Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1221

Wallet Drainer

What is Wallet Drainer?

Wallet DrainerMalicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs.


Wallet drainers are turnkey scam kits sold to affiliates on dark-web markets and Telegram. A victim is lured via fake airdrops, fake mints, hijacked X (Twitter) accounts, malvertising or phishing emails to a cloned dApp. Once they connect their wallet, the drainer crafts transactions abusing ERC-20 approve, permit, setApprovalForAll, Permit2, or signature-based off-chain authorisations to transfer tokens, NFTs, and native assets to attacker-controlled addresses. Notable kits include Inferno Drainer, Pink Drainer, MS Drainer, Angel Drainer, and Venom Drainer. Defenders rely on transaction-simulation wallets, allowance dashboards (revoke.cash), allowlists, hardware-wallet clear signing, and active phishing-domain takedowns.

Examples

  1. 01

    Inferno Drainer was responsible for over 80 million USD stolen from hundreds of thousands of wallets between 2022 and 2024 per public reports.

  2. 02

    Fake mint pages for high-profile NFT projects use drainer kits to seize entire collections in a single signature.

Frequently asked questions

What is Wallet Drainer?

Malicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs. It belongs to the Web3 & Blockchain category of cybersecurity.

What does Wallet Drainer mean?

Malicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs.

How does Wallet Drainer work?

Wallet drainers are turnkey scam kits sold to affiliates on dark-web markets and Telegram. A victim is lured via fake airdrops, fake mints, hijacked X (Twitter) accounts, malvertising or phishing emails to a cloned dApp. Once they connect their wallet, the drainer crafts transactions abusing ERC-20 approve, permit, setApprovalForAll, Permit2, or signature-based off-chain authorisations to transfer tokens, NFTs, and native assets to attacker-controlled addresses. Notable kits include Inferno Drainer, Pink Drainer, MS Drainer, Angel Drainer, and Venom Drainer. Defenders rely on transaction-simulation wallets, allowance dashboards (revoke.cash), allowlists, hardware-wallet clear signing, and active phishing-domain takedowns.

How do you defend against Wallet Drainer?

Defences for Wallet Drainer typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Wallet Drainer?

Common alternative names include: Crypto drainer, Drainer kit.

Related terms

See also