“Pink Drainer” Strikes Again, Stealing $4.4 Million in Latest Crypto Heist
The Elusive Culprits Unmasked: Pink Drainer’s Ruthless Tactics
In a daring and audacious move, the infamous hacking collective known as “Pink Drainer” has once again demonstrated their prowess by orchestrating a colossal heist, amassing a staggering $4.4 million from a solitary victim. This audacious act is the latest in a string of malevolent activities that have seen the group emerge as a menacing force in cryptocurrency. Over the past year, Pink Drainer has brazenly targeted numerous victims, culminating in their nefarious success of stealing over $18 million from more than 9,000 individuals.
The Cryptocurrency Web of Deceit: Laundering Stolen Funds with Precision
Digital sleuth ZachXBT, a seasoned investigator in the realm of blockchain, observed that the stolen funds had been swiftly converted into Ether (ETH) and were currently undergoing a meticulous process of laundering through an “instant cryptocurrency exchange” known as eXch. This sophisticated manoeuvre further underscores the adeptness of Pink Drainer and their determination to evade justice.
Expanding Horizons of Deception: Pink Drainer’s Ongoing Reign of Terror
Pink Drainer’s criminal portfolio extends beyond cryptocurrency heists, encompassing a series of Discord and X (formerly known as Twitter) hacks that have sent shockwaves throughout the crypto community. Their audacious targets have included entities such as Evomos, Pika Protocol, OpenAI’s chief technology officer, Mira Murati, and Orbiter Finance. Perhaps most audaciously, the group has been behind a spate of scams involving impersonations of crypto journalists, leaving countless victims in their wake.
The extent of Pink Drainer’s criminal enterprise has been steadily expanding. In June, Scam Sniffer reported a total theft of approximately $3 million from 1,932 victims. Astonishingly, as of December 19th, this figure has ballooned to an alarming $18.7 million, plundered from a staggering 9,068 victims, as per data obtained from Dune Analytics.