Crypto User Loses $50M USDT In Address Poisoning Attack – Details

bitcoinistPubblicato 2025-12-21Pubblicato ultima volta 2025-12-21

Introduzione

A crypto user lost $50 million USDT in an address poisoning attack, marking one of the largest individual on-chain losses in 2025. The scam involved the attacker sending a small "dust" transaction from a wallet address that closely resembled the victim's, tricking them into copying the fraudulent address from their transaction history. Despite sending a test transaction to the correct address, the victim later mistakenly sent the full amount to the poisoned address, which shared the same first and last few characters as the legitimate one. The stolen funds were quickly converted to ETH and distributed across multiple wallets, with some routed through Tornado Cash. The victim has since filed a criminal complaint and is monitoring all addresses involved. They have also sent an on-chain message offering the attackers a deal: return 98% of the funds within 48 hours and keep $1 million as a "bug bounty." If the offer is refused, the victim will escalate the matter to international law enforcement and pursue legal action.

An unsuspecting crypto user has recently lost $50 million USDT in an address poisoning scam. The incident represents one of the largest on-chain losses in 2025, drawing reactions from crypto security experts as new developments on the matter roll in.

Copy-Paste Mistake Costs User 50M USDT

Address poisoning is a scam in which an attacker sends small transactions from a wallet address that closely resembles a victim’s legitimate address, hoping the victim will later copy the wrong address from their transaction history and unknowingly send funds to the attacker.

Blockchain security page, Web3 Antivirus reports that a crypto user recently fell victim to this scam, sending 49,999,950 USDT to a poisoned address copied from transaction history. Considering the large transaction, the user had tried taking caution by sending a small test transaction to the correct address. However, the nature of address poisoning requires close monitoring, where attackers are able to immediately send dust transactions from wallets resembling the intended address.

Source: @web3_antivirus on X

Cos, founder of fellow security platform Slowmist, provided valuable insights on this operation, noting the similarity between both addresses, which shared the same first 3 characters and last 4 characters. The victim unknowingly picked the poisoned address from the transaction history to complete the $50 million, thus marking one of the biggest on-chain individual losses of 2025.

More data from Web3 Antivirus reveals that the victim wallet has been active on-chain for approximately two years and is primarily used for USDT transfers. The stolen $50 million was also initially withdrawn from Binance before the scam occurred. Notably, the stolen USDT has since been converted to ETH by the attackers and shared among multiple wallets, who have also funneled some of the loot through Tornado Cash.

Address Poisoning Victim Offers Bounty With 48-Hour Ultimatum

In other news, blockchain investigator Specter Analyst reports that the victim has attempted to establish communication with the attackers via an on-chain message.

According to an X post on December 20, the victim claims to have filed a criminal complaint case while also enlisting the relevant law enforcement, cybersecurity, and blockchain protocols to provide needed intelligence on the scammer’s activities. Furthermore, all six addresses associated with the heist are now under constant surveillance. However, the aggrieved party is offering the perpetrators of the address poisoning a peaceful resolution, which involves the willing return of 98% of the loot to a specified address within 48 hours.

Source: @SpecterAnalyst on X

Notably, the victim will allow the bad actors to keep $1 million as a bug bounty for spotting such a vulnerability in their operations. However, they warn that failure to accept the amicable offer within the stipulated time will result in legal escalation of the matter to international law enforcement authorities. They further warn that the attackers’ identities will be revealed and shared with the relevant agencies to aid their arrest and persecution. At press time, total crypto losses in 2025 have surpassed $3.4 billion, underscoring the need for continually strengthened security measures within the thriving ecosystem.

Total crypto market cap valued at $2.96 trillion on the daily chart | Source: TOTAL chart on Tradingview.com

Domande pertinenti

QWhat is an address poisoning attack in the context of cryptocurrency?

AAddress poisoning is a scam where an attacker sends small transactions from a wallet address that closely resembles a victim's legitimate address. The attacker hopes the victim will later copy the wrong address from their transaction history and unknowingly send funds to them.

QHow much USDT was lost in the address poisoning attack described in the article?

AThe crypto user lost 49,999,950 USDT, which is approximately $50 million, in the address poisoning scam.

QWhat precaution did the victim take before making the large transaction, and why did it fail?

AThe victim attempted to take caution by sending a small test transaction to the correct address. However, this precaution failed because the nature of address poisoning requires close monitoring, as attackers can immediately send 'dust' transactions from wallets that resemble the intended address, tricking the victim into copying the wrong one from their history.

QWhat resolution did the victim offer to the attackers, and what was the ultimatum?

AThe victim offered a peaceful resolution, allowing the attackers to keep $1 million as a 'bug bounty' if they willingly returned 98% of the stolen funds to a specified address. They were given a 48-hour ultimatum to comply, after which the victim threatened to escalate the matter to international law enforcement and reveal the attackers' identities.

QAccording to the article, what has happened to the stolen USDT since the attack?

AThe stolen $50 million USDT was converted to ETH by the attackers and then shared among multiple wallets. Some of the funds have also been funneled through the crypto mixing service Tornado Cash.

Letture associate

Trading

Spot
Futures

Discussioni

Benvenuto nella Community HTX. Qui puoi rimanere informato sugli ultimi sviluppi della piattaforma e accedere ad approfondimenti esperti sul mercato. Le opinioni degli utenti sul prezzo di M M sono presentate come di seguito.

活动图片