Connect with us

Crypto World

Ethereum address poisoning crypto users $62M in two months: ScamSniffer

Published

on

Ethereum address poisoning crypto users $62M in two months: ScamSniffer

Two routine copy-and-paste actions erased $62 million in crypto over December and January, exposing how basic wallet habits are becoming one of Ethereum’s biggest security risks.

Summary

  • Two victims lost $62M after copying fake wallet addresses.
  • Signature phishing also jumped sharply in January.
  • Low fees have made large-scale scam campaigns cheaper to run.

ScamSniffer said in a post on X on Feb. 8 that one victim lost about $50 million in December 2025 after sending funds to a fake address copied from transaction history. In January 2026, another user lost roughly $12.25 million, equal to about 4,556 ETH at the time, through the same mistake.

“Two victims. $62M gone,” the firm wrote.

Advertisement

Both incidents followed the same pattern. Funds were sent to look-alike addresses that had been quietly planted inside the victims’ recent activity records.

How address poisoning became easier to deploy

Address poisoning works by exploiting how most users interact with their wallets.

Attackers monitor transactions, generate vanity addresses that resemble real ones, and send tiny “dust” transfers to potential targets. These near-zero transactions place the fake addresses into transaction histories.

Advertisement

Later, when users copy an address from past activity instead of verifying the full string, money is sent directly to the scammer.

Security firms say this tactic has expanded rapidly since Ethereum’s (ETH) Fusaka upgrade in late 2025 lowered transaction fees. What was once expensive to run at scale has become cheap and efficient.

Millions of dust transactions are now being sent daily, according to blockchain security researchers. Many are designed only to prepare future thefts.

This activity has also distorted network data. Rising transaction counts and active wallet numbers increasingly include spam rather than genuine usage, making it harder to separate real demand from noise.

Advertisement

Several recent investigations have linked address poisoning campaigns to organized groups that recycle the same infrastructure across thousands of wallets.

Signature phishing adds pressure as losses climb

Alongside address poisoning, ScamSniffer recorded a sharp rise in signature-based phishing in January.

The firm reported $6.27 million in losses across 4,741 victims during the month, up 207% from December in value terms. Two wallets were responsible for about 65% of the total damage.

The largest cases included $3.02 million stolen from SLVon and XAUt tokens through malicious permit and increaseAllowance approvals, and $1.08 million taken from aEthLBTC using similar techniques.

Advertisement

These attacks rely on deceptive transaction prompts that appear routine. Once users sign them, scammers gain long-term access to tokens and can drain funds without further approval.

Security analysts say these schemes succeed because they target habits formed during everyday trading, not technical weaknesses in protocols.

“Most victims are not careless,” one researcher said privately. “They are doing what they’ve done hundreds of times before.”

ScamSniffer and other firms have urged users to avoid copying addresses from transaction history, verify full wallet strings manually, and use saved contacts for frequent transfers.

Advertisement

As transaction costs stay low and automation improves, analysts expect address poisoning and signature phishing to remain persistent threats. Until better tools and habits take hold, basic operational mistakes are likely to keep producing outsized losses.

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Bonk.fun Domain Hijacked to Push Crypto Wallet Drainer

Published

on

Bonk.fun Domain Hijacked to Push Crypto Wallet Drainer

Bonk.fun warned users not to use its site after attackers hijacked the domain and pushed a fake wallet-draining prompt.

The domain of Solana-based platform memecoin launchpad Bonk.fun has been hijacked after attackers gained access to a team account and deployed a wallet-draining scheme through the site.

The Bonk.fun account on X warned users early Thursday not to interact with the website while the team worked to secure the domain. “A malicious actor has compromised the BONKfun domain, do not interact with the website until we have secured everything,” the project wrote in a post on X.

Advertisement

X user Tom, who is an operator behind Bonk.fun, said the attackers used the compromised access to push a fake message designed to trick visitors into signing a malicious transaction.

Bonk.fun domain hijacked. Source: Tom

In a follow-up post, Tom said the exploit targeted users who signed a fraudulent terms-of-service prompt that appeared on the site during the breach. Users who had previously connected wallets to Bonk.fun were not affected, and traders interacting with Bonk-related tokens through external terminals were also safe.

Related: Trust Wallet adds real-time scam address checks for crypto users

Some users report losses

Some users reported losses in replies to the warning posts. One user claimed roughly 50 Solana (SOL) had been drained from their wallet, while another said they lost about 10 SOL. More users claimed varying amounts of losses.

Meanwhile, Tom said the incident was contained quickly and that reported losses appear limited so far. “We understand a lot of people are scared and rightly so but we’re doing everything in our power to fix the situation,” he added.

Advertisement

Cointelegraph reached out to Tom for comment but had not received a response by publication.

Magazine: Bitcoin may take 7 years to upgrade to post-quantum — BIP-360 co-author