$1.6 million stolen from Crypto Users via Address Poisoning In A Week

Share this article

Latest News

Address poisoning attacks against cryptocurrency users have escalated dramatically, with scammers stealing more than $1.6 million in just one week — a figure far exceeding March’s total of $1.2 million.

The spike in losses highlights the growing malicious tactics of these attacks, where criminals contaminate users’ transaction histories with fraudulent addresses designed to trick victims into copying the wrong destination for their transfers.

The most devastating incident of the week happened when a single victim lost 140 ETH, valued at $636,500, after he inadvertently copied a malicious address from their compromised transaction history. ScamSniffer, a platform specializing in crypto scam prevention, documented the attack and issued warnings that the victim’s wallet had become a primary target for continued exploitation.

The data, compiled by media organisation Cointelegraph based on alerts by multiple cybersecurity firms, underscores the urgent need for enhanced security awareness among crypto users as these deceptive tactics become increasingly prevalent. 

Join our newsletter

How Address Poisoning Works

Address poisoning tricks crypto users by flooding their transaction history with fake transfers from lookalike wallet addresses. Scammers send tiny amounts from addresses that closely resemble legitimate ones users have previously transacted with.

When victims later copy addresses from their transaction history for new transfers, they accidentally select the fraudulent address instead of the real one. The copied address belongs to the scammer, who receives the full payment.

“Poisoners send small transfers from addresses that mimic a real one, so copying from history becomes a trap,” an expert from Web3 Antivirus explained. The security firm noted how this creates “transaction history poisoning” where fake addresses appear alongside legitimate ones.

Malicious signature attacks contributed another $600,000 in theft this week. Victims lost funds by signing dangerous blockchain permissions, including “approve”, “increaseAllowance”, and “permit” functions.

One of the victims lost $165,000 worth of BLOCK and DOLO tokens after signing malicious signatures, ScamSniffer reported. These permissions grant scammers access to drain wallet contents without additional authorization.

Protection Strategies Should Always Be in Place

Security experts recommend several defense measures against these attacks. Users should maintain address books or whitelists (a list of approved participants) for frequent recipients rather than copying from transaction history.

Verifying the full address before sending any transaction is another simple safeguard. Double-checking every character prevents falling victim to similar-looking fraudulent addresses.

The surge in address poisoning attacks highlights growing sophistication among crypto scammers. As adoption increases, criminals develop more subtle methods that exploit common user behaviors. 

Disclaimer: Coin Medium is not responsible for any losses or damages resulting from reliance on any content, products, or services mentioned in our articles or content belonging to the Coin Medium brand, including but not limited to its social media, newsletters, or posts related to Coin Medium team members.

The Prose Engineer
I am a journalist with over 17 years of experience, and I love crafting insightful content on topics ranging from cryptocurrency and sustainable development to renewable energy, commodity markets, and shipping issues. I bring both strategic thinking and a deep commitment to impactful storytelling. Outside the newsroom, I’m a proud mom of two, an avid traveler, and a passionate foodie who loves trying new cuisines. I thrive on making new friends and engaging in lively conversations. Whether I’m writing a feature or sharing stories over a meal, I bring curiosity, warmth, and clarity to everything I do.

Related Articles