The notorious crypto hacking group has been linked to several Discord and Twitter hacks this year, stealing over $18 million from more than 9,000 victims.
Hacking group Pink Drainer strikes again, pilfering $4.4M from just 1 victim
The notorious crypto hacking group has been linked to several Discord and Twitter hacks this year, stealing over $18 million from more than 9,000 victims.
396 Total views 19 Total shares Listen to article
The crypto hacking group known as “Pink Drainer” has been tied to a massive $4.4 million theft of Chainlink (LINK) from a single victim — who was tricked into signing an “Increase Approval” function.
According to on-chain data, the victim was drained of a total of 275,700 in LINK — currently worth $4.33 million — across two transactions, an within a minute of signing the “Increase Approval” transaction.
Around 68,925 LINK was transferred to a wallet labeled on Etherscan as “PinkDrainer: Wallet 2,” while another 206,775 LINK was sent to an address ending “E70e.”
Speaking to Cointelegraph, blockchain security firm Scam Sniffer confirmed the recent theft was related to Pink Drainer, but said it remains unclear how the victim interacted with the phishing website. Scam Sniffer added it had identified at least 10 Pink Drainer scam sites in the last 24 hours.
“This is a typical attack where the victim happens to have a lot of assets,” the firm added.

Blockchain investigator ZachXBT noted the stolen funds have since been sold for Ether (ETH) and are currently being laundered through “instant cryptocurrency exchange” eXch.
Pink Drainer has been associated with several Discord and Twitter hacks in the past year, including Evomos, Pika Protocol, OpenAI chief technology officer Mira Murati, and Orbiter Finance.
The group has also been behind a spate of scams that involved them impersonating crypto journalists.
In June, Scam Sniffer found that approximately $3 million had been stolen by Pink Drainer over 1,932 victims.
As of Dec. 19, that number has risen to $18.7 million across 9,068 victims, according to data from Dune Analytics.
Add reaction














