Emergence of structured Drainer-as-a-Service platforms with affiliate-driven wallet theft operations
Summary
Hide ▲
Show ▼
Underground cybercriminal ecosystems have matured into structured Drainer-as-a-Service (DaaS) platforms, exemplified by the "Lucifer" operation, which professionalizes wallet theft through SaaS-like models including affiliate commissions, automation, and resilience measures. Victims are lured via phishing to fake crypto, NFT, airdrop, or DeFi sites where wallet connection and transaction approvals enable near-instant asset transfer across blockchains. Affiliates drive traffic while DaaS operators handle infrastructure, transaction logic, and asset draining, splitting proceeds from successful thefts. These platforms lower technical barriers for attackers, increase operational scalability, and resist takedowns through decentralized documentation and rapid reconfiguration, raising the threat level for cryptocurrency users and organizations.
Timeline
-
21.05.2026 17:00 1 articles · 1h ago
Lucifer Drainer evolves into automated, commission-based DaaS platform with affiliate-driven wallet theft operations
In March 2025, Lucifer released drainer version 6.6.6 featuring ERC20 support, Permit2 abuse, off-chain signatures, multichain support, and Telegram notifications. By mid-2025, the operation integrated website cloning, automated ZIP deployment, and "Zero Config" workflows to streamline phishing campaigns for affiliates. The platform enforced a 20% commission on successful thefts and prohibited direct software sales, emphasizing affiliate recruitment and operational resilience through decentralized documentation and rapid reconfiguration.
Show sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
Information Snippets
-
Lucifer DaaS operated between January 2025 and early 2026, releasing wallet-draining software versions such as 6.6.6 with ERC20 support, Permit2 abuse, off-chain signatures, multichain functionality, and Telegram notifications.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Lucifer used a 20% commission model on successful wallet thefts and explicitly prohibited direct software sales, positioning itself as an affiliate-driven platform rather than a malware kit.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Affiliates recruited by Lucifer were expected to generate phishing traffic via fake sites, compromised social media, ads, spam, or DMs, while operators managed wallet interaction, signatures, and asset transfers.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Lucifer introduced automated features such as website cloning, ZIP deployment packages, and "Zero Config" workflows to reduce technical overhead for affiliates and accelerate phishing campaigns.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Operational resilience tactics included migrating Telegram bots after takedowns, relocating documentation to IPFS following domain suspension, and adapting to wallet blacklists and anti-phishing defenses.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Modern drainers abuse wallet authorization mechanisms such as Permit and Permit2 to execute transfers without obvious direct transactions, making malicious prompts appear routine to victims.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00
-
Flare researchers analyzed approximately 700 underground forum, chat, and channel posts to reconstruct operational details of Lucifer Drainer and broader DaaS trends.
First reported: 21.05.2026 17:001 source, 1 articleShow sources
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet — www.bleepingcomputer.com — 21.05.2026 17:00