Binance Square

AddressPoisoning

7,873 vues
11 mentions
Professor Mende - Bonuz Ecosystem Founder
--
🧠 Address Poisoning STEALS YOUR CRYPTO! How to Avoid it: Address poisoning is a stealthy scam where attackers trick you into sending funds to lookalike wallet addresses. It's a subtle, psychological trap - and it’s already caused over $83M in losses across Ethereum, BNB Chain, EOS, and more. HOW IT WORKS: - Attackers send tiny fake transactions from spoofed addresses - Exploit clipboard or wallet history - Use QR codes or smart contract tricks to sneak malicious addresses into your flow - You think you’re copying a trusted address from your history… But it’s actually a planted fake. Once you hit send - your funds are gone. REAL-WORLD HITS: - $2.6M USDT lost in May 2025 via zero-value transfers - $68M WBTC drained in a single spoof - EOS users targeted using names mimicking major exchanges - Even sophisticated DeFi users are falling for this.  🛡️ HOW TO PROTECT YOURSELF: - Always verify the full wallet address before sending - Use fresh receiving addresses every time (HD wallets help) - Whitelist trusted addresses in your wallet - Use a hardware wallet for maximum protection - Don’t copy from your history — only use verified sources - Keep wallet software updated - Avoid clicking random QR codes or links - Use tools like Trugard, Webacy, or blockchain scanners to detect poisoning patterns  🔒 FINAL WORD: Blockchains don’t lie - but your clipboard can. Address poisoning is social engineering for your wallet. Stay paranoid. Verify everything. And never assume your last transaction was with who you think it was. Because in crypto, one wrong address = zero second chances. Follow @Mende for more content! #ScamAlert #AddressPoisoning #Hacks #Scam #StaySafe
🧠 Address Poisoning STEALS YOUR CRYPTO! How to Avoid it:

Address poisoning is a stealthy scam where attackers trick you into sending funds to lookalike wallet addresses. It's a subtle, psychological trap - and it’s already caused over $83M in losses across Ethereum, BNB Chain, EOS, and more.

HOW IT WORKS:

- Attackers send tiny fake transactions from spoofed addresses
- Exploit clipboard or wallet history
- Use QR codes or smart contract tricks to sneak malicious addresses into your flow
- You think you’re copying a trusted address from your history… But it’s actually a planted fake.

Once you hit send - your funds are gone.

REAL-WORLD HITS:
- $2.6M USDT lost in May 2025 via zero-value transfers
- $68M WBTC drained in a single spoof
- EOS users targeted using names mimicking major exchanges - Even sophisticated DeFi users are falling for this. 

🛡️ HOW TO PROTECT YOURSELF:

- Always verify the full wallet address before sending
- Use fresh receiving addresses every time (HD wallets help)
- Whitelist trusted addresses in your wallet
- Use a hardware wallet for maximum protection
- Don’t copy from your history — only use verified sources
- Keep wallet software updated
- Avoid clicking random QR codes or links
- Use tools like Trugard, Webacy, or blockchain scanners to detect poisoning patterns 

🔒 FINAL WORD: Blockchains don’t lie - but your clipboard can. Address poisoning is social engineering for your wallet. Stay paranoid. Verify everything. And never assume your last transaction was with who you think it was. Because in crypto, one wrong address = zero second chances.

Follow @Professor Mende - Bonuz Ecosystem Founder for more content! #ScamAlert #AddressPoisoning #Hacks #Scam #StaySafe
#CryptoScam #AddressPoisoning #Web3Security #CryptoSafety #USDT 🚨 $199K in USDT Lost to Address Poisoning Scam! 🚨 A crypto user just lost $199,025 USDT after falling victim to an address poisoning attack. The scammer used a wallet address almost identical to a previous one, tricking the victim into sending funds to fraudulent hands. ⚠️ Tip: Always double-check wallet addresses before transferring funds! 🔒 Stay alert and protect your assets.
#CryptoScam #AddressPoisoning #Web3Security #CryptoSafety #USDT
🚨 $199K in USDT Lost to Address Poisoning Scam! 🚨

A crypto user just lost $199,025 USDT after falling victim to an address poisoning attack. The scammer used a wallet address almost identical to a previous one, tricking the victim into sending funds to fraudulent hands.

⚠️ Tip: Always double-check wallet addresses before transferring funds!
🔒 Stay alert and protect your assets.
Address Poisoning Scam Steals $199K in USDTScam stole $199K USDT via fake wallet address. Victim used address 0x6c30e44b0570475cab2af776e08af18ddf8a2a16.Multiple small attacks preceded major loss.Verify addresses to avoid similar fraud.Security tools aid in scam prevention. Crypto Scam Targets Wallet Security A recent crypto scam resulted in a loss of $199,025 in USDT. The attack involved a fraudulent wallet address mimicking a previously used one. The victim, identified by the address 0x6c30e44b0570475cab2af776e08af18ddf8a2a16, sent funds to the scam address 0x12e...f4e8d. The incident occurred on June 26, 2025, at 04:25:11. The scam address closely resembled a legitimate one, tricking the user into a mistaken transfer. This type of fraud, known as address poisoning, exploits familiarity with past transactions. Attack Details Revealed The transaction hash, 0x13d6b29add0979e38167e9eed3516391bc6e142bfb7364741daabe9c139, confirms the transfer. The victim’s wallet interacted with Tether USDT before the incident. A total of 199,000 USDT, valued at $199,052.48, moved to the fraudulent address. Additional poisoning attacks followed, each transferring minimal ERC-20 tokens. These occurred at 03:56:35, 03:19:35, 03:17:23, 03:14:47, and 03:07:23 on the same day. Each flagged as high-risk, indicating a pattern of exploitation. “Scammers crafted a deceptive address to mislead the user, resulting in significant financial loss,” a security report noted. Rising Threat of Address Poisoning Address poisoning attacks have increased in the crypto space. Scammers use similar address formats to bypass user vigilance. The victim’s error highlights the need for thorough address verification. Multiple small transactions preceded the major loss, suggesting a deliberate strategy. The scam exploited the victim’s trust in a familiar address pattern. “Users must verify every address before sending funds to prevent such losses,” a security update stated. Community Response Reports on the incident spread quickly. The attack underscores vulnerabilities in wallet security. Experts emphasize checking transaction details to avoid similar incidents. The victim’s address shows a history of USDT interactions. This made it a target for scammers using address imitation tactics. Preventive Measures Users can protect themselves by double-checking wallet addresses. Tools like transaction simulators help identify suspicious patterns. Open-source security extensions offer real-time scam detection. The incident serves as a warning. Regular security updates and address validation are critical in the Web3 ecosystem. #AddressPoisoning #CryptoScam #USDT #WalletSecurity #Web3Safety

Address Poisoning Scam Steals $199K in USDT

Scam stole $199K USDT via fake wallet address.
Victim used address 0x6c30e44b0570475cab2af776e08af18ddf8a2a16.Multiple small attacks preceded major loss.Verify addresses to avoid similar fraud.Security tools aid in scam prevention.
Crypto Scam Targets Wallet Security
A recent crypto scam resulted in a loss of $199,025 in USDT. The attack involved a fraudulent wallet address mimicking a previously used one. The victim, identified by the address 0x6c30e44b0570475cab2af776e08af18ddf8a2a16, sent funds to the scam address 0x12e...f4e8d. The incident occurred on June 26, 2025, at 04:25:11.
The scam address closely resembled a legitimate one, tricking the user into a mistaken transfer. This type of fraud, known as address poisoning, exploits familiarity with past transactions.

Attack Details Revealed
The transaction hash, 0x13d6b29add0979e38167e9eed3516391bc6e142bfb7364741daabe9c139, confirms the transfer. The victim’s wallet interacted with Tether USDT before the incident. A total of 199,000 USDT, valued at $199,052.48, moved to the fraudulent address.
Additional poisoning attacks followed, each transferring minimal ERC-20 tokens. These occurred at 03:56:35, 03:19:35, 03:17:23, 03:14:47, and 03:07:23 on the same day. Each flagged as high-risk, indicating a pattern of exploitation.
“Scammers crafted a deceptive address to mislead the user, resulting in significant financial loss,” a security report noted.
Rising Threat of Address Poisoning
Address poisoning attacks have increased in the crypto space. Scammers use similar address formats to bypass user vigilance. The victim’s error highlights the need for thorough address verification.
Multiple small transactions preceded the major loss, suggesting a deliberate strategy. The scam exploited the victim’s trust in a familiar address pattern.
“Users must verify every address before sending funds to prevent such losses,” a security update stated.
Community Response
Reports on the incident spread quickly. The attack underscores vulnerabilities in wallet security. Experts emphasize checking transaction details to avoid similar incidents.
The victim’s address shows a history of USDT interactions. This made it a target for scammers using address imitation tactics.
Preventive Measures
Users can protect themselves by double-checking wallet addresses. Tools like transaction simulators help identify suspicious patterns. Open-source security extensions offer real-time scam detection.
The incident serves as a warning. Regular security updates and address validation are critical in the Web3 ecosystem.
#AddressPoisoning #CryptoScam #USDT #WalletSecurity #Web3Safety
🚨 $199K in USDT Lost to Address Poisoning Scam! 🚨 A crypto user just lost $199,025 USDT after falling victim to an address poisoning attack. The scammer used a wallet address almost identical to a previous one, tricking the victim into sending funds to fraudulent hands. ⚠️ Tip: Always double-check wallet addresses before transferring funds! 🔒 Stay alert and protect your assets. #CryptoScam #AddressPoisoning #Web3Security #CryptoSafety #USDT
🚨 $199K in USDT Lost to Address Poisoning Scam! 🚨

A crypto user just lost $199,025 USDT after falling victim to an address poisoning attack. The scammer used a wallet address almost identical to a previous one, tricking the victim into sending funds to fraudulent hands.

⚠️ Tip: Always double-check wallet addresses before transferring funds!
🔒 Stay alert and protect your assets.

#CryptoScam #AddressPoisoning #Web3Security #CryptoSafety #USDT
🤯 $68M Gone in a Crypto Blink?! 🚨 Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours. These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! 💥 Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard. So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there! Stay tuned for the latest updates! #CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
🤯 $68M Gone in a Crypto Blink?! 🚨

Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours.

These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! 💥 Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard.

So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there!

Stay tuned for the latest updates!
#CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
#TradingMistakes101 🔥 Bleeding Crypto: Epic Trading Fails to Learn From 🔥 💥 $70M Gone in a Heartbeat A trader fell for an “address‑poisoning” scam, sending nearly $70 million in Bitcoin to a fake address with a spiked spoof transaction—now locked forever  . Lesson: Don’t rely on transaction history—always verify addresses manually or send a test amount first. ⸻ 💸 $3M Lost to One Copy-Paste Error A memecoin investor transferred 7M PYTH (~$3.08M) to the wrong wallet because the scammer matched the first few characters and slipped in a tiny SOL token . Lesson: Copy-paste can kill – double-check every character, even the full address! ⸻ 🧠 $26M Locked Up by Simple Mistake One trader accidentally sent 7,912 ezETH (~$26.4M) to a non-withdrawable smart contract—locked, gone, and causing “max pain” . Lesson: Know the difference between contract vs wallet addresses. No undo button. ⸻ ⚠️ Final Trading Failplaybook: • ✅ Manually verify addresses—full length, every time • 🧪 Test transactions should be your hygiene • 🧹 Avoid address poisoning by only using verified sources • ⚙️ Inspect transaction metadata—don’t blindly trust the UI • 💾 Journal every trade—learn from mistakes, don’t repeat them ⸻ 📣 PSA: These aren’t rare accidents—they’re wake-up calls. Share wisely and trade smarter! 🚀🤝 #CryptoFails #TradingMistakes #AddressPoisoning #CopyPasteDisaster #DYOR
#TradingMistakes101 🔥 Bleeding Crypto: Epic Trading Fails to Learn From 🔥

💥 $70M Gone in a Heartbeat

A trader fell for an “address‑poisoning” scam, sending nearly $70 million in Bitcoin to a fake address with a spiked spoof transaction—now locked forever  .
Lesson: Don’t rely on transaction history—always verify addresses manually or send a test amount first.



💸 $3M Lost to One Copy-Paste Error

A memecoin investor transferred 7M PYTH (~$3.08M) to the wrong wallet because the scammer matched the first few characters and slipped in a tiny SOL token .
Lesson: Copy-paste can kill – double-check every character, even the full address!



🧠 $26M Locked Up by Simple Mistake

One trader accidentally sent 7,912 ezETH (~$26.4M) to a non-withdrawable smart contract—locked, gone, and causing “max pain” .
Lesson: Know the difference between contract vs wallet addresses. No undo button.



⚠️ Final Trading Failplaybook:
• ✅ Manually verify addresses—full length, every time
• 🧪 Test transactions should be your hygiene
• 🧹 Avoid address poisoning by only using verified sources
• ⚙️ Inspect transaction metadata—don’t blindly trust the UI
• 💾 Journal every trade—learn from mistakes, don’t repeat them



📣 PSA: These aren’t rare accidents—they’re wake-up calls. Share wisely and trade smarter! 🚀🤝

#CryptoFails #TradingMistakes #AddressPoisoning #CopyPasteDisaster #DYOR
😱A Crypto Scam You’ve Never Heard Of—But It’s Already Targeting You ❗💥 This isn’t a hack. It’s not phishing. It’s address poisoning—and it’s dangerously deceptive. Here’s how it works: 1. Scammers copy your wallet address. 2. They tweak it slightly. 3. Then send you a fake transaction. 4. You copy the wrong one from your history. 5. You send funds—to the scammer. Just one mistaken paste. One slip. And your crypto is gone forever. 💸 $83M stolen so far. One trader lost $68M in WBTC in a single error. This is the silent killer of Web3. Protect yourself: ✅ Double-check the full wallet address ✅ Don’t rely on transaction history ✅ Use an address book or hardware wallet ⚠️ Share this now—someone you know is at risk. #CryptoSecurity #Web3Safety #AddressPoisoning #ProtectYourCrypto
😱A Crypto Scam You’ve Never Heard Of—But It’s Already Targeting You ❗💥
This isn’t a hack.
It’s not phishing.
It’s address poisoning—and it’s dangerously deceptive.

Here’s how it works:

1. Scammers copy your wallet address.

2. They tweak it slightly.

3. Then send you a fake transaction.

4. You copy the wrong one from your history.

5. You send funds—to the scammer.

Just one mistaken paste. One slip.
And your crypto is gone forever.

💸 $83M stolen so far.
One trader lost $68M in WBTC in a single error.

This is the silent killer of Web3.
Protect yourself:
✅ Double-check the full wallet address
✅ Don’t rely on transaction history
✅ Use an address book or hardware wallet

⚠️ Share this now—someone you know is at risk.

#CryptoSecurity #Web3Safety #AddressPoisoning #ProtectYourCrypto
An old scam, becoming more automated and more commonA variation of dusting scams involves scammers creating wallet addresses that closely resemble the beginning and ending characters of legitimate addresses frequently used by a targeted wallet owner. The goal is to confuse the user into mistakenly sending funds to the wrong address during unrelated transactions. Here’s how this scam works: How the Scam Works 1. Creating Similar Addresses Scammers generate wallet addresses that mimic the structure of legitimate addresses the user has previously interacted with. They focus on replicating the first and last few characters, as these are the parts users often rely on for verification. 2. Sending Dust Transactions Small, seemingly insignificant amounts of cryptocurrency (dust) are sent from these fake addresses to the victim’s wallet. This populates the wallet’s transaction history with the scammer’s deceptive address. 3. Manipulating Future Transactions When the user later tries to send funds to a familiar address, they may mistakenly select or copy the scammer’s look-alike address from their transaction history, unknowingly transferring funds to the scammer instead of the intended recipient. Recognizing the Scam 1. Unfamiliar Transactions Watch for small, unexpected transactions, especially from addresses that look similar to those you regularly interact with. 2. Partial Address Matches Scammers rely on the fact that many users only check the first and last few characters of a wallet address for verification. Always examine the entire address closely. 3. Suspicious Patterns If you notice a series of transactions with similar but slightly altered addresses in your history, it could indicate a dusting scam. How to Protect Yourself 1. Use Address Book Features Many wallets allow you to save frequently used addresses. Use this feature to avoid relying on past transactions to find addresses. 2. Verify Entire Addresses Before sending funds, double-check the full address, not just the first and last few characters. 3. Be Wary of Recent Transactions Avoid blindly copying addresses from your transaction history, especially if they were part of unsolicited deposits. 4. Manually Manage Important Addresses Keep a secure list of verified addresses you regularly transact with to avoid selecting the wrong one. By paying close attention to transaction details and practicing careful verification, you can protect yourself from these scams that exploit small lapses in attention to misdirect funds. #ScamAwareness $POL #DustingScam #AddressPoisoning

An old scam, becoming more automated and more common

A variation of dusting scams involves scammers creating wallet addresses that closely resemble the beginning and ending characters of legitimate addresses frequently used by a targeted wallet owner. The goal is to confuse the user into mistakenly sending funds to the wrong address during unrelated transactions. Here’s how this scam works:
How the Scam Works
1. Creating Similar Addresses
Scammers generate wallet addresses that mimic the structure of legitimate addresses the user has previously interacted with. They focus on replicating the first and last few characters, as these are the parts users often rely on for verification.
2. Sending Dust Transactions
Small, seemingly insignificant amounts of cryptocurrency (dust) are sent from these fake addresses to the victim’s wallet. This populates the wallet’s transaction history with the scammer’s deceptive address.
3. Manipulating Future Transactions
When the user later tries to send funds to a familiar address, they may mistakenly select or copy the scammer’s look-alike address from their transaction history, unknowingly transferring funds to the scammer instead of the intended recipient.

Recognizing the Scam
1. Unfamiliar Transactions
Watch for small, unexpected transactions, especially from addresses that look similar to those you regularly interact with.
2. Partial Address Matches
Scammers rely on the fact that many users only check the first and last few characters of a wallet address for verification. Always examine the entire address closely.
3. Suspicious Patterns
If you notice a series of transactions with similar but slightly altered addresses in your history, it could indicate a dusting scam.

How to Protect Yourself
1. Use Address Book Features
Many wallets allow you to save frequently used addresses. Use this feature to avoid relying on past transactions to find addresses.
2. Verify Entire Addresses
Before sending funds, double-check the full address, not just the first and last few characters.
3. Be Wary of Recent Transactions
Avoid blindly copying addresses from your transaction history, especially if they were part of unsolicited deposits.
4. Manually Manage Important Addresses
Keep a secure list of verified addresses you regularly transact with to avoid selecting the wrong one.

By paying close attention to transaction details and practicing careful verification, you can protect yourself from these scams that exploit small lapses in attention to misdirect funds.

#ScamAwareness $POL #DustingScam #AddressPoisoning
🚨Jameson Lopp Issues Bitcoin Security Warning! #AddressPoisoning #CryptoScam What’s happening? Casa’s CSO Jameson Lopp warns of rising Bitcoin address poisoning—a scam using addresses with similar starting/ending digits to trick users into sending funds to attackers. The scale: 48,000+ poisoned transactions spotted since July 2023 Surge resumed after Jan 2025, following a 2-month pause $1.2M stolen in March 2025 via this method $1.8M lost in Feb Total Q1 2025 hack losses = $1.6B, with $1.4B from Bybit hack (largest in crypto history) Who's behind it? Cyber firms link these attacks to North Korean hacker group Lazarus, known for job scams, fake VC Zoom calls, and phishing schemes. Lopp's Advice: Double-check full BTC addresses before sending. Wallets must show full addresses to prevent deception.
🚨Jameson Lopp Issues Bitcoin Security Warning!
#AddressPoisoning #CryptoScam

What’s happening?
Casa’s CSO Jameson Lopp warns of rising Bitcoin address poisoning—a scam using addresses with similar starting/ending digits to trick users into sending funds to attackers.

The scale:

48,000+ poisoned transactions spotted since July 2023

Surge resumed after Jan 2025, following a 2-month pause

$1.2M stolen in March 2025 via this method

$1.8M lost in Feb

Total Q1 2025 hack losses = $1.6B, with $1.4B from Bybit hack (largest in crypto history)

Who's behind it?
Cyber firms link these attacks to North Korean hacker group Lazarus, known for job scams, fake VC Zoom calls, and phishing schemes.

Lopp's Advice:
Double-check full BTC addresses before sending. Wallets must show full addresses to prevent deception.
Connectez-vous pour découvrir d’autres contenus
Découvrez les dernières actus sur les cryptos
⚡️ Prenez part aux dernières discussions sur les cryptos
💬 Interagissez avec vos créateurs préféré(e)s
👍 Profitez du contenu qui vous intéresse
Adresse e-mail/Nº de téléphone