Address Poisoning Scams Drain Millions as Crypto Attacks Surge

Crypto users lost tens of millions of dollars in January to address poisoning and signature phishing scams, as attackers exploited lower transaction costs and user inattention to steal funds at scale.

Scam Sniffer Warns of Spike in Address Poisoning Losses

Crypto wallet scams intensified in January, with address poisoning and signature phishing attacks driving significant losses, according to data from blockchain security firm Scam Sniffer.

In one of the most striking cases, a single victim lost $12.2 million after mistakenly copying a malicious address from their transaction history. The incident followed a similar address poisoning attack in December that resulted in roughly $50 million in losses.

Scam Sniffer reported that address poisoning remains one of the most reliable methods for draining large sums from crypto wallets. Attackers create addresses that match the first and last characters of a trusted wallet, while subtly altering the middle portion, making them difficult to spot at a glance.

Alongside address poisoning, signature phishing attacks also surged in January. Scam Sniffer estimates that $6.27 million was stolen from 4,741 victims through malicious signature requests, marking a 207% increase compared to December. Notably, just two wallets were responsible for 65% of all signature phishing-related losses during the month.

Unlike address poisoning, signature phishing relies on tricking users into signing harmful blockchain transactions, such as granting unlimited token approvals or authorizing fund transfers without realizing the consequences.

Analysts believe the recent rise in attack volume may be partly linked to Ethereum’s Fusaka upgrade, rolled out in December. By reducing transaction costs, the upgrade made it cheaper for attackers to send large numbers of dust transactions, lowering the barrier to running address poisoning campaigns at scale.

Read more: SEC Sounds Alarm as Crypto Scammers Flood Group Chats With AI-Powered Cons

Security firms continue to urge users to double-check wallet addresses, avoid copying addresses from transaction histories, and carefully review signature requests before approving them, as these attack methods show no signs of slowing down.

FAQ 🚨

  • What is address poisoning in crypto?

Scammers send look-alike wallet addresses to trick users into copying the wrong one.

  • How much was lost to these scams in January?

Victims lost tens of millions, including a single $12.2 million address poisoning case.

  • Why did signature phishing spike sharply?

Attackers exploited user inattention, stealing $6.27 million via malicious signatures.

  • What’s driving the rise in these attacks now?

Lower transaction fees made large-scale scam campaigns cheaper and easier to run.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

AI Crypto Agents Are Moving Real Money And the Risks Are Real: Expert

_AI crypto agents in DeFi are executing unscripted trades, raising risks of exploits, losses, and unpredictable market behavior._ A crypto researcher is raising red flags about AI agents managing real funds in DeFi. Tanaka, who has been testing these agent setups firsthand, says the danger is

LiveBTCNews3h ago

Gauntlet Update on Resolv Vulnerability Handling Progress: USDC Frontier has been de-risked and will gradually restart the treasury.

Gauntlet has updated the progress on resolving the vulnerability on platform X. The USDC Frontier (v1) on the Base network has been reallocated, eliminating bad debt risk. Deposits for v1 and v2 vaults are now reopened, and Morpho will remove the warning tomorrow. The mainnet USDC Frontier (v2) vault is being restarted, and more information will be provided based on subsequent fixes.

GateNews5h ago

List of DAO updates on USR event progress: $8.4 million loan has been repaid, risk nearly fully mitigated.

The List DAO has released an update on platform X, stating that the $8.6 million loan has been repaid $8.4 million, and all positions have been redeemed at a 1:1 ratio, with no losses to users. Only $26,000 remains unpaid, and relevant users are urged to contact us as soon as possible to complete repayment.

GateNews5h ago

Singapore cracks down on cryptocurrency asset theft case, involving an amount of 8.83 million Singapore dollars.

On March 29, Singapore cracked a case of internal employee conflict involving the theft of cryptocurrency assets, with an amount of 8.83 million Singapore dollars at stake. Three defendants, dissatisfied with their dismissal, illegally hacked into their former employer SafeX's account, stole cryptocurrency, and laundered money. Zhang Xinghua has pleaded guilty and received a two-year sentence, while one of the other two has fled.

GateNews6h ago

US crypto firm Goliath Ventures files for bankruptcy reorganization, accused of a $328 million Ponzi scheme

Florida-based crypto company Goliath Ventures has filed for Chapter 11 bankruptcy reorganization, accused of a $328 million Ponzi scheme, with over 2,000 investors affected. The former CEO has been arrested for telecom fraud and money laundering, with funds misappropriated to pay returns to early investors and for lavish spending.

GateNews21h ago

LiteLLM hacking incident: 500,000 credentials leaked, cryptocurrency wallets may be stolen, how to check if you're affected?

LiteLLM has been targeted by a supply chain attack, resulting in the leak of hundreds of gigabytes of data and 500,000 credentials, affecting over 20,000 code repositories. Hackers exploited vulnerabilities in Trivy to successfully implant malicious code and steal sensitive information. It is necessary to strengthen supply chain security and access control measures to prevent similar attacks.

区块客03-28 07:55
Comment
0/400
No comments