Signature Phishing Up 200% As January Losses Pass $6M

ETH-3,38%
XAUT-0,26%
TOKEN-4,63%

In brief

  • Signature phishing victims jumped more than 200% in January, with $6.27 million stolen, blockchain security firm Scam Sniffer warned.
  • Despite the spike, total phishing losses in 2025 were sharply lower than in 2024.
  • Cheaper Ethereum fees after the Fusaka upgrade have made phishing tactics like mass address poisoning attacks more attractive for scammers, researchers said.

Blockchain security firm Scam Sniffer is warning of a sharp spike in signature phishing, with losses totaling $6.27 million and 4,700 wallets drained in January—an increase of 207% from December. Signature phishing occurs when attackers lure users to malicious decentralized applications that prompt them to sign off‑chain messages. While the requests appear harmless—such as approving a token deposit or listing an NFT—the signatures can instead authorize unlimited token spending or the transfer of NFTs, allowing attackers to later drain wallets.

Someone lost $12.25M in January by copying the wrong address from their transaction history. In December, another victim lost $50M the same way.

Two victims. $62M gone.

Signature phishing also surged — $6.27M stolen across 4,741 victims (+207% vs Dec).

Top cases:
· $3.02M —… pic.twitter.com/7D5ynInRrb

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) February 8, 2026

The January surge contrasts with a broader decline in crypto phishing over the past year. Scam Sniffer reported total phishing losses of $83.85 million across 106,106 victims in 2025 on Ethereum and EVM-based chains, down 83% in value and 68% in victims compared with 2024. Losses last month were highly concentrated. Two wallets accounted for roughly 65% of the total stolen through phishing and other attacks, including $3.02 million taken through a permit and increaseAllowance attack involving SLV and XAUt tokens, and $1.08 million drained via a permit attack. Beyond signature phishing, Scam Sniffer pointed to address poisoning and permit scams as key contributors. Address poisoning attackers send tiny transactions, or dust, to targets using addresses that closely resemble legitimate ones the wallet has already interacted with. When users later copy an address from their transaction history, they may inadvertently send funds to an attacker-controlled lookalike address.  Ethereum’s Fusaka upgrade changes scam economics Researchers said tactics like address poisoning have become more attractive following Ethereum’s Fusaka upgrade, which sharply reduced transaction fees. Blockchain researcher Andrey Sergeenkov found that new address creation surged last month, with one week seeing 2.7 million new addresses, about 170% above typical levels. He said roughly two-thirds of new addresses received less than $1 in stablecoins as their first transaction, consistent with large-scale address poisoning campaigns.

Sergeenkov argued that lower Ethereum fees have changed the economics of mass poisoning attacks. While conversion rates remain extremely low, the reduced cost of sending millions of dust transactions has made the strategy viable, with profits now coming from a small number of high-value mistakes. In addition to ensuring users check transactions and make sure they understand what they are signing or where they are sending money, wallets are also trying to introduce features to limit the risk of attacks. Tara Annison, head of product at Twinstake, said wallets are increasingly adding transaction simulations, clearer warnings and pre-execution checks to flag risky interactions. “Rabby does pre-execution simulation and will warn you if you’re interacting with known malicious smart contracts or if there’s hidden logic in the transaction,” she told_ Decrypt_. Metamask, meanwhile, “gives you a nice big warning if the site you’re connecting to looks like a phishing website and includes human readable warnings if the transaction looks like it might be about to do something dodgy for your assets,” Annison said. She added wallets are placing security features like this “front and centre to avoid you signing something you shouldn’t.” Decrypt has approached the Ethereum Foundation for comment.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Articoli correlati

丈夫控妻子竊取 2 千多枚比特幣!法官:原告勝訴機率非常高

英國高等法院近期審理一起比特幣失竊案,原告 Ping Fai Yuen 指控分居妻子 Fun Yung Li 透過偷拍竊取其硬體錢包中的比特幣,價值約1.76億美元。錄音及搜查證據支持原告主張,法院判決維持資產凍結令,但駁回部分訴請。法官認為原告勝訴機率極高,建議盡快開庭。

区块客10m fa

Fluid 因 Resolv 黑客事件暂停 USR 市场交易,承诺全额赔偿潜在坏账

Gate News 消息,3 月 22 日,DeFi 协议 Fluid 发布公告称,已获悉 Resolv 黑客事件,Fluid 的自动限额机制阻止了资金的过度借贷,USR 市场已暂停交易,事态发展得到控制。Fluid 表示,如果协议上仍有任何坏账,所有用户的损失都将得到全额赔偿。用户资金和协议安全是 Fluid 的首要任务,目前正在进行全面审查,调查结束后将发布详细的事后分析报告。

GateNews1h fa

韩国某 CEX 推动现任 CEO 连任,此前因操作失误遭监管处罚

韩国第二大加密货币交易平台仍坚持推动CEO李在元连任,尽管该平台因比特币误发事件和监管处罚面临争议。尽管有重大缺陷被曝光,交易所选择维持运营稳定,而非管理层改组。

GateNews1h fa

Euler Labs 正在调查 USR 未经授权铸造事件,已禁用 RLP 作为抵押品

Euler Labs 在 X 平台上确认已知晓涉及 USR 未经授权铸造的安全事件,正在调查中,并禁用 RLP 作为抵押品,暂停 USDC 分配,以隔离风险。将提供后续更新。

GateNews1h fa

Resolv Labs:抵押资产池保持充足,未发生底层资产损失

Gate News 消息,3 月 22 日,Resolv Labs 在 X 平台发布声明称,涉及 USR 代币未授权铸造的安全事件仍在调查之中。目前抵押资产池仍保持完全充足,未发生底层资产损失,问题似乎仅限于 USR 的发行机制。团队当前优先事项包括控制事件扩散、评估潜在影响,并确保合法用户不受影响。Resolv Labs 表示将持续推进调查,并尽快披露更多进展。

GateNews4h fa

操縱完比特幣後換白銀?Jane Street 成 ETF 最大持有者後,白銀一個月狂跌 30%

Jane Street 在2024年第四季創紀錄增持2060萬股白銀ETF,成為最大持有方,隨後白銀價格暴跌近30%,引發市場操縱猜疑。雖然無直接證據支持此說法,但持倉曝光與價格崩跌的時間吻合,引發討論。Jane Street被指控內線交易,但否認相關指控,其在市場中的影響力和行為模式仍受到關注。

動區BlockTempo4h fa
Commento
0/400
Nessun commento