🚨1.2 million USDT evaporated overnight! Address poisoning and scams, even whales are affected

“Last night Cyvers Alerts announced: victims fell into a poisoning trap when copying addresses! The attacker first sent 0.001 USDT to 'pollute' the history, and 4 minutes later, you copied a similar address and transferred away 1,256,000 USDT.

Funds lay idle for 6 hours to avoid monitoring, and in the last 30 minutes, they exchanged for ETH and fled—classic poisoning mode, similar to the February 68,000 USDT and May 2.6 million whale cases. Why do they always fall for it? Public on-chain + user negligence: only looking at prefixes and suffixes, without verifying the full hash.

Attackers monitor high-net-worth addresses, inducing large transfers at zero cost, and after cross-chain mixing, it becomes difficult to trace. Three protective measures, Stay SAFU: manually copy the full address before transferring + use an address book. Set delays for large amounts, and use a multi-signature mechanism to prevent single points of failure.

If you encounter a scam, quickly note the TX hash and report to BlockSec/Cyvers to freeze funds; community blacklists share the harshest warnings. When the dream of the Crypto Empire awakens, this 1.2 million lesson is bloody! Did you almost fall for a poisoning scam recently? Share your anti-fraud tools, and let's block the fraud black hole together!🔒 #巨鲸动向