Connect with us

Crypto World

Why Address Poisoning Works Without Stealing Private Keys

Published

on

Why Address Poisoning Works Without Stealing Private Keys

Key takeaways

  • Address poisoning exploits behavior, not private keys. Attackers manipulate transaction history and rely on users mistakenly copying a malicious lookalike address.

  • Cases such as the 50-million-USDT loss in 2025 and the 3.5 wBTC drain in February 2026 demonstrate how simple interface deception can lead to massive financial damage.

  • Copy buttons, visible transaction history and unfiltered dust transfers make poisoned addresses appear trustworthy within wallet interfaces.

  • Because blockchains are permissionless, anyone can send tokens to any address. Wallets typically display all transactions, including spam, which attackers use to plant malicious entries.

Most crypto users believe that their funds stay secure as long as their private keys are protected. However, as a rising number of scams show, this is not always the case. Scammers have been using an insidious tactic, address poisoning, to steal assets without ever accessing the victim’s private key.

In February 2026, a phishing scheme targeted a Phantom Chat feature. Using an address poisoning tactic, attackers successfully drained roughly 3.5 Wrapped Bitcoin (wBTC), worth more than $264,000.

In 2025, a victim lost $50 million in Tether’s USDt (USDT) after copying a poisoned address. Such incidents have highlighted how poor interface design and everyday user habits can result in massive losses.

Prominent crypto figures like Binance co-founder Changpeng “CZ” Zhao have publicly urged wallets to add stronger safeguards following address poisoning incidents.

This article explains how address poisoning scams exploit user behavior rather than private key theft. It details how attackers manipulate transaction history, why the tactic succeeds on transparent blockchains and what practical steps users and wallet developers can take to reduce the risk.

Advertisement

What address poisoning really involves

Unlike traditional hacks that target private keys or exploit code flaws, address poisoning manipulates a user’s transaction history to deceive them into sending funds to the wrong address.

Usually, the attack proceeds in the following way:

  1. Scammers identify high-value wallets via public blockchain data.

  2. They create a wallet address that closely resembles one the victim often uses. For example, the attacker may match the first and last few characters.

  3. They send a small or zero-value transaction to the victim’s wallet from this fake address.

  4. They rely on the victim copying the attacker’s address from their recent transaction list later.

  5. They collect the funds when the victim accidentally pastes and sends them to the malicious address.

The victim’s wallet and private keys remain untouched, and blockchain cryptography stays unbroken. The scam thrives purely on human error and trust in familiar patterns.

Did you know? Address poisoning scams surged alongside the rise of Ethereum layer-2 networks, where lower fees make it cheaper for attackers to mass-send dust transactions to thousands of wallets at once.

Advertisement

How attackers craft deceptive addresses

Crypto addresses are lengthy hexadecimal strings, often 42 characters on Ethereum-compatible chains. Wallets usually show only a truncated version, such as “0x85c…4b7,” which scammers take advantage of. Fake addresses have identical beginnings and endings, while the middle portion differs.

Legitimate address (example format):

0x742d35Cc6634C0532925a3b844Bc454e4438f44e

Poisoned lookalike address:

Advertisement

0x742d35Cc6634C0532925a3b844Bc454e4438f4Ae

Scammers use vanity address generators to craft these near-identical strings. The fake one appears in the victim’s transaction history thanks to the dusting transfer. To users, it looks trustworthy at a glance, especially since they rarely verify the full address string.

Did you know? Some blockchain explorers now automatically label suspicious dusting transactions, helping users spot potential poisoning attempts before interacting with their transaction history.

Why this scam succeeds so well

There are several intertwined factors that make address poisoning devastatingly effective:

Advertisement
  1. Human limitations in handling long strings: Because addresses are not human-friendly, users rely on quick visual checks at the beginning and end. Scammers exploit this tendency.

  2. Convenient but risky wallet features: Many wallets offer easy copy buttons next to recent transactions. While this feature is helpful for legitimate use, it becomes risky when spam entries sneak in. Investigators such as ZachXBT have pointed to cases where victims copied poisoned addresses directly from their wallet UI.

3. No need for technical exploits: Because blockchains are public and permissionless, anyone can send tokens to any address. Wallets usually display all incoming transactions, including spam, and users tend to trust their own history.

The vulnerability lies in behavior and UX, not in encryption or key security.

Why keys aren’t enough protection

Private keys control authorization, meaning they ensure only you can sign transactions. However, they cannot verify whether the destination address is correct. Blockchain’s core traits — permissionless access, irreversibility of transactions and trust minimization — mean malicious transactions get permanently recorded.

In these scams, the user willingly signs the transfer. The system functions exactly as designed, and the flaw lies in human judgment.

Underlying psychological and design issues involve:

Advertisement
  • Routine habits: People tend to repeatedly send funds to the same addresses, so they copy from their transaction history instead of reentering addresses.

  • Cognitive strain: Transactions involve multiple steps, such as addresses, fees, networks and approvals. Many users find scrutinizing every character tedious.

  • Truncated displays: Wallet UIs hide most of the address, leading to partial checks.

Did you know? In certain cases, attackers automate address lookalike generation using GPU-powered vanity tools, allowing them to produce thousands of near-identical wallet addresses within minutes.

Practical ways to stay safer

While address poisoning exploits user behavior rather than technical vulnerabilities, small changes in transaction habits can significantly reduce the risk. Understanding a few practical safety measures can help crypto users avoid costly mistakes without requiring advanced technical knowledge.

For users

Simple verification habits and transaction discipline can significantly reduce your chances of falling victim to address poisoning scams.

  • Build and use a verified address book or whitelist for frequent recipients.

  • Verify the full address. Use a checker or compare it character by character before making payments.

  • Never copy addresses from recent transaction history. Instead, reenter addresses or use bookmarks.

  • Ignore or report unsolicited small transfers as potential poisoning attempts.

For wallet developers

Thoughtful interface design and built-in safeguards can minimize user error and make address poisoning attacks far less effective.

Advertisement
  • Filtering or hiding low-value spam transactions

  • Similarity detection for recipient addresses

  • Pre-signing simulations and risk warnings

  • Built-in poisoned address checks via onchain queries or shared blacklists.

Cointelegraph maintains full editorial independence. The selection, commissioning and publication of Features and Magazine content are not influenced by advertisers, partners or commercial relationships.

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Moonwell Proposes $2.68M Recovery Plan After cbETH Liquidation Incident Harms 181 Borrowers on Base

Published

on

Nexo Partners with Bakkt for US Crypto Exchange and Yield Programs

TLDR:

  • Roughly 181 Moonwell borrowers on Base lost ~$2.68M due to oracle-driven cbETH liquidations from Feb 14–18, 2026. 
  • Moonwell will allocate ~$310,000 from its Apollo Treasury as an immediate pro-rata repayment to all affected borrowers. 
  • The remaining ~$2.37M will be repaid gradually through future protocol fees and OEV revenue via Sablier over 12 months. 
  • MFAM holders will convert their tokens into stkWELL at a 1:1.5 ratio, consolidating Apollo DAO into Moonwell’s primary governance.

 

Moonwell has released a recovery proposal addressing unfair liquidations of cbETH collateral between February 14 and 18, 2026.

The incident affected roughly 181 borrowers on Base, resulting in approximately $2.68M in net losses. Protocol behavior tied to MIP-X43, not user error, drove the liquidations.

The plan combines treasury funds with future revenue and includes a transition for MFAM holders into the WELL ecosystem.

cbETH Liquidation Recovery Targets 181 Affected Borrowers

The Moonwell team conducted a full onchain review of all liquidation activity during the incident window. Each borrower’s loss was calculated on a net basis, meaning only realized economic harm qualifies for remediation.

Advertisement

The methodology accounts for all cbETH collateral seized, minus the USD value of debt repaid at the time of liquidation.

The proposal was direct about what caused the harm. “These users trusted Moonwell with their assets and were harmed through no fault of their own,” the post stated.

Crucially, cbETH was repriced at $2,200 per token to correct erroneous oracle values that contributed to the problem. This adjustment ensures that repayments reflect actual market conditions rather than distorted price data.

To begin repayments promptly, approximately $310,000 will be drawn from the Moonwell Apollo Treasury. This amount will be distributed pro-rata to affected borrowers based on their individual calculated losses.

The proposal described this allocation as “an immediate good-faith remediation without jeopardizing protocol stability.”

The remaining balance of roughly $2.37M will be repaid over time through future protocol revenue. This includes net protocol fees and OEV revenue under the current fee split structure.

Advertisement

All repayments will be claimable through Sablier over a 12-month window, after which unclaimed rewards expire.

MFAM Wind-Down Consolidates Apollo DAO Into Moonwell’s Primary Governance

The proposal also addresses the full deprecation of Moonwell on Moonriver, which was completed on January 29, 2026. Chainlink’s decision to sunset oracle feeds on Moonriver forced a gradual reduction of collateral factors. With MIP-R38 passed, all Moonriver markets reached a 0% collateral factor, formally closing the deployment.

As Moonriver operations wind down, the Apollo DAO governed by MFAM will consolidate into the primary Moonwell DAO governed by WELL.

The proposal described the transition as “simplifying governance, aligning incentives, and closing out legacy infrastructure.” MFAM holders will convert their holdings into stkWELL at a 1:1.5 ratio, based on a snapshot taken at proposal submission.

Advertisement

The proposal noted that this conversion brings MFAM holders “direct exposure to Moonwell’s ongoing development on Base and future deployments, while eliminating fragmentation across governance tokens and treasuries.” The MFAM-to-stkWELL conversion will also be claimable for up to 12 months via Sablier.

By addressing both the cbETH incident and the MFAM wind-down together, the proposal aims to close out Moonriver “in a clean, accountable manner.

The Moonwell DAO will vote separately on treasury allocation, the long-term repayment commitment, and execution authority.

Advertisement

Source link

Continue Reading

Crypto World

US CLARITY Act To ‘Hopefully’ Pass By April: Bernie Moreno

Published

on

US CLARITY Act To 'Hopefully' Pass By April: Bernie Moreno

The US CLARITY Act, a highly anticipated bill aimed at providing greater clarity for the US crypto industry, could make it through Congress in just over a month, according to crypto-friendly US Senator Bernie Moreno.

“Hopefully by April,” Moreno told CNBC during an interview at US President Donald Trump’s Mar-a-Lago property in Florida on Wednesday.

Coinbase CEO Brian Armstrong joined Moreno for the interview, explaining that they were with representatives from the crypto, banking and US Congress at the World Liberty Financial (WLF) crypto forum to reach a solution on market structure.

“A path forward” is in sight, says Moreno

“One of the big issues that did come up in the past was this idea of stablecoins on rewards,” Armstrong said. The banking industry previously raised concerns that offering stablecoin yields could undermine traditional banking and shift deposits and interest away from banks.

Advertisement

While Armstrong had issues with the draft bill and withdrew his support for the CLARITY Act in January, he said there is “now a path forward, where we can get a win-win-win outcome here.”

Brian Armstrong and Bernie Moreno joined CNBC on Wednesday. Source: CNBC

“A win for the crypto industry, a win for the banks, and a win for the American consumer to get President Trump’s crypto agenda through to the finish line, so we can make America the crypto capital of the world,” Armstrong said. 

Armstrong said the crypto exchange previously couldn’t support the bill because it includes provisions that ban interest-bearing stablecoins and position the US Securities and Exchange Commission as the primary regulator of the crypto industry. The White House was reportedly disappointed by Coinbase’s decision to withdraw its support, describing the move as a “unilateral” action that blindsided administration officials.

Moreno admitted that the delay stems from “getting hung up” on the stablecoin rewards, which he said “shouldn’t be part of this equation.”

Crypto prediction platform Polymarket’s odds of the US CLARITY Act passing in 2026 briefly surged to 90% on Wednesday before falling to 72% at the time of publication.

Advertisement

Moreno shuts down idea of a Democrat-led midterm election

Meanwhile, Moreno dismissed the idea that a Democratic takeover of Congress could threaten the bill when asked. “The House isn’t going to go Democrat, and neither is the Senate,” Moreno said.