Address Poisoning Scams Stealing Over $62M

News

2 months Ago

3 mins

2 months Ago

Scams

Address Poisoning Scams Stealing Over $62M

Scams

Address Poisoning Scams Stealing Over $62M

Key Takeaways

  • Recent scam address poisoning attacks have cost two major victims over $62 million, including a single $12.2 million loss in January.

  • Signature phishing activity rose by 207% in January, with attackers tricking users into signing malicious “unlimited token” approvals.

  • Analysts suggest the Ethereum Fusaka upgrade inadvertently made “dust attacks” cheaper, facilitating an increase in malicious activity.

Address poisoning trend not slowing down

The cryptocurrency security landscape is currently facing a persistent threat from a tactic known as “address poisoning.” This deceptive method involves attackers sending minute amounts of crypto—often referred to as “dust”—from an address that mimics a victim’s frequent transaction partners. The goal is simple yet devastating: the attacker hopes the victim will carelessly copy the “poisoned” address from their recent transaction history for a subsequent large transfer. This trend is showing no signs of slowing down, with security firm Scam Sniffer reporting that one victim lost $12.2 million in a single transaction after falling for this trap.

What makes this threat particularly insidious is the technical precision of the attackers. They generate vanity addresses that match the first and last few characters of a user’s known contacts, knowing that most users only verify the start and end of a string of characters.

While the middle of the address is entirely different, the visual similarity is enough to facilitate theft on a massive scale. Experts warn that this has become one of the most consistent ways for large amounts of capital to be permanently lost in the Web3 ecosystem.

Dust attacks on Ethereum have surged

The recent surge in these attacks has been linked to the Ethereum Fusaka upgrade, which took place in December. While the upgrade was intended to improve network efficiency, it also made the cost of sending small transactions significantly cheaper. This lowered “cost of entry” has allowed malicious actors to carry out dust attacks at a massive scale for a fraction of the previous price. In fact, stablecoin-related dust activity is now estimated to account for a staggering 11% of all Ethereum transactions on an average day.

It’s also worth noting that not all stablecoins are treated the same by the “bad guys.” Many are flocking to DAI as a place to stash their loot, mainly because DAI’s governance doesn’t play ball with authorities when it comes to freezing wallets. It’s the ultimate double-edged sword: you get total decentralization, but so do the hackers.

On top of that, we’re seeing a massive wave of signature phishing, which literally jumped over 200% last month. Scammers are getting so good at faking approvals that if you aren’t double-checking every character of a wallet address before you hit “send,” you’re essentially leaving your front door unlocked in a bad neighborhood.

Final Thoughts

As the cost of carrying out “dust attacks” drops, the burden of security falls squarely on the user. Vigilance and the use of “whitelisted” address books are now essential survival tools in the Ethereum ecosystem.

Frequently Asked Questions

What is an address poisoning attack?
It’s a scam where an attacker sends “dust” from a similar-looking address to your history, hoping you’ll copy it for your next big transfer.

Why did the Fusaka upgrade increase attacks?
The upgrade reduced transaction costs on Ethereum, making it much cheaper for scammers to send millions of tiny “poisoning” deposits.

How can I prevent address poisoning?
Never copy addresses from your transaction history. Always use a saved “whitelist” or verify every single character of the address before sending.

Join our growing community

Fatrick A

Author