The notorious phishing toolkit, Angel Drainer, resurfaced with a revamped version called AngelX.
Upgraded Threat Capabilities
Launched on August 31, AngelX represents a significant upgrade from its predecessor. The new version has been designed to exploit newer and less secure blockchains, such as The Open Network (TON) and the Tron network. According to Blockaid, these blockchains are perceived as less equipped to defend against phishing attacks due to their relatively nascent security tools and infrastructure.
Enhanced Features and Evasion Tactics
AngelX boasts an improved user experience (UX) and control panel, which enable scammers to create highly customizable and sophisticated malicious dApps. This upgraded interface facilitates the development of tailored phishing applications that can easily bypass existing security measures. One of the most concerning features of AngelX is its high evasion rate. According to Blockaid, many of the malicious dApps developed using AngelX have successfully evaded detection by other security tools, complicating efforts by security professionals to identify and address these threats.
A Brief History of Angel Drainer
The original Angel Drainer, which was linked to over $25 million in stolen crypto assets, had reportedly ceased operations on July 16 after its developers’ identities were potentially uncovered. The reemergence of Angel Drainer in the form of AngelX has reinvigorated concerns within the crypto community. The earlier version of Angel Drainer was notorious for draining crypto wallets by deceiving users into approving fraudulent token transactions. The resurgence of Angel Drainer comes at a time when phishing scams are surging. According to data from ScamSniffer, August saw nearly $63 million lost to phishing attacks, a 215% increase from the previous month.
The return of Angel Drainer in the form of AngelX underscores the need for heightened security measures within blockchain communities. New phishing schemes and upgraded tools like AngelX present a serious threat, requiring continuous attention and the development of advanced defensive mechanisms.
Comments