Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Celsius CEO Alex Massky received a 12-year ruling in a crypto fraud case

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases
Identity

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

userBy userMay 8, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have been making the public for several years what they call “industrial scale global cryptocurrency phishing operations,” designed to steal digital assets from cryptocurrency wallets.

The campaign was codenamed Freedrain by threat intelligence companies Sentinelon and Valin.

“Freedrain targets cryptocurrency wallets using SEO operations, free tier web services (such as gitbook.io, webflow.io, github.io, etc.), and layered redirect techniques.

“The victim searches for wallet-related queries, clicks on top malicious results, lands on the lure page, and is redirected to a phishing page that steals seed phrases.”

The size of the campaign is reflected in the fact that over 38,000 different Freedrain subdomain hosting lure pages have been identified. These pages are hosted on cloud infrastructures such as Amazon S3 and Azure web apps, mimicking the legal cryptocurrency wallet interface.

This activity is attributed to a high degree of confidence to individuals based on Indian Standard Time (IST) time zone, and cites GitHub commit patterns related to standard weekday times, lure pages.

The attack is known to target users searching for wallet-related queries such as “Trezor Wallet Balance” on search engines such as Google, Bing, and Duckduckgo, and redirect them to fake landing pages hosted on gitbook.io, webflow.io, and github.io.

Cybersecurity

Unsuspecting users who landed on these pages will provide static screenshots of the legitimate wallet interface.

Redirect users to a legitimate website and redirect users to other intermediary sites. Users effectively drain their wallets towards visually-like phishing pages that encourage them to enter seed phrases

“The whole flow is frictionless by combining design, SEO manipulation, familiar visual elements, and platform trust, suppressing the victim to a false sense of legitimacy,” the researchers said. “And once the seed phrase is submitted, the attacker’s automated infrastructure will drain the money within minutes.”

The text content used in these decoy pages is thought to be generated using large-scale language models such as OpenAI GPT-4O. This shows how threat actors abuse generative artificial intelligence (GENAI) tools to manufacture content.

Freedrain has been observed to resort to flooding unmaintained websites with thousands of spam comments to increase visibility of lure pages through search engine indexing.

It is worth pointing out that some aspects of the campaign have been documented by Netskope Threat Labs since August 2022, and recently, in October 2024, we found that we had used Webflow to spin up phishing sites decorated as Coinbase, Metamask, Phantom, Trezor and Bitbuy.

“Freedrain’s dependence on the Freedrain platform is not unique, and without better protection, these services will continue to be weaponized on a large scale,” the researchers said.

“The Freedrain network represents the latest blueprint for scalable phishing operations that thrive on free layer platforms, avoid traditional abuse detection methods, and adapt quickly to infrastructure takedowns.

The disclosure says it discovered a sophisticated phishing campaign that abuses discrepancies and singles cryptocurrency users to steal funds using a service as a drainer (DAAS) tool known as Inferno Drainer.

The attack seduces the victim and hijacks the expired Vanity Invite Links to join the malicious Discord server, while also leveraging the Discord OAuth2 authentication flow to avoid auto-detection of malicious websites.

Decomposition of total domain into questionable URLs confirmed URLs by amount.

Between September 2024 and March 2025, over 30,000 unique wallets were estimated to have been damaged by Inferno drainers, resulting in losses of at least $9 million.

Inferno Drainer claimed it had halted operations in November 2023. However, the latest findings reveal that cryptographic drainers remain active and employ single-use smart contracts and on-chain encrypted configurations to make detection even more difficult.

“Attackers will redirect users from legitimate Web3 websites to fake collaborations and phishing sites and ensure that they sign malicious transactions,” the company said. “The drain scripts deployed on that site were directly linked to Inferno’s drains.”

Cybersecurity

“Inferno Drainer employs advanced detection prevention tactics, including single-use and short-lived smart contracts, on-chain encrypted configurations, and proxy-based communications.

The findings continue to discover fraud campaigns that utilize Facebook ads that lead users to scrambled websites that impersonate trustworthy cryptocurrency exchanges and trading platforms such as Binance, Bybit, and TradingView, and direct users to download desktop clients.

“Query parameters related to Facebook ads are used to detect legitimate victims, but suspicious or automated analysis environments receive benign content,” Bitdefender said in a report they share with the publication.

“If a site detects suspicious conditions (for example, missing environments typical of AD-Tracking parameters or automated security analyses), it will instead display harmless and irrelevant content.”

Once released, the installer will maintain the ruse by displaying the impersonated entity login page via msedge_proxy.exe. On the other hand, additional payloads run quietly to harvest system information, and run “hundreds of hours” sleep commands if the extracted data indicates a sandbox environment.

The Romanian cybersecurity company said hundreds of Facebook accounts are promoting pages determining these malware that have been targeting men for more than 18 years, primarily in Bulgaria and Slovakia.

“This campaign combines front-end deception with localhost-based malware services to showcase a hybrid approach,” he added. “By dynamically adjusting the victim’s environment and continuing to update the payload, threat actors maintain resilient and highly evasive operations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAlice Baltram leads strategic meeting at ZS
Next Article Sequoia leads a $1.5 billion tender offer for sales automation startup clay
user
  • Website

Related Posts

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025

Security tools alone won’t protect you – the control effect

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Celsius CEO Alex Massky received a 12-year ruling in a crypto fraud case

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

May 8, 2025

US attacks first trade deal with the UK with “groundbreaking deal” | International Trade News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.