Crypto Alert: 2 Victims Lose Over $60M In Address Poisoning Scam

bitcoinistPublished on 2026-02-09Last updated on 2026-02-09

Abstract

Cryptocurrency users are facing significant losses due to address poisoning scams, where attackers send tiny "dust" transactions from lookalike addresses. When users copy what appears to be a familiar address, they instead send funds to a fraudulent account. In January, one victim lost $12.25 million, following a $50 million loss in December. Additionally, signature phishing is rising sharply, with $6.27 million stolen from 4,741 victims in January—a 207% increase from the previous month. These scams trick users into approving malicious smart contracts. Analysts report approximately 270 million poisoning attempts across Ethereum and Binance Smart Chain, targeting 17 million addresses. Over 6,633 confirmed theft cases have resulted in more than $83.8 million in losses. The Fusaka upgrade on Ethereum, which reduced transaction fees, has made it cheaper for scammers to execute these attacks. Stablecoins like DAI are often used to move illicit funds due to a lack of cooperation with freezing mechanisms.

A simple slip of the fingers has turned into huge losses for some crypto users. One wallet lost over $12 million in January after copying the wrong address, and similar high-value mistakes were seen in December.

Reports say attackers are using tiny deposits and subtle address tweaks to trick people into sending funds to accounts they do not control.

How Copying Mistakes Turn Costly

Address lookalikes are the trick. Attackers send tiny “dust” transfers from addresses that mimic ones in a user’s history so that when someone copies an address they get the wrong string.

According to Scam Sniffer, that single mistake cost one user $12.2 million in January and followed a $50 million hit in December.

The tactic relies on people trusting what appears familiar; it works because most wallets show only the first and last few characters, and the middle can be swapped for a malicious match.

Signature Phishing Is Growing Too

Signature scams lure users into approving dangerous contract calls or broad token approvals. Reports say $6.27 million was stolen from 4,741 victims in January, a 207% rise from December.

Two wallets took the lion’s share — accounting for 65% of those signature phishing losses. Attackers increasingly mix both tricks: small deposits to get attention, followed by social engineering that convinces someone to sign a transaction.

Scale And Automation

This is not limited to a few isolated scams. Based on reports from several trackers, roughly 270 million poisoning attempts have been recorded across Ethereum and Binance Smart Chain, targeting around 17 million addresses.

Total crypto market cap at $2.35 trillion on the daily chart: TradingView

Confirmed cases leading to actual theft number about 6,633, but the confirmed loss figure already tops $83.8 million. One campaign alone created 82,030 lookalike wallets, and in September 2025 there were about 32,290 suspicious poisoning events hitting 6,516 unique victims.

The numbers show a picture of automated scripts and high-volume tactics designed to find and exploit simple human errors.

Image: Chainalysis

Why Ethereum Has Seen More Dust Activity

Analysts link part of the recent surge to the Fusaka upgrade, which lowered the cost of sending tiny transactions. Coin Metrics analyzed over 227 million stablecoin balance updates on Ethereum from November 2025 through January 2026 and found that 38% of those updates were under a single penny.

Stablecoin-related dust now makes up an estimated 11% of Ethereum transactions and touches 26% of active addresses on an average day. Lower fees make these spray-and-pray tactics cheap and efficient.

Where Stolen Funds End Up

Blockchain intelligence teams have tracked flows and noticed patterns. Whitestream reports that DAI has become a favored place to park illicit proceeds because its protocol governance does not cooperate with authorities to freeze wallets.

Web3 Antivirus has cataloged a range of large poisonings, with tracked losses spanning from $4 million to $126 million in some incidents. Once funds move through these paths they are often hard to recover.

Featured image from Arek Socha/Pixabay, chart from TradingView

Related Questions

QWhat is an address poisoning scam in the context of cryptocurrency?

AAn address poisoning scam is a tactic where attackers send tiny 'dust' transfers from addresses that mimic ones in a user's transaction history. This tricks the user into copying the wrong, malicious address when they intend to send funds, resulting in the loss of their cryptocurrency.

QHow much did a single user lose in January due to copying the wrong address, and what was the larger loss reported in December?

AIn January, a single user lost $12.2 million by copying the wrong address. This followed a larger loss of $50 million from a similar mistake in December.

QBesides address poisoning, what other type of attack saw a significant increase in January, and by what percentage did it grow?

ASignature phishing attacks also saw a significant increase. $6.27 million was stolen from 4,741 victims in January, representing a 207% rise from December.

QWhat technical upgrade on the Ethereum network is linked to the recent surge in dusting activity for these scams?

AThe Fusaka upgrade on the Ethereum network is linked to the surge in dusting activity because it lowered the cost of sending tiny transactions, making these spray-and-pray tactics cheap and efficient for attackers.

QAccording to the article, which stablecoin has become a favored place for attackers to park illicit proceeds and why?

ADAI has become a favored place for attackers to park illicit proceeds because its protocol governance does not cooperate with authorities to freeze wallets, making it harder to recover stolen funds.

Related Reads

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

In a span of four days, Amazon announced an additional $25 billion investment, and Google pledged up to $40 billion—both direct competitors pouring over $65 billion into the same AI startup, Anthropic. Rather than a typical venture capital move, this signals the latest escalation in the cloud wars. The core of the deal is not equity but compute pre-orders: Anthropic must spend the majority of these funds on AWS and Google Cloud services and chips, effectively locking in massive future compute consumption. This reflects a shift in cloud market dynamics—enterprises now choose cloud providers based on which hosts the best AI models, not just price or stability. With OpenAI deeply tied to Microsoft, Anthropic’s Claude has become the only viable strategic asset for Google and Amazon to remain competitive. Anthropic’s annualized revenue has surged to $30 billion, and it is expanding into verticals like biotech, positioning itself as a cross-industry AI infrastructure layer. However, this funding comes with constraints: Anthropic’s independence is challenged as it balances two rival investors, its safety-first narrative faces pressure from regulatory scrutiny, and its path to IPO introduces new financial pressures. Globally, this accelerates a "tri-polar" closed-loop structure in AI infrastructure, with Microsoft-OpenAI, Google-Anthropic, and Amazon-Anthropic forming exclusive model-cloud alliances. In contrast, China’s landscape differs—investments like Alibaba and Tencent backing open-source model firm DeepSeek reflect a more decoupled approach, though closed-source models from major cloud providers still dominate. The $65 billion bet is ultimately about securing a seat at the table in an AI-defined future—where missing the model layer means losing the cloud war.

marsbit1h ago

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

marsbit1h ago

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

DeepSeek-V4 has been released as a preview open-source model, featuring 1 million tokens of context length as a baseline capability—previously a premium feature locked behind enterprise paywalls by major overseas AI firms. The official announcement, however, openly acknowledges computational constraints, particularly limited service throughput for the high-end DeepSeek-V4-Pro version due to restricted high-end computing power. Rather than competing on pure scale, DeepSeek adopts a pragmatic approach that balances algorithmic innovation with hardware realities in China’s AI ecosystem. The V4-Pro model uses a highly sparse architecture with 1.6T total parameters but only activates 49B during inference. It performs strongly in agentic coding, knowledge-intensive tasks, and STEM reasoning, competing closely with top-tier closed models like Gemini Pro 3.1 and Claude Opus 4.6 in certain scenarios. A key strategic product is the Flash edition, with 284B total parameters but only 13B activated—making it cost-effective and accessible for mid- and low-tier hardware, including domestic AI chips from Huawei (Ascend), Cambricon, and Hygon. This design supports broader adoption across developers and SMEs while stimulating China's domestic semiconductor ecosystem. Despite facing talent outflow and intense competition in user traffic—with rivals like Doubao and Qianwen leading in monthly active users—DeepSeek has maintained technical momentum. The release also comes amid reports of a new funding round targeting a valuation exceeding $10 billion, potentially setting a new record in China’s LLM sector. Ultimately, DeepSeek-V4 represents a shift toward open yet realistic infrastructure development in the constrained compute landscape of Chinese AI, emphasizing engineering efficiency and domestic hardware compatibility over pure model scale.

marsbit2h ago

Computing Power Constrained, Why Did DeepSeek-V4 Open Source?

marsbit2h ago

Trading

Spot
Futures
活动图片