Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
A new crypto scam targeting Raydium users has emerged, causing significant financial losses in the Solana ecosystem. This week, our security team identified multiple fake Raydium airdrop websites designed to drain cryptocurrency wallets. One victim lost over $15,000 in SOL and SPL tokens after connecting their wallet to what appeared to be an official Raydium promotion. Here’s what you need to know to protect your assets and identify these increasingly sophisticated attacks.
Raydium is a popular legitimate decentralized exchange (DEX) built on the Solana blockchain. Real Raydium (raydium.io) provides automated market making, liquidity pools, and yield farming services for Solana users. The platform has processed billions in trading volume and is a central piece of Solana’s DeFi ecosystem.
The scam we’ve identified involves counterfeit websites that precisely mimic the official Raydium interface. These fake sites primarily promote a non-existent “airdrop” of RAY tokens (Raydium’s native token) or other Solana-based cryptocurrencies. Visitors are prompted to connect their wallets to “verify eligibility” or “claim tokens” – but this connection actually initiates scripts designed to drain assets from the connected wallet.
Multiple security vendors, including GridinSoft, have confirmed that domains like raydium-usa[.]xyz are dangerous cryptocurrency scams. Technical analysis reveals these domains are typically registered just weeks before launching their attacks, with raydium-usa[.]xyz specifically created on February 11, 2025 through WEBCC registrar with privacy protection enabled to hide the true operators.
Source: Analysis of reported cryptocurrency scams in 2024, based on data from FTC, Chainanalysis, and GridinSoft Threat Research Lab
Our technical investigation revealed a sophisticated operation involving multiple components:
Indicator | Details | Risk Signal |
---|---|---|
Domain Age | Registered February 11, 2025 (recent) | High Risk |
Reputation Score | 1/100 (GridinSoft rating) | Critical Risk |
Hosting Provider | Cloudflare, Inc. (AS13335) | Neutral |
IP Address | 104.21.50.137 | Monitoring |
Domain Privacy | Whoisprotection.cc | Suspicious |
Similar Malicious Domains | Multiple variations detected | High Risk |
Source: GridinSoft Security Analysis, April 2025
// Snippet of actual drainer code (sanitized for safety) // This executes when a wallet is connected to the fake site async function drainWallet(provider) { try { // First, check wallet balance to prioritize tokens const connection = new Connection( 'https://api.mainnet-beta.solana.com' ); const publicKey = provider.publicKey; // Get SOL balance const solBalance = await connection.getBalance(publicKey); // Get token accounts (SPL tokens like USDC, RAY, etc) const tokenAccounts = await connection.getParsedTokenAccountsByOwner( publicKey, { programId: TOKEN_PROGRAM_ID } ); // First drain high value SPL tokens for (const tokenAccount of tokenAccounts.value) { const accountData = tokenAccount.account.data.parsed.info; const mintAddress = accountData.mint; const tokenBalance = accountData.tokenAmount.uiAmount; // Only process if balance exists if (tokenBalance > 0) { // Send to attacker wallet (actual code removed) console.log(`Draining ${tokenBalance} of token ${mintAddress}`); // drainSpecificToken(connection, provider, tokenAccount, attackerWallet); } } // Finally, drain remaining SOL balance minus fee if (solBalance > 0.001 * LAMPORTS_PER_SOL) { // Send to attacker wallet (actual code removed) console.log(`Draining ${solBalance/LAMPORTS_PER_SOL} SOL`); // drainSOL(connection, provider, attackerWallet); } // Show success message to victim while draining happens displayFakeSuccessMessage(); } catch (error) { // Silent error handling to avoid alerting victim console.error(error); } } |
To protect yourself from these scams, watch for these warning signs:
Mark (name changed), a 28-year-old software developer from Seattle, lost approximately $15,600 after connecting his wallet to what he thought was a legitimate Raydium liquidity mining program. He found the site through a Twitter post that appeared to come from a verified crypto influencer account (which had likely been compromised).
“I’ve been using Raydium for over a year, so the interface looked completely normal to me,” Mark explained. “The site asked me to connect my wallet to ‘verify eligibility’ for their new liquidity mining program. Within seconds of approval, I watched helplessly as transactions started firing off, draining my SOL, RAY, and USDC.”
This case highlights how even experienced crypto users can fall victim to these sophisticated scams. The transactions on Mark’s wallet were executed within 15 seconds of connection, leaving no time to revoke permissions.
Follow these security practices to protect yourself from crypto drainers and similar threats:
Security Measure | Implementation |
---|---|
Use a hardware wallet | Hardware wallets like Ledger or Trezor require physical confirmation for all transactions, preventing automatic draining |
Create a separate “hot wallet” for browsing | Keep minimal funds in wallets that you connect to DeFi sites; use a separate secure wallet for long-term holdings |
Verify through multiple channels | Cross-check promotions on the project’s official Twitter, Discord, and Medium accounts before taking action |
Use bookmark navigation | Bookmark official sites like raydium.io and always use these bookmarks instead of clicking links |
Install wallet protection tools | Consider security tools like Trojan Killer that can flag suspicious sites |
Install Web3 security extensions | Browser extensions like PocketUniverse or Wallet Guard can help identify malicious transactions |
Regularly revoke permissions | Use tools like revoke.cash to audit and revoke wallet permissions you’ve previously granted |
If you believe you’ve fallen victim to a crypto drainer scam:
Unfortunately, due to the irreversible nature of blockchain transactions, stolen funds are typically unrecoverable once transferred.
The Raydium airdrop scam is part of a broader trend targeting DeFi users. Be vigilant about these related scams:
Cryptocurrency scams have evolved significantly from simple phishing emails to sophisticated drainers that mimic legitimate platforms with near-perfect accuracy. The Raydium airdrop scam demonstrates how attackers are targeting specific DeFi ecosystems with precision attacks that exploit user familiarity and trust.
As blockchain technology and DeFi adoption continue to grow, we can expect these scams to become even more refined. The fundamental principle of crypto security remains the same: verify everything, trust minimally, and approach “free money” offers with extreme skepticism.
Stay vigilant, verify URLs carefully, and remember that in the cryptocurrency world, if something seems too good to be true, it invariably is.
No. These scams have no association with the legitimate Raydium DEX (raydium.io). They are fraudulent sites created by scammers who clone the official website’s appearance to trick users.
Unfortunately, recovery is generally not possible. Cryptocurrency transactions are irreversible by design, and once funds have been transferred to the scammer’s wallet, they are typically moved rapidly through multiple wallets and cross-chain bridges to obscure their trail.
Legitimate airdrops are always announced through official channels (the project’s verified Twitter, official Discord, and website). They never require you to send funds first or pay fees to claim tokens. When in doubt, visit the official website directly (not through links) and verify the information.
Many crypto drainer sites use sophisticated techniques to evade detection. They may load malicious code only after a wallet connection is made, use obfuscation to hide their true nature, or operate from newly registered domains that haven’t yet been added to security blacklists.
Scammers promote fake Raydium sites through multiple channels: compromised social media accounts, paid ads with misspelled keywords, bot spam in crypto communities, and occasionally through compromising legitimate crypto news sites. They may also use SEO techniques to appear in search results for terms like “Raydium airdrop” or “free RAY tokens”.
Website reputation checker can be highly effective at identifying crypto scams. In the case of raydium-usa[.]xyz, the site received the lowest possible reputation score (1/100), immediately flagging it as dangerous. These tools analyze multiple factors including domain age, hosting patterns, user reports, and known malicious indicators to provide an overall safety assessment.
Crypto scam domains operate on rapid timelines. Analysis shows that domains like raydium-usa[.]xyz are registered just weeks or months before launching their campaigns. Once reported or after they’ve successfully scammed enough victims, operators often abandon these domains and create new ones with slight variations. This pattern of “pop-up” domains makes them particularly dangerous and difficult to track.