提供商中,“Inferno Drainer”是一个臭名昭著的案例,已给数千名受害者造成数百万美元的损失。在本博客中,我们将以“Inferno Drainer”为例,分析其利润分成过程。

探索Inferno Drainer的工作原理:分步操作指南

总体而言,Inferno Drainer 的操作过程可分为五个步骤。

  1. “Inferno Drainer”的提供商在TG、Discord和Twitter上宣传其官方推广渠道。

  2. 寻求将其流量变现但缺乏技术专长的协作者加入该频道,并与其提供商共享其账户。

  3. 提供商为协作者提供现成的钓鱼工具包和部署说明。

  4. 协作者启动钓鱼网站。

  5. 当受害者上当受骗时,其加密资产通常会被转移到指定的钓鱼账户。随后,利润将在Drainer管理员和协作者账户之间进行分配。

在接下来的段落中,我们将通过分析涉及ETH和ERC20的两种钓鱼场景来揭示利润分成过程。

ETH钓鱼场景

Figure 1: ETH钓鱼中的利润分成过程
Figure 1: ETH钓鱼中的利润分成过程

上图说明了ETH钓鱼中的利润分成过程。为了骗取用户的ETH,诈骗者会部署一个包含可支付函数(如“mint”或“airdrop”)的钓鱼合约。受这些函数名称的诱惑,受害者会错误地签署钓鱼交易。在收到受害者的ETH后,管理员会迅速调用提款函数,将80%的资金转移到协作者账户。剩余的20%将保留在合约中,并在适当时候提取。

Figure 2: MetaSleuth描绘的真实案例
Figure 2: MetaSleuth描绘的真实案例

这是一个通过MetaSleuth描绘的真实案例。Victim_0xb89e无意中向钓鱼合约发送了0.1126 ETH。随后,该金额的80%,即0.09 ETH,被迅速提取并转移到协作者账户。

您可以通过以下链接查看资金流向: https://metasleuth.io/result/eth/0xfa59f0531af65c0a16b6c1834e3921e7fa519734d4d90675e479e99722d6f4ba

Figure 3: ERC20代币钓鱼中的利润分成过程
Figure 3: ERC20代币钓鱼中的利润分成过程

该图说明了ERC20代币钓鱼中的利润分成过程。与ETH钓鱼不同,在这种情况下,钓鱼账户是一个EOA(外部拥有账户)。钓鱼网站最初会提示受害者将他们的ERC20代币授权给钓鱼账户。随后,钓鱼账户将20%的已授权代币转给管理员账户,而剩余的80%则转给协作者账户。

Figure 4: Victim_0x0a0e和Victim_0x1fcd的具体案例
Figure 4: Victim_0x0a0e和Victim_0x1fcd的具体案例

这是一个具体案例。Victim_0x0a0eVictim_0x1fcd无意中将其USDT和DAI授权给了钓鱼账户。随后,钓鱼账户分别将这些代币的20%和80%转给了管理员和协作者账户。

您可以通过以下链接查看资金流向: https://metasleuth.io/result/eth/0x1ba31a2751259048e1e559df59bcdf80015e15359674aaf64e936cb98630b810?source=d0a430bd-2b7e-46bb-8788-b0f8ba39f366.

关于Inferno Drainer系统的关键见解和发现

为了收集利润分成活动的证据,我们对与管理员账户相关的所有历史交易进行了全面分析。值得强调的是,我们仅关注利润分成比例为20%或30%的案例。在我们的调查中,我们发现了3,223笔利润分成交易,涉及总计502万美元的资金。其中,管理员账户已从351名协作者那里收取了107万美元的费用。此外,我们的钓鱼检测系统已识别出574个相关的钓鱼网站。

为了保护用户免受Inferno Drainer的侵害,我们已迅速将所有这些网站报告给MetaMask(https://github.com/blocksecscamreport/eth-phishing-detect/commits?author=blocksecscamreport&before=01bf4f680061bc39ecd2d55425774fc3092aa3cc+35)。

总结

这种涉及利润分成的SaaS模式正在迅速发展。我们将保持警惕,持续监控相关的钓鱼账户和交易。我们敦促用户在批准任何操作之前,务必谨慎并仔细审查交易详情。本博客旨在帮助用户理解利润分成过程,并保护他们在区块链领域免受潜在钓鱼网站的侵害。

关于MetaSleuth

MetaSleuth是由BlockSec开发的一个综合平台,旨在帮助用户有效地跟踪和调查所有加密活动。通过MetaSleuth,用户可以轻松跟踪资金、可视化资金流、监控实时资金动向、保存重要信息,并通过与他人分享他们的发现来协作。目前,我们支持包括比特币(BTC)、以太坊(ETH)、波场(TRX)、Polygon(MATIC)在内的13种不同的区块链。

网站:https://metasleuth.io/

Twitter:@MetaSleuth

Telegram:https://t.me/MetaSleuthTeam

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation