Crypto Alert: 2 Victims Lose Over $60M In Address Poisoning Scam

bitcoinistPublicado a 2026-02-09Actualizado a 2026-02-09

Resumen

Cryptocurrency users are facing significant losses due to address poisoning scams, where attackers send tiny "dust" transactions from lookalike addresses. When users copy what appears to be a familiar address, they instead send funds to a fraudulent account. In January, one victim lost $12.25 million, following a $50 million loss in December. Additionally, signature phishing is rising sharply, with $6.27 million stolen from 4,741 victims in January—a 207% increase from the previous month. These scams trick users into approving malicious smart contracts. Analysts report approximately 270 million poisoning attempts across Ethereum and Binance Smart Chain, targeting 17 million addresses. Over 6,633 confirmed theft cases have resulted in more than $83.8 million in losses. The Fusaka upgrade on Ethereum, which reduced transaction fees, has made it cheaper for scammers to execute these attacks. Stablecoins like DAI are often used to move illicit funds due to a lack of cooperation with freezing mechanisms.

A simple slip of the fingers has turned into huge losses for some crypto users. One wallet lost over $12 million in January after copying the wrong address, and similar high-value mistakes were seen in December.

Reports say attackers are using tiny deposits and subtle address tweaks to trick people into sending funds to accounts they do not control.

How Copying Mistakes Turn Costly

Address lookalikes are the trick. Attackers send tiny “dust” transfers from addresses that mimic ones in a user’s history so that when someone copies an address they get the wrong string.

According to Scam Sniffer, that single mistake cost one user $12.2 million in January and followed a $50 million hit in December.

The tactic relies on people trusting what appears familiar; it works because most wallets show only the first and last few characters, and the middle can be swapped for a malicious match.

Signature Phishing Is Growing Too

Signature scams lure users into approving dangerous contract calls or broad token approvals. Reports say $6.27 million was stolen from 4,741 victims in January, a 207% rise from December.

Two wallets took the lion’s share — accounting for 65% of those signature phishing losses. Attackers increasingly mix both tricks: small deposits to get attention, followed by social engineering that convinces someone to sign a transaction.

Scale And Automation

This is not limited to a few isolated scams. Based on reports from several trackers, roughly 270 million poisoning attempts have been recorded across Ethereum and Binance Smart Chain, targeting around 17 million addresses.

Total crypto market cap at $2.35 trillion on the daily chart: TradingView

Confirmed cases leading to actual theft number about 6,633, but the confirmed loss figure already tops $83.8 million. One campaign alone created 82,030 lookalike wallets, and in September 2025 there were about 32,290 suspicious poisoning events hitting 6,516 unique victims.

The numbers show a picture of automated scripts and high-volume tactics designed to find and exploit simple human errors.

Image: Chainalysis

Why Ethereum Has Seen More Dust Activity

Analysts link part of the recent surge to the Fusaka upgrade, which lowered the cost of sending tiny transactions. Coin Metrics analyzed over 227 million stablecoin balance updates on Ethereum from November 2025 through January 2026 and found that 38% of those updates were under a single penny.

Stablecoin-related dust now makes up an estimated 11% of Ethereum transactions and touches 26% of active addresses on an average day. Lower fees make these spray-and-pray tactics cheap and efficient.

Where Stolen Funds End Up

Blockchain intelligence teams have tracked flows and noticed patterns. Whitestream reports that DAI has become a favored place to park illicit proceeds because its protocol governance does not cooperate with authorities to freeze wallets.

Web3 Antivirus has cataloged a range of large poisonings, with tracked losses spanning from $4 million to $126 million in some incidents. Once funds move through these paths they are often hard to recover.

Featured image from Arek Socha/Pixabay, chart from TradingView

Preguntas relacionadas

QWhat is an address poisoning scam in the context of cryptocurrency?

AAn address poisoning scam is a tactic where attackers send tiny 'dust' transfers from addresses that mimic ones in a user's transaction history. This tricks the user into copying the wrong, malicious address when they intend to send funds, resulting in the loss of their cryptocurrency.

QHow much did a single user lose in January due to copying the wrong address, and what was the larger loss reported in December?

AIn January, a single user lost $12.2 million by copying the wrong address. This followed a larger loss of $50 million from a similar mistake in December.

QBesides address poisoning, what other type of attack saw a significant increase in January, and by what percentage did it grow?

ASignature phishing attacks also saw a significant increase. $6.27 million was stolen from 4,741 victims in January, representing a 207% rise from December.

QWhat technical upgrade on the Ethereum network is linked to the recent surge in dusting activity for these scams?

AThe Fusaka upgrade on the Ethereum network is linked to the surge in dusting activity because it lowered the cost of sending tiny transactions, making these spray-and-pray tactics cheap and efficient for attackers.

QAccording to the article, which stablecoin has become a favored place for attackers to park illicit proceeds and why?

ADAI has become a favored place for attackers to park illicit proceeds because its protocol governance does not cooperate with authorities to freeze wallets, making it harder to recover stolen funds.

Lecturas Relacionadas

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

The article "a16z: AI's 'Amnesia' – Can Continual Learning Cure It?" explores the limitations of current large language models (LLMs), which, like the protagonist in the film *Memento*, are trapped in a perpetual present—unable to form new memories after training. While methods like in-context learning (ICL), retrieval-augmented generation (RAG), and external scaffolding (e.g., chat history, prompts) provide temporary solutions, they fail to enable true internalization of new knowledge. The authors argue that compression—the core of learning during training—is halted at deployment, preventing models from generalizing, discovering novel solutions (e.g., mathematical proofs), or handling adversarial scenarios. The piece introduces *continual learning* as a critical research direction to address this, categorizing approaches into three paths: 1. **Context**: Scaling external memory via longer context windows, multi-agent systems, and smarter retrieval. 2. **Modules**: Using pluggable adapters or external memory layers for specialization without full retraining. 3. **Weights**: Enabling parameter updates through sparse training, test-time training, meta-learning, distillation, and reinforcement learning from feedback. Challenges include catastrophic forgetting, safety risks, and auditability, but overcoming these could unlock models that learn iteratively from experience. The conclusion emphasizes that while context-based methods are effective, true breakthroughs require models to compress new information into weights post-deployment, moving from mere retrieval to genuine learning.

marsbitHace 2 hora(s)

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

marsbitHace 2 hora(s)

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

An individual manipulated a weather sensor at Paris Charles de Gaulle Airport with a portable heat source, causing a Polymarket weather market to settle at 22°C and earning $34,000. This incident highlights a fundamental issue in prediction markets: when a market aims to reflect reality, it also incentivizes participants to influence that reality. Prediction markets operate on two layers: platform rules (what outcome counts as a win) and data sources (what actually happened). While most focus on rules, the real vulnerability lies in the data source. If reality is recorded through a specific source, influencing that source directly affects market settlement. The article categorizes markets by their vulnerability: 1. **Single-point physical data sources** (e.g., weather stations): Easily manipulated through physical interference. 2. **Insider information markets** (e.g., MrBeast video details): Insiders like team members use non-public information to trade. Kalshi fined a剪辑师 $20,000 for insider trading. 3. **Actor-manipulated markets** (e.g., Andrew Tate’s tweet counts): The subject of the market can control the outcome. Evidence suggests Tate’sociated accounts coordinated to profit. 4. **Individual-action markets** (e.g., WNBA disruptions): A single person can execute an event to profit from their pre-placed bets. Kalshi and Polymarket handle these issues differently. Kalshi enforces strict KYC, publicly penalizes insider trading, and reports to regulators. Polymarket, with its anonymous wallet-based system, has historically been more permissive, arguing that insider information improves market accuracy. However, it cooperated with authorities in the "Van Dyke case," where a user traded on classified government information. The core paradox is reflexivity: prediction markets are designed to discover truth, but their financial incentives can distort reality. The more valuable a prediction becomes, the more likely participants are to influence the event itself. The market ceases to be a mirror of reality and instead shapes it.

marsbitHace 3 hora(s)

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

marsbitHace 3 hora(s)

Trading

Spot
Futuros
活动图片