Address Poisoning Scams Drain $62M From Ethereum Users in Two Months

ETH6,45%
WLFI0,69%
SLVON6,83%
  • Address poisoning scams erased $62 million after users copied wallet addresses without full verification during routine transfers.

  • Lower Ethereum fees enabled mass dust attacks making address poisoning cheap, scalable and harder to detect across the network.

  • Signature phishing surged in January causing over $6 million in losses through routine token approval actions.

Ethereum wallet security risks intensified over December and January after two routine transfer mistakes erased $62 million in crypto assets. Blockchain security trackers tied both losses to address poisoning schemes. These scams exploit everyday wallet habits rather than protocol flaws. As transaction fees dropped, simple user actions started carrying much higher financial risk.

Someone lost $12.25M in January by copying the wrong address from their transaction history. In December, another victim lost $50M the same way.

Two victims. $62M gone.

Signature phishing also surged — $6.27M stolen across 4,741 victims (+207% vs Dec).

Top cases:
· $3.02M —… pic.twitter.com/7D5ynInRrb

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) February 8, 2026

The incidents highlight a growing threat for Ethereum users. Copying addresses without full verification now leads to irreversible losses. Moreover, attackers rely on speed and repetition instead of complex technical exploits. As a result, operational mistakes now rank among Ethereum’s biggest security risks.

Copy Habits Trigger Massive Losses

In December 2025, a user lost about $50 million after copying a fake address from transaction history. The address closely resembled a previously used destination. Consequently, funds moved directly to an attacker controlled wallet.

In January 2026, another user lost roughly $12.25 million, equal to about 4,556 ETH at the time. This transfer followed the same pattern as the earlier incident. Both cases relied on users reusing addresses from past activity without full checks.

These losses show how routine habits expose wallets to major risks. Users often prioritize speed during transfers. However, attackers now depend on that behavior to succeed.

How Address Poisoning Works at Scale

Address poisoning uses vanity addresses designed to resemble real wallet strings. Attackers monitor transactions and identify frequent senders. They then send tiny dust transfers to those wallets.

These near zero value transactions insert fake addresses into transaction histories. Later, copied addresses redirect funds to scammers. As Ethereum fees fell after the Fusaka upgrade, this method became cheap to deploy.

Millions of dust transactions now hit the network daily. Many serve no purpose beyond preparing future thefts. Consequently, address poisoning expanded rapidly across Ethereum. Earlier last year, the EOS blockchain was under attack by malicious actors using an address-poisoning scheme.

Network Data Distortion and Organized Campaigns

Security researchers report that poisoning activity now distorts Ethereum usage data. Rising transaction counts increasingly reflect spam rather than genuine demand. This shift complicates network analysis.

Coin Metrics reviewed 227 million stablecoin balance updates between November and January. The firm found 38% of updates carried values below one cent. This pattern strongly points to poisoning deposits.

Today, stablecoin dust accounts for 11% of Ethereum transactions on average days. It also represents 26% of active addresses. Investigations link many campaigns to organized groups reusing infrastructure across thousands of wallets.

Signature Phishing Adds to Losses

Alongside poisoning, signature based phishing increased sharply in January. ScamSniffer recorded $6.27 million stolen across 4,741 victims during the month. This marked a 207% increase compared with December. Additionally, WLFI also confirmed that attackers accessed some user wallets through phishing and third-party lapses before its platform launched in November.

Two wallets alone caused about 65% of total losses. Major cases included $3.02 million stolen from SLVon and XAUt tokens. Another $1.08 million came from aEthLBTC through malicious approvals. These scams rely on routine looking transaction prompts. Once approved, attackers gain long term token access.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Gerelateerde artikelen

Raoul Pal 喊單 ETH:按當前趨勢有望長期跑贏 BTC

Raoul Pal指出ETH/BTC匯率走勢顯示ETH將隨商業週期和流動性回升而跑贏BTC。他強調ETH作為智能合約平台,市場規模將更大,而BTC主要作為價值儲存。他預測比特幣在2026年二季將達到牛市高峰,認為當前為延伸的五年超級週期。

MarketWhisper23m geleden

麻吉大哥補倉 70 萬再戰 ETH,現浮盈超百萬美元

知名投資者「麻吉大哥」黃立成在近期以太坊操作中持有10,875枚多單,市值達2,429萬美元,浮盈超過100萬美元。在經歷多次高槓桿虧損後,他以更大規模建倉,強調「我從不輸」。其交易引發社群兩極評價,警示高槓桿風險。

MarketWhisper38m geleden

某巨鲸以20倍杠杆开设BTC和ETH多头,总价值约4000万美元

Gate News 消息,4月8日,据链上分析师Onchain Lens监测,地址为"0x049"的巨鲸以20倍杠杆开设BTC和ETH多头仓位,持仓包括279.8枚BTC及8,918枚ETH,合计价值约4,000万美元。

GateNews1u geleden

"白银铁头空军"减仓 1144 万美元 ETH 空单小盈离场,仍持 1100 万美元空头仓位

4月8日,"白银铁头空军"巨鲸减仓约1144.84万美元的ETH空单,仍持有5126枚空单,价值约1100万美元。这位巨鲸自4月1日以来以20倍杠杆持续加码,并进行波段操作,设置多单和空单于不同价格区间。

GateNews2u geleden

昨日以太坊现货 ETF 净流出 6461 万美元,Fidelity 和 BlackRock 为主要流出方

Gate News 消息,4 月 8 日,据 Trader T 监测,昨日(4 月 7 日)以太坊现货 ETF 净流出 6,461 万美元。其中,Fidelity FETH 流出 4,821 万美元,BlackRock ETHA 流出 1,639 万美元,两者合计占总流出额的全部。其余机构当日均无资金流动。

GateNews2u geleden
Opmerking
0/400
Geen opmerkingen