Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    The AI Hype Index: AI-powered toys are coming

    June 27, 2025

    How to Schedule Incremental Backups Using rsync and cron

    June 27, 2025

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
    Cyber Security

    38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

    MichaBy MichaMay 9, 2025Updated:May 9, 2025No Comments5 Mins Read

    38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

    Cybersecurity experts have unveiled an extensive global cryptocurrency phishing operation named FreeDrain, which has been rapidly stealing digital assets from cryptocurrency wallets for years.

    This campaign was identified by renowned threat intelligence firms, including SentinelOne and Validin.

    “FreeDrain leverages SEO manipulation, free web services (like gitbook.io, webflow.io, and github.io), and advanced redirection techniques to target cryptocurrency wallets,” stated security researchers Kenneth Kinion, Sreekar Madabushi, and Tom Hegel in their technical report shared with The Hacker News.

    “Victims searching for wallet-related keywords end up clicking on high-ranking malicious links, leading them to lure pages which redirect to phishing sites designed to steal their seed phrases.”

    The magnitude of the FreeDrain campaign is underscored by the detection of over 38,000 distinct sub-domains that host these lure pages, often mimicking real cryptocurrency wallet interfaces, and are hosted on robust cloud platforms like Amazon S3 and Azure Web Apps.

    Investigations indicate a high probability that the actors behind this operation are based in the Indian Standard Time (IST) zone, working during traditional weekday hours, as evidenced by patterns in their GitHub commits related to the lure pages.

    The phishing attacks mainly target individuals searching for wallet-related phrases such as “Trezor wallet balance” across leading search engines like Google, Bing, and DuckDuckGo, redirecting them to counterfeit landing pages hosted on platforms like gitbook.io, webflow.io, and github.io.


    Users who arrive on these lure pages are confronted with a static image of the legitimate wallet interface. Clicking on it can lead to one of three outcomes:
    • Redirecting the user to legitimate websites
    • Passing the user through intermediary sites
    • Directing the user to phishing pages that ask for their seed phrase, which can empty their wallets

    “The entire flow is designed to be seamless, combining SEO strategies, recognizable visual cues, and platform reliability to deceive victims into a sense of security,” the researchers noted. “Once a seed phrase is entered, the automated system swiftly drains the funds within minutes.”


    Attack Chain

    It is suspected that the text used in these decoy pages is generated via large language models like OpenAI’s GPT-4o, showcasing how threat actors exploit generative AI (GenAI) tools to produce content at scale.

    FreeDrain has also been found to flood poorly maintained websites with numerous spammy comments to improve the visibility of their lure pages via search engine indexing, a tactic known as spamdexing, commonly used to manipulate SEO.

    Notably, Netskope Threat Labs has documented certain aspects of this campaign since August 2022, with recent reports from October 2024 pinpointing the use of Webflow to create phishing sites that mimic exchanges like Coinbase, MetaMask, Phantom, Trezor, and Bitbuy.

    Researchers warn that “FreeDrain’s dependence on free-tier platforms isn’t unique; without improved security measures, these services will continue to be exploited extensively.”

    “This network exemplifies a modern framework for scalable phishing operations, thriving on free-tier platforms, evading conventional abuse detection, and swiftly adapting to infrastructure shutdowns. By exploiting various legitimate services to host content, distribute lure pages, and misdirect victims, FreeDrain has established a resilient ecosystem that’s tough to dismantle and easy to recreate.”

    This revelation coincides with Check Point Research’s findings of an advanced phishing campaign exploiting Discord to target cryptocurrency users, deploying a Drainer-as-a-Service (DaaS) tool called Inferno Drainer.

    The attacks lure victims into joining compromised Discord servers using expired vanity invite links, while also utilizing the Discord OAuth2 authentication flow to bypass automated detection of their malicious websites.


    Total Domains Breakdown
    Breakdown of total domains into suspected and confirmed URLs by quantity.

    Between September 2024 and March 2025, more than 30,000 unique wallets are estimated to have fallen victim to Inferno Drainer, resulting in losses exceeding $9 million.

    Although Inferno Drainer claimed to cease operations in November 2023, recent findings indicate that the crypto drainer is still active, utilizing single-use smart contracts and encrypted configurations to evade detection.

    “Attackers divert users from legitimate Web3 platforms to a fraudulent Collab.Land bot followed by phishing sites, tricking them into signing malicious transactions,” the company reported. “The drainer script on these sites was directly linked to Inferno Drainer.”

    Inferno Drainer employs sophisticated anti-detection strategies—including single-use and short-lived smart contracts, encryptedconfigurations, and proxy communication—to effectively evade wallet security measures and anti-phishing blacklists.

    This discovery aligns with the recent identification of a malvertising campaign that exploits Facebook ads impersonating trusted cryptocurrency exchanges and trading platforms like Binance, Bybit, and TradingView, directing users to dubious websites that encourage downloading a desktop client.

    Bitdefender highlighted that “query parameters related to Facebook Ads are used to identify legitimate victims, while automated analysis environments receive innocuous content.” Thus, if a site detects suspicious conditions, it displays harmless content instead.

    The installer, once activated, presents the login page of the impersonated entity through msedge_proxy.exe to maintain the façade, while additional payloads silently operate in the background to collect system information or execute a sleep command for extensive periods if the extracted data suggests a sandbox environment.

    According to Bitdefender, hundreds of Facebook accounts have promoted these malware-dispensing pages, primarily targeting men over 18 in Bulgaria and Slovakia.

    “This campaign exemplifies a hybrid strategy, integrating front-end deception with a localhost-based malware service,” it noted. “By dynamically adapting to the victim’s environment and consistently updating payloads, these threat actors uphold a resilient, highly evasive operation.”

    Source link

    0 Like this
    Crypto Exploiting FreeDrain Phrases Seed SEO Steal Subdomains Wallet
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleAI platforms for secure, on-prem delivery
    Next Article One of Elon Musk’s longtime VCs is suing his former employer after allegedly being fired

    Related Posts

    Cyber Security

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Cyber Security

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    June 27, 2025
    Cyber Security

    A Future World Of AI-Driven Network Security Solutions

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.