Address Poisoning Scams Drain $62M From Ethereum Users in Two Months

ETH0,1%
WLFI-9,51%
SLVON1,85%
  • Address poisoning scams erased $62 million after users copied wallet addresses without full verification during routine transfers.

  • Lower Ethereum fees enabled mass dust attacks making address poisoning cheap, scalable and harder to detect across the network.

  • Signature phishing surged in January causing over $6 million in losses through routine token approval actions.

Ethereum wallet security risks intensified over December and January after two routine transfer mistakes erased $62 million in crypto assets. Blockchain security trackers tied both losses to address poisoning schemes. These scams exploit everyday wallet habits rather than protocol flaws. As transaction fees dropped, simple user actions started carrying much higher financial risk.

Someone lost $12.25M in January by copying the wrong address from their transaction history. In December, another victim lost $50M the same way.

Two victims. $62M gone.

Signature phishing also surged — $6.27M stolen across 4,741 victims (+207% vs Dec).

Top cases:
· $3.02M —… pic.twitter.com/7D5ynInRrb

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) February 8, 2026

The incidents highlight a growing threat for Ethereum users. Copying addresses without full verification now leads to irreversible losses. Moreover, attackers rely on speed and repetition instead of complex technical exploits. As a result, operational mistakes now rank among Ethereum’s biggest security risks.

Copy Habits Trigger Massive Losses

In December 2025, a user lost about $50 million after copying a fake address from transaction history. The address closely resembled a previously used destination. Consequently, funds moved directly to an attacker controlled wallet.

In January 2026, another user lost roughly $12.25 million, equal to about 4,556 ETH at the time. This transfer followed the same pattern as the earlier incident. Both cases relied on users reusing addresses from past activity without full checks.

These losses show how routine habits expose wallets to major risks. Users often prioritize speed during transfers. However, attackers now depend on that behavior to succeed.

How Address Poisoning Works at Scale

Address poisoning uses vanity addresses designed to resemble real wallet strings. Attackers monitor transactions and identify frequent senders. They then send tiny dust transfers to those wallets.

These near zero value transactions insert fake addresses into transaction histories. Later, copied addresses redirect funds to scammers. As Ethereum fees fell after the Fusaka upgrade, this method became cheap to deploy.

Millions of dust transactions now hit the network daily. Many serve no purpose beyond preparing future thefts. Consequently, address poisoning expanded rapidly across Ethereum. Earlier last year, the EOS blockchain was under attack by malicious actors using an address-poisoning scheme.

Network Data Distortion and Organized Campaigns

Security researchers report that poisoning activity now distorts Ethereum usage data. Rising transaction counts increasingly reflect spam rather than genuine demand. This shift complicates network analysis.

Coin Metrics reviewed 227 million stablecoin balance updates between November and January. The firm found 38% of updates carried values below one cent. This pattern strongly points to poisoning deposits.

Today, stablecoin dust accounts for 11% of Ethereum transactions on average days. It also represents 26% of active addresses. Investigations link many campaigns to organized groups reusing infrastructure across thousands of wallets.

Signature Phishing Adds to Losses

Alongside poisoning, signature based phishing increased sharply in January. ScamSniffer recorded $6.27 million stolen across 4,741 victims during the month. This marked a 207% increase compared with December. Additionally, WLFI also confirmed that attackers accessed some user wallets through phishing and third-party lapses before its platform launched in November.

Two wallets alone caused about 65% of total losses. Major cases included $3.02 million stolen from SLVon and XAUt tokens. Another $1.08 million came from aEthLBTC through malicious approvals. These scams rely on routine looking transaction prompts. Once approved, attackers gain long term token access.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Claude code leak sparks an LLM crisis, hackers have stolen researchers’ ETH

Security research reveals that in the LLM agent ecosystem, over 20% of free API routers actively inject malicious code, leading to asset theft and credential crises. In addition, the Claude code-leak incident has enabled attackers to spread malware by exploiting developers’ curiosity. The research team proposes a three-layer defense mechanism to address supply-chain security risks.

MarketWhisper3h ago

Solayer founder issues a warning: AI agent routers face malicious injection risks, and ETH is being stolen

Solayer’s founder exposes a security vulnerability in large language model (LLM) routers; in 428 routers, more than 20% exhibit malicious behavior, such as private keys being stolen. The research recommends that developers implement a separate end-to-end integrity verification mechanism on the client side and provides three defense options to mitigate supply-chain attacks.

MarketWhisper3h ago

Giant whale “first set 10 big goals” keeps adding to BTC and ETH short positions, with a position size of up to $270 million

Gate News announcement, April 10, the whale “sets 10 big targets first” (social media account @Jason60704294) has updated its latest positions. Currently, total unrealized profit is $644k. The specific holdings include: BTC short positions of 2567.49 units, entry price $71,554.61, unrealized loss of $644k; ETH short positions of 38,465.22 units, entry price $2,248.74, unrealized profit of $1.37M.

GateNews4h ago

Ethereum’s staking rate hits a record high, with staked ETH valued at about $85 billion

Gate News message: On April 10, according to Token Terminal data, Ethereum’s staking rate hit a record high. Currently, the network is secured by staked ETH with a value of about $85.0 billion.

GateNews4h ago

Today, BTC and ETH options with a nominal value of $2.27 billion expire, and the IV index drops sharply

On April 10, 27k BTC options and 151k ETH options expired, with Put Call Ratios of 0.71 and 0.77, respectively. Bitcoin broke above $72,000 on news of a U.S.-Iran ceasefire, but the overall market is still in a correction phase, and implied volatility has fallen significantly.

GateNews4h ago
Comment
0/400
No comments