Monday, January 26, 2026
STA: $0.0000 +0.00%

New ‘Micro-Drain’ Attack Hits EVM Chains; $107K Siphoned from Small Wallets

A stealthy new exploit is targeting the ‘long tail’ of crypto users, draining under $2,000 per wallet to avoid detection.

A coordinated wallet-draining operation is sweeping across EVM-compatible networks, targeting hundreds of users for relatively small sums in what appears to be a calculated effort to evade detection.

On-chain investigator ZachXBT alerted the market to the campaign on Jan. 2, noting that the attacker is systematically siphoning funds from self-custody wallets on Ethereum, BNB Chain, and Base. Unlike typical high-profile exploits that target whales or protocol treasuries, this entity is executing a high-volume, low-value strategy, draining less than $2,000 per victim.

It appears hundreds of wallets are currently being drained on various EVM chains for small amounts (<$2k total per victim) with a root cause not yet identified.

The Numbers

Aggregate losses currently sit at approximately $107,000 and are rising. The attacker’s address (0xAc2e...9bFB) is consolidating funds from at least 20 different blockchains.

Breakdown of the drained assets:

  • Ethereum: ~$54,655 (51% of total)
  • BNB Chain: ~$25,545 (24%)
  • Base: ~$8,688 (8%)
  • Residuals: Scattered across Arbitrum, Polygon, Optimism, and Avalanche.

Vectors: Phishing vs. Supply Chain

The root cause remains unconfirmed, but evidence points to a multi-pronged social engineering campaign. Community reports indicate a wave of sophisticated phishing emails impersonating MetaMask, urging users to perform an immediate “security upgrade.”

However, the scope suggests a broader compromise. Blockchain analytics firm Nansen and ZachXBT have noted potential links between this attacker and the recent Trust Wallet browser extension compromise (version 2.68), which resulted in over $7 million in losses in late December. The reuse of infrastructure or laundering addresses implies the same threat actor may be harvesting residual keys from that supply-chain breach.

The Strategy: Evasion by Design

Security researchers classify this as a “smurfing” or “dusting” style attack. By keeping individual thefts under the $2,000 threshold, the attacker avoids triggering automated alerts from major security bots and whale trackers, which typically filter for six-figure movements. This allows the operation to persist longer before centralized exchanges or issuers can blacklist the destination addresses.