Connect with us

Crypto World

How the Scam Works and How to Protect Your Wallet

Published

on

Crypto Breaking News

Address poisoning is reshaping risk in crypto wallets by shifting focus from private keys to how users interact with interfaces. Rather than breaking encryption, attackers exploit human habits and design flaws to misdirect funds. In 2025, a victim lost about $50 million in Tether’s USDt after copying a poisoned address. In February 2026, a phishing campaign tied to Phantom Chat drained roughly 3.5 Wrapped Bitcoin (wBTC) worth more than $264,000. These episodes underscore how small UI cues—copy buttons, visible transaction histories, and dust transfers—can seduce users into repeating trusted patterns and handing over assets they believe they are sending to legitimate contacts.

Key takeaways

  • Address poisoning operates on user behavior and UI cues, not on private key theft or code flaws.
  • Two high-profile losses illustrate the scale: a $50 million hit in 2025 and a February 2026 incident involving about 3.5 Wrapped Bitcoin ($WBTC) worth over $264,000.
  • Copy buttons, visible transaction histories, and unfiltered dust transfers can make poisoned addresses look legitimate within wallet UIs.
  • Because blockchains are permissionless, attackers can send tokens to any address, and many wallets display all incoming activity, including spam, which can seed trust in fake entries.
  • Mitigations hinge on better UX and guardrails: explicit address verification, dust-filtering, proactive warnings, and recipient-address checks during sending flows.

Tickers mentioned: $USDT, $WBTC

Sentiment: Neutral

Market context: The cases underscore ongoing UX-driven security challenges in a market where on-chain activity is highly transparent and attackers increasingly target everyday user workflows. As stablecoins and tokenized assets gain prominence, wallet design and on-chain visibility will be central to risk management, alongside traditional education and phishing countermeasures.

Why it matters

The essence of address poisoning lies in the reproducible, human-centered mistakes that occur when users manage crypto transfers. Private keys remain secure in these scenarios; the vulnerability emerges when recipients or senders rely on partial address fragments or familiar transaction patterns. The attack chain typically unfolds with attackers locating valuable wallets, crafting near-identical recipient addresses, and initiating a tiny or zero-value transfer to insert their spoofed address into the victim’s recent-history view. The attacker then waits for the user to copy the address from that history and accidentally paste it into a new transfer, thereby sending funds to the wrong destination. The absence of a cryptographic breach highlights a fundamental truth: the security model of public blockchains hinges on user judgment as much as cryptography.

Advertisement

UX design decisions amplify the risk. Many wallets provide one-click copy buttons adjacent to recent transactions, a convenience that can backfire when spam or dusting entries appear in the same list. Investigators have long noted that victims often “trust” their own transaction history, presuming it signals legitimacy. In cases like the 2025 loss of USDt and the 2026 wBTC incident, the cost of this cognitive shortcut becomes starkly clear. The broader lesson is that user interfaces—the way addresses are displayed, verified, and confirmed—play a pivotal role in security outcomes, sometimes more so than key management alone.

Industry voices have urged wallets to adopt stronger safeguards. Tech leaders, including Changpeng “CZ” Zhao, have publicly called for enhanced protections to curb address poisoning, signaling a potential shift in wallet governance toward more rigorous recipient verification and anti-poisoning features. The tension is real: developers must balance smooth UX with robust safety checks, ensuring users can transact efficiently without becoming victims of lookalike addresses or suspicious dust transfers. In the meantime, the onus remains on users to verify destinations beyond quick-glance cues and to adopt disciplined sending practices.

At the core, the risk is not about breaking cryptography but about breaking user habits in high-friction moments—entering long addresses, approving approvals, and acting on incomplete information. The public and permissionless nature of blockchains makes every address accessible, and the legibility of transactions often lags behind the complexity of strings that represent keys and addresses. The result is a security rhythm in which attackers rely on social and UX dynamics, not on bypassing cryptographic barriers.

What address poisoning really involves

Address poisoning scams hinge on manipulating a victim’s transaction history to misdirect funds, rather than compromising keys or exploiting software vulnerabilities. The typical playbook unfolds as follows:

Advertisement
  1. Attackers first identify high-value wallets using publicly visible on-chain data.
  2. They generate a lookalike address that closely resembles a recipient the victim uses regularly, matching several leading and trailing characters to maximize recognizability at a glance.
  3. They initiate a small or zero-value transfer from the fake address to seed legitimacy and appear in the recipient’s recent activity.
  4. The attacker then relies on the victim copying the address from the recent transfers list when preparing a legitimate payment to someone else.
  5. The final step is when the victim pastes the attacker’s address and authorizes the transfer, unwittingly sending funds to the malicious destination.

The victim’s wallet and private keys remain untouched—the crypto-cryptographic layer is intact. The scam thrives on human error, habitual behavior, and trust built from familiar patterns. In some instances, the exploit is reinforced by dusting operations, where tiny transfers flood a user’s activity feed, nudging them toward interacting with suspicious entries without suspicion.

Did you know? Address poisoning scams have gained visibility in parallel with the expansion of Ethereum layer-2 networks, where reduced fees enable mass small transfers that populate users’ histories with fodder for identity-based deception.

How attackers craft deceptive addresses

Crypto addresses are long hexadecimal strings, often 42 characters on Ethereum-compatible chains. Wallets typically truncate the display to a short fragment, such as “0x85c…4b7,” which attackers exploit by constructing lookalikes with identical prefixes and suffixes while altering the middle portion. A legitimate example might read 0x742d35Cc6634C0532925a3b844Bc454e4438f44e, while an almost identical poisoned variant could appear as 0x742d35Cc6634C0532925a3b844Bc454e4438f4Ae. The strategy hinges on human visual heuristics: people rarely verify the entire string and often rely on the start and end characters to judge authenticity.

Some attackers even use vanity-address generation tools to produce thousands of near-identical strings. The social engineering angle is reinforced by dusting, where small funds accompany the malicious address to create a sense of legitimacy in a user’s transaction history. In practice, this is less about AI or cryptography and more about UX trust and careful scrutiny during each sending action.

Security researchers emphasize a key distinction: the breach lies in behavior and interface design, not in the encryption or signing process. Private keys are still the powerhouse that authorizes transactions, but they cannot verify whether the destination address is correct. The result is a paradox: the strongest security on the planet (cryptography) is undermined not by a technical flaw but by a failure to verify addresses thoroughly at the moment of sending.

Advertisement

Practical ways to stay safer

Because address poisoning exploits human tendencies rather than technical vulnerabilities, small but deliberate changes in how you interact with crypto wallets can markedly reduce risk. Here are practical steps for users and developers alike.

For users

  • Build and maintain a verified address book or whitelist for frequent recipients, then reference it instead of retyping or copying from history.
  • Always verify the full address before sending. If possible, use a character-by-character comparison or an address-checking tool.
  • Avoid copying addresses from recent transaction history. If you need to, double-check the source in the list, or re-enter addresses from trusted bookmarks.
  • Be wary of unsolicited small transfers that appear in your history; treat them as potential poisoning attempts and isolate them from normal activity.

For wallet developers

Design choices can dramatically reduce risk by making it harder for poisoned addresses to slip through in everyday flows. Suggested safeguards include:

  • Filtering or dimming or automatically isolating very low-value (dust) transactions from typical recipient lists.
  • Implementing recipient-address similarity checks that flag near-identical addresses during sending.
  • Providing pre-signing simulations and risk warnings when the destination looks suspicious or matches a poisoned-pattern entry.
  • Integrating on-chain checks or shared blacklists to identify and block known poisoned addresses before a user confirms a transfer.

Sources & verification

  • Phantom Chat address poisoning and related bitcoin phishing details: https://cointelegraph.com/news/phantom-chat-address-poisoning-bitcoin-phishing
  • General phishing attack overview in crypto: https://cointelegraph.com/learn/articles/what-is-a-phishing-attack-in-crypto-and-how-to-prevent-it
  • Tether price index reference: https://cointelegraph.com/tether-price-index
  • Critical observations from ZachXBT on poisoning cases: https://x.com/zachxbt/status/2021022756460966139
  • Industry commentary on wallet safeguards and address poisoning: https://www.binance.com/en/square/post/34142027296314

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Important Coinbase Announcement Concerning XRP, ADA, and Other Altcoin Investors

Published

on

RAVE Price


“Borrowing up to $100K in USDC against your tokens, instantly, without selling,” the announcement reads.

The US-based exchange Coinbase expanded its crypto-backed loan offerings to include additional tokens, such as Ripple’s XRP and Cardano’s ADA.

For the moment, the new service is available across the USA, except for residents of New York State.

Advertisement

Further Support for These Assets

The company rolled out its lending product, called Coinbase Borrow, in 2021. Two years later, it discontinued the service, only to bring it back at the start of 2025.

Coinbase Borrow lets users take a loan using their cryptocurrency possessions as collateral instead of selling them. Until recently, clients were able to borrow up to $5 million in USDC against their Bitcoin (BTC) holdings and as much as $1 million in the stablecoin against Ethereum (ETH). The exchange, though, decided to expand the service by adding Ripple (XRP), Cardano (ADA), Dogecoin (DOGE), and Litecoin (LTC).

“Now you can unlock the value of your portfolio without giving up your position. Borrowing up to $100K in USDC against your tokens, instantly, without selling. Available now in the US (ex. NY),” the official announcement reads.

Backing from a major exchange like Coinbase can positively influence the prices of the involved cryptocurrencies by boosting their reputation and accessibility. In this case, however, XRP, ADA, DOGE, and LTC continued trading lower, reflecting the broader market’s bearish conditions.

It is important to note that the strongest price pumps typically occur right after Coinbase lists a token or reveals its intentions to do so. Last summer, for instance,  the company added SPX6900 (SPX), AWE Network (AWE), Dolomite (DOLO), Flock (FLOCK), and Solayer (LAYER) to its roadmap. Some of the involved assets headed north by double digits following the disclosure.

Advertisement

It’s a completely different story when Coinbase terminates services with certain coins. Towards the end of last year, Muse Dao (MUSE), League of Kingdoms Arena (LOKA), and Wrapped Centrifuge (WCFG) tumbled substantially after they were removed from the trading venue.

You may also like:

What Else is New on Coinbase?

The exchange has been quite active lately, enabling additional trading options for its clients. Earlier this month, it announced that users can buy, sell, convert, send, receive, or store RaveDAO (RAVE), Walrus (WAL), AZTEC (AZTEC), and Espresso (ESP). All assets are live on Coinbase’s official website and application.

WAL, AZTEC, and ESP experienced an initial price upswing after the news but then headed south. RAVE, on the other hand, has kept pumping and currently trades around $0.44 (per CoinGecko), representing a 25% weekly increase.

RAVE Price
RAVE Price, Source: CoinGecko
SPECIAL OFFER (Exclusive)

SECRET PARTNERSHIP BONUS for CryptoPotato readers: Use this link to register and unlock $1,500 in exclusive BingX Exchange rewards (limited time offer).

Source link

Advertisement
Continue Reading

Crypto World

LayerZero CEO Clarifies ZRO Will Capture All Zero Network Fees

Published

on

Nexo Partners with Bakkt for US Crypto Exchange and Yield Programs

TLDR:

  • ZRO becomes the only gas, staking, and fee asset across Zero, LayerZero, and Stargate infrastructure layers.
  • Protocol revenue from priority fees, MEV tips, markets, and payments will all route directly into ZRO.
  • Institutional buyouts removed 19.77 percent of total ZRO supply from future unlock circulation schedules.
  • Public dashboards currently overstate ZRO unlock pressure by nearly twofold due to outdated supply data.

LayerZero has clarified how its ZRO token will function inside the upcoming Zero network after days of market speculation. 

The update outlines a single-asset economic design that ties protocol activity directly to ZRO. It also revises assumptions about future supply pressure from token unlocks. The disclosure arrives ahead of Zero’s planned mainnet launch later this year.

ZRO Tokenomics Anchors Zero Network Fee Structure

Bryan Pellegrino published the clarification in a post on X, addressing questions around Zero’s economic design. He stated that the project will not issue a new token for the network. ZRO will serve as the only asset across all Zero functions.

ZRO will act as both the staking and gas token inside Zero. Every transaction and message will rely on the same asset for settlement. This approach removes the need for parallel fee tokens across zones.

According to the statement, all excess fees generated from priority fees linked to state contention will route to ZRO. Tips and MEV-related revenue will also accrue to the token. The design connects congestion and execution demand directly to token value flows.

Advertisement

Trading fees from the markets zone and payment fees from the payments zone will follow the same model. 

Once LayerZero activates its fee switch, every protocol message will include a ZRO-denominated charge. This makes ZRO the financial endpoint for Zero, LayerZero, and Stargate activity.

Institutional Buybacks Cut ZRO Unlock Pressure in Half

Pellegrino also disclosed updated figures on institutional participation and internal buybacks. 

He said institutional purchases and early investor buyouts now represent 19.77 percent of the total ZRO supply. Most of this came from absorbing future unlock allocations.

Advertisement

The update challenges assumptions shown on public token dashboards. Pellegrino noted that many trackers still treat those tokens as pending unlocks. That misclassification, he said, nearly doubles the projected supply pressure.

Community members amplified the data point after the post circulated. X user Zuuu highlighted the reduction in effective unlock risk as a key takeaway. The comment gained traction as traders reassessed ZRO’s circulating supply outlook.

LayerZero confirmed that the buyouts focused mainly on early investors and upcoming vesting schedules. The move shifts a portion of expected emissions into long-term holdings. It also reshapes how market participants model future dilution.

Zero aims to launch with permissionless infrastructure for payments, markets, and messaging. By assigning all economic flows to ZRO, the protocol links network usage with a single asset. The team said mainnet remains scheduled for this fall.

Advertisement

Source link

Advertisement
Continue Reading

Crypto World

Ripple CEO Confirms White House Meeting between Crypto, Banking Reps

Published

on

Ripple CEO Confirms White House Meeting between Crypto, Banking Reps

Update (Feb. 19 at 7:21 pm UTC): This article has been updated to include a statement from the Crypto Council for Innovation.

The White House has held another meeting between representatives from the cryptocurrency and banking industries on a market structure bill under consideration in the US Senate, seeking to iron-out differences on stablecoin yield provisions, among other issues.

In a Thursday Fox News interview, Ripple CEO Brad Garlinghouse said that the company’s chief legal officer, Stuart Alderoty, attended the meeting with White House officials earlier in the day. The CEO’s comments came after unconfirmed reports that the Trump administration would follow its Feb. 10 meeting on the CLARITY Act, a bill to establish digital asset market structure. That meeting did not result in a deal on stablecoins. 

Advertisement

Passed by the US House of Representatives in July, the CLARITY Act has seen several delays while moving through the Senate and its relevant committees. These included two government shutdowns — the longest one in the country’s history spanned 43 days in 2025 — concerns from Democratic lawmakers on conflicts of interest, and groups pushing for provisions on decentralized finance, tokenized equities and stablecoin yield.

The meeting occurred a day after policymakers, including CFTC Chair Michael Selig and two US senators, and representatives from the crypto industry met at US President Donald Trump’s private Mar-a-Lago club to attend a forum hosted by World Liberty Financial, the company founded by the president’s sons and others. Ohio Senator Bernie Moreno said at the event that he expected the CLARITY Act to make it through Congress and be ready to be signed into law “by April.”

Related: US CLARITY Act to pass ‘hopefully by April’: Senator Bernie Moreno

Cointelegraph reached out to Ripple for comment on Alderoty’s presence at the meeting, but had not received a response at the time of publication. White House crypto advisers Patrick Witt and David Sacks had not publicly commented on the event at the time of publication.

Advertisement

In a statement shared with Cointelegraph, Crypto Council for Innovation CEO Ji Hun Kim said the Thursday discussion “built upon previous meetings to establish a framework that serves American consumers while reinforcing US competitiveness,” describing it as “constructive.”

Market structure bill awaits markup by Senate Banking panel

Although the Senate Agriculture Committee voted to advance its version of a digital asset market structure bill in January, another committee crucial to the legislation’s passage has stalled following stated opposition from Coinbase CEO Brian Armstrong.

Armstrong has objected to provisions that would restrict rewards paid on stablecoin holdings and warned the bill could weaken the CFTC’s role in favor of broader SEC authority.

The Senate Banking Committee had been scheduled to mark up its market structure bill in January, but delayed the event indefinitely after Armstrong said the exchange could not support the legislation as written, citing concerns about tokenized equities. As of Thursday, the committee had not rescheduled the markup.

Advertisement