Crypto User Loses $700,000 To Address Poisoning Scam—Here’s What Happened

by shayaan
Decrypt logo

An Ethereum user fell victim to an address poisoning scam on Sunday, resulting in the loss of nearly $700,000 worth of the USDT stablecoin.

Experts warn this rising form of scam is easy to fall victim to if users aren’t militant in fully checking the address that they’re sending funds to.

What is address poisoning?

For address poisoning to work, malicious actors create an address that looks strikingly similar to an address that the victim has interacted with recently. The attacker will then send a small amount of tokens to the victim, with the goal of deceiving them into thinking the attacker’s address is the one they just interacted with.

“Let’s say your deposit address is 0x11223344556677889900. On your wallet it will look like: 0x1122…9900,” 0xToolman, pseudonymous on-chain sleuth at Bubblemaps, told Decrypt. “Scammers then create an address with the public key 0x1122aaaaaaaaaaaaaa9900. Although it’s different, it still looks like 0x1122…9900 in your wallet or [on] Etherscan, making you think it’s the right address, while it’s belonging to the scammer.”

On Sunday, a malicious attacker sent a transaction of 0 USDT from a wallet that looked almost identical to a Binance wallet that the victim had sent a test transaction of 10 USDT to, just seconds prior.

“The victim likely copied what appeared to be a legitimate address from their transaction history, trusting it because they had just successfully completed a test transfer moments before,” a spokesperson for security firm PeckShield told Decrypt.

Scammers use specialized software to generate thousands of wallet addresses that match commonly used deposit addresses, in this case a Binance wallet, PeckShield added.

See also  What is a crypto mining farm? The ultimate guide

“It’s all automated. They use a spray-and-pray tactic, blasting out thousands of fake transactions,” Hakan Unal, Senior Blockchain Scientist at security firm Cyvers, explained. “Even if just 0.1% fall for it, hitting one high-value wallet makes it worth it. Super low effort, high reward.”

This is what led to the victim sending 699,990 USDT to the attacker. Soon after receiving the funds, blockchain investigation firm AMLBot told Decrypt, the scammer swapped the USDT to DAI to prevent Tether from freezing the funds.

As a decentralized stablecoin, DAI cannot freeze funds connected to malicious activity, AMLBot said, like Tether can with USDT. It appears the scammer has since passed the funds through multiple wallets to hide their tracks.

Address poisoning spreads

Address poisoning scams are on the rise, Cyvers warned Decrypt. Last year, one crypto trader lost over $70 million due to an address poisoning scam, in what Cyvers believed was the largest of its type. More recently, on Friday, a victim lost $467,000 worth of DAI after falling for the scam.

Fortunately, they can be avoided by paying extra attention when transferring funds.

“We suggest users always perform double or triple verification of full wallet addresses before initiating any transfers,” the PeckShield spokesperson told Decrypt. “Never trust truncated addresses (e.g., 0x123…abc)—always demand full address visibility. Conduct character-by-character validation when copying deposit addresses.”

See also  Layer-1 Project MultiversX Continues To Top the Crypto Gaming Sector in Terms of Development Activity: Santiment

“Cross-reference all transactions on blockchain explorers like Etherscan for additional confirmation,” the spokesperson said, adding that users should “never copy addresses from transaction history or unverified messages.”

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

You may also like

Latest News

Copyright © Sovereign Wealth Signals