Slow Fog: Ledger Connect Kit event initiator Angel Drainer uses smart contracts to manage malicious JS file access to domain names
ChainCatcher message, the Slow Mist Security Team conducted an in-depth analysis of the Ledger Connect Kit supply chain attack incident and found that this attack was initiated by the notorious Angel Drainer phishing gang. The Angel Drainer phishing gang uses smart contracts to manage the access domain names of malicious JS files. In order to minimize asset losses for Web3 users due to phishing attacks, the Slow Mist Security Team, in collaboration with the Scam Sniffer team, identified thousands of phishing websites through a series of characteristics of the Angel Drainer phishing gang and reported these phishing websites to eth-phishing-detect, hoping to maintain the ecological safety of the Web3 industry with the power of the community.Currently, the Slow Mist Security Team has submitted the discovered phishing websites to eth-phishing-detect: https://github.com/MetaMask/eth-phishing-detect/pull/14528.At the same time, the Slow Mist Security Team used the Dune tool to create a data dashboard to assist the community in viewing the domain names of malicious JS: https://dune.com/misttrack/angel-drainer, so that users can view and protect their assets.