June 24, 2025
On an ordinary Thursday evening, thousands of crypto users did what they always do, visit CoinMarketCap to check token prices, track trends, and explore new projects. Everything seemed fine. The homepage loaded normally, complete with its signature doodle graphic at the top.
But hidden behind that seemingly harmless doodleโฆ was a trap.
A highly targeted, well-executed supply-chain attack was underway, and most visitors had no idea.
๐ญ A Familiar Prompt, A Dangerous Illusion
As users scrolled the CoinMarketCap homepage, something popped up:
โConnect your Wallet to Continue.โ
It looked legitimate. A clean interface mimicking WalletConnect.
Many users, conditioned by countless previous wallet interactions, didnโt think twice.
They clicked.
Within seconds, wallets were drained.
SOL, XRP, obscure meme tokens, and more, gone.
๐ Unmasking the Attack
This wasnโt a server breach. There were no leaks, no brute-force logins, and no malware downloads.
Instead, the attackers found a smarter way in, through the frontend.
They exploited a third-party image API used by CoinMarketCap to load its doodle. That API was silently compromised. When CoinMarketCap called it, it returned not just the imageโฆ but also malicious JavaScript code.
That code injected the fake wallet prompt right into the homepage, all within the browser.
Users never left the site. But their crypto left their wallets.
๐ธ The Aftermath
Within 24 hours:
โข 110+ wallets were compromised
โข At least $43,000 in funds were stolen
โข Tokens included $SOL, $XRP, $EVT, $PENGU, $SHDW, and others
โข The attacker used a tool known as Inferno Drainer, a wallet-draining-as-a-service platform growing in popularity
This wasnโt the first time Inferno Drainer was seen in action. But using CoinMarketCapโs trusted brand and homepage as the delivery vector? That was bold.
And most importantly:
The funds were traced to the drainer wallet:
โข 0x8a2983f358a03c6DB9c47a70e944368D4De77820
โข 0x030703e1EB18355a794F3f034Fe63959F8640D33
This address received tokens from victims across multiple chains. You can see the walletโs on-chain activity, including token swaps and consolidation behavior โ classic drainer operation.
Other IOCs involved
โข 0x000037bB05B2CeF17c6469f4BcDb198826Ce0000
โข 0x0000553F880fFA3728b290e04E819053A3590000
โข www.cdnkit[.]io
โข https://static.cdnkit[.]io
โข blockassets[.]app
๐ก๏ธ CoinMarketCapโs Response
To their credit, CoinMarketCap reacted quickly:
โข โ The fake pop-up was immediately removed
โข ๐ง The third-party API was patched
โข ๐ No backend servers or databases were breached
โข ๐ค Most importantly, CoinMarketCap committed to reimbursing affected users
They also stated they are reinforcing internal controls and reviewing all external integrations.
๐ง Lessons Learned
This wasnโt a smart contract exploit.
It was an exploit of trust, using a familiar interface, a trusted website, and user habits as the entry point.
The most dangerous scams arenโt always flashy. This one worked because it looked normal.
Even trusted platforms like CoinMarketCap can be used as vectors in supply-chain attacks.
โ How to Protect Yourself Going Forward
Hereโs what you can do right now to reduce your risk:
1. Donโt approve wallet prompts you didnโt expect.
2. Review token approvals regularly with tools like Revoke.cash.
3. Use browser extensions that detect wallet drainers (e.g., Wallet Guard, Scam Sniffer).
4. Bookmark official dApps and avoid interacting with wallet pop-ups on informational sites.
5. Always double-check transactions before signing.
๐งต Final Thoughts
The CoinMarketCap incident wasnโt the biggest crypto exploit by dollar amountโbut it was one of the most deceptive.
It showed us how fragile the frontend trust layer can be in Web3.
As users and builders, we must recognize that security isnโt just about smart contracts. Itโs about interfaces. Dependencies. And habits.
The drainer wallet may be just one address.
But the lesson it leaves behind affects millions.
Stay sharp.
Stay sovereign.
And never blindly click "Connect Wallet."
If this helped you or your community, consider sharing it to raise awareness. Security is a shared responsibility in Web3.
#CoinMarketCap #Web3Security #WalletDrainer #CryptoScams #InfernoDrainer #Phishing #CryptoNews
27 ์กฐํ