Binance Square

cryptoattack

5,327 skatījumi
11 piedalās diskusijā
MindOfMarket
·
--
Skatīt tulkojumu
USD1 DE-PEGGED $0.994! MANIPULATION ATTACK CONFIRMED. Entry: 0.994 🟩 Target 1: 1.000 🎯 Stop Loss: 0.990 🛑 USD1 coin under fire. A coordinated attack aimed to break the peg. Hackers, bribes, panic selling. They profited from the chaos. WLFI claims it's a temporary disruption. Full dollar redemption remains. This early stage attack is a test. Can USD1 recover its trust? The ecosystem's future hangs in the balance. Act now. News is for reference, not investment advice. #USD1 #WLFI #CryptoAttack #Depeg 🚨
USD1 DE-PEGGED $0.994! MANIPULATION ATTACK CONFIRMED.

Entry: 0.994 🟩
Target 1: 1.000 🎯
Stop Loss: 0.990 🛑

USD1 coin under fire. A coordinated attack aimed to break the peg. Hackers, bribes, panic selling. They profited from the chaos. WLFI claims it's a temporary disruption. Full dollar redemption remains. This early stage attack is a test. Can USD1 recover its trust? The ecosystem's future hangs in the balance. Act now.

News is for reference, not investment advice.

#USD1 #WLFI #CryptoAttack #Depeg 🚨
Skatīt tulkojumu
USD1 STABLECOIN UNDER SIEGE. IT FAILED. Entry: 0.994 🟩 Target 1: 1.00 🎯 Stop Loss: 0.99 🛑 They tried to break it. Coordinated attack. Hacked accounts. Paid influencers. Massive short positions. They threw everything at $USD1. It held. The stablecoin defended its peg. This shows incredible resilience. Don't miss the recovery. This is the moment. Disclaimer: Trading is risky. #USD1 #Stablecoin #CryptoAttack #FOMO 🚀 {spot}(USD1USDT)
USD1 STABLECOIN UNDER SIEGE. IT FAILED.

Entry: 0.994 🟩
Target 1: 1.00 🎯
Stop Loss: 0.99 🛑

They tried to break it. Coordinated attack. Hacked accounts. Paid influencers. Massive short positions. They threw everything at $USD1. It held. The stablecoin defended its peg. This shows incredible resilience. Don't miss the recovery. This is the moment.

Disclaimer: Trading is risky.

#USD1 #Stablecoin #CryptoAttack #FOMO 🚀
Nobitex (2024. gada jūnijs) – 90 miljonu dolāru zādzībaIrānas Nobitex (valsts lielākais biržas tirgus) tika uzbrukts par apmēram 90 miljoniem dolāru. Hakeru uzbrukums, visticamāk, apvienoja zādzību ar servera izmantošanu, pēc tam novirzīja līdzekļus caur maisītājiem. Radās ģeopolitisks pavērsiens – valsts atbalstītie pirksti tika norādīti. Šis uzbrukums satricināja Irānas sankciju ierobežoto kriptovalūtu tirgu. 🛡️🌐 #Nobitex #CryptoAttack #iran $BTC $ETH $BNB

Nobitex (2024. gada jūnijs) – 90 miljonu dolāru zādzība

Irānas Nobitex (valsts lielākais biržas tirgus) tika uzbrukts par apmēram 90 miljoniem dolāru. Hakeru uzbrukums, visticamāk, apvienoja zādzību ar servera izmantošanu, pēc tam novirzīja līdzekļus caur maisītājiem. Radās ģeopolitisks pavērsiens – valsts atbalstītie pirksti tika norādīti. Šis uzbrukums satricināja Irānas sankciju ierobežoto kriptovalūtu tirgu. 🛡️🌐
#Nobitex #CryptoAttack #iran
$BTC
$ETH
$BNB

Drošības bažas pieaug: TELEBTC novirze rada aizdomas par uzbrukumu TeleportDAOPētniece Bobie no 0xScope nesen atklāja bažas par potenciālo drošību krustojuma Ordinals tirgū TeleportDAO. Novērojumi liecina par iespējamu uzbrukumu protokolam, kur Bitcoin piesaistītais tokens, TELEBTC, izrāda būtisku cenu novirzi no faktiskās Bitcoin vērtības. Pētnieka atzīmētā anomālija: Bobie, pētniece, kas saistīta ar 0xScope, ir pievērsusi uzmanību anomālijai TeleportDAO ekosistēmā. Krustojuma Ordinals tirgus, kas pazīstams ar dažādu blokķēdes tīklu integrāciju, ir zem mikroskopa, jo ir identificētas novirzes TELEBTC, protokola Bitcoin piesaistītā token, cenā.

Drošības bažas pieaug: TELEBTC novirze rada aizdomas par uzbrukumu TeleportDAO

Pētniece Bobie no 0xScope nesen atklāja bažas par potenciālo drošību krustojuma Ordinals tirgū TeleportDAO. Novērojumi liecina par iespējamu uzbrukumu protokolam, kur Bitcoin piesaistītais tokens, TELEBTC, izrāda būtisku cenu novirzi no faktiskās Bitcoin vērtības.
Pētnieka atzīmētā anomālija:
Bobie, pētniece, kas saistīta ar 0xScope, ir pievērsusi uzmanību anomālijai TeleportDAO ekosistēmā. Krustojuma Ordinals tirgus, kas pazīstams ar dažādu blokķēdes tīklu integrāciju, ir zem mikroskopa, jo ir identificētas novirzes TELEBTC, protokola Bitcoin piesaistītā token, cenā.
🚨🚨 #CryptoAttack 💥🤯 𝗧𝗵𝗲 𝗛𝗶𝗱𝗱𝗲𝗻 𝗦𝘁𝗼𝗿𝘆 𝗕𝗲𝗵𝗶𝗻𝗱 𝘁𝗵𝗲 $BTC 📉 #DUMPED!!! 💲💲 🗞️ ​Baumas izplatās, ka nesenais milzīgais BTC krahs tika organizēts vairākās lielās ASV bankās un 𝗝𝗣 𝗠𝗼𝗿𝗴𝗮𝗻 institūcijā. 🏦 Viņu galvenais mērķis šķiet, ka tas bija 𝗖𝗿𝗮𝘀𝗵 $BITCOIN . 🖋️ ​Institūcijas it kā vispirms iegādājās BTC Spot, un pēc tam, pat pirms AI burbuļa stāsta sākuma, viņi sāka 𝘀𝗵𝗼𝗿𝘁𝗶𝗻𝗴 𝗠𝗶𝗰𝗿𝗼𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝘆 (𝗠𝗦𝗧𝗥) 𝗦𝘁𝗼𝗰𝗸𝘀 ar miljardiem dolāru. 📉 Pēc tam ziņots, ka viņi sāka izplatīt dažādas 𝗻𝗲𝗴𝗮𝘁𝗶𝘃𝗲 𝗡𝗘𝗪𝗦 stāstus par BTC, mudinot cilvēkus pārdot. 🤔 ​Ir skaidrs, ka tradicionālās bankas un finanšu institūcijas ir fundamentāli pret Bitcoin. Šī atklāsme ir izraisījusi milzīgu 𝗪𝗶𝘁𝗵𝗱𝗿𝗮𝘄𝗮𝗹 𝗪𝗮𝘃𝗲 🌊 starp amerikāņu Bitcoin atbalstītājiem, mudinot visus izņemt savus līdzekļus no 𝗝𝗣 𝗠𝗼𝗿𝗴𝗮𝗻 bankām. ⚠️ ​Ja BTC paceltos līdz $120K līmenim, 𝗠𝗶𝗰𝗿𝗼𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝘆 𝗦𝘁𝗼𝗰𝗸 𝗰𝗼𝘂𝗹𝗱 𝗦𝘁𝗼𝗰𝗸 𝗰𝗼𝘂𝗹𝗱 𝘀𝘂𝗿𝗴𝗲 𝗯𝘆 𝗮𝗯𝗼𝘂𝘁 60%, kas arī apdraudētu 𝗟𝗶𝗾𝘂𝗶𝗱𝗮𝘁𝗶𝗼𝗻 💥 JP Morgan īso pozīciju.💔 💥 ​Šis nesenais kritums tiek raksturots kā 𝗣𝗹𝗮𝗻𝗻𝗲𝗱 𝗔𝘁𝘁𝗮𝗰𝗸 ⚠️ uz kriptonauda tirgu. Šī informācija plaši izplatās pa X (Twitter); noteikti izpētiet to tālāk. 📌 "Kādas ir jūsu domas par šo? 🤔 Dalieties ar saviem komentāriem zemāk." 👇 ​ #JPMorgan #MicroStrategy #FinancialNews {future}(BTCUSDT)
🚨🚨 #CryptoAttack 💥🤯 𝗧𝗵𝗲 𝗛𝗶𝗱𝗱𝗲𝗻 𝗦𝘁𝗼𝗿𝘆 𝗕𝗲𝗵𝗶𝗻𝗱 𝘁𝗵𝗲 $BTC 📉 #DUMPED!!! 💲💲

🗞️ ​Baumas izplatās, ka nesenais milzīgais BTC krahs tika organizēts vairākās lielās ASV bankās un 𝗝𝗣 𝗠𝗼𝗿𝗴𝗮𝗻 institūcijā. 🏦 Viņu galvenais mērķis šķiet, ka tas bija 𝗖𝗿𝗮𝘀𝗵 $BITCOIN .

🖋️ ​Institūcijas it kā vispirms iegādājās BTC Spot, un pēc tam, pat pirms AI burbuļa stāsta sākuma, viņi sāka 𝘀𝗵𝗼𝗿𝘁𝗶𝗻𝗴 𝗠𝗶𝗰𝗿𝗼𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝘆 (𝗠𝗦𝗧𝗥) 𝗦𝘁𝗼𝗰𝗸𝘀 ar miljardiem dolāru. 📉 Pēc tam ziņots, ka viņi sāka izplatīt dažādas 𝗻𝗲𝗴𝗮𝘁𝗶𝘃𝗲 𝗡𝗘𝗪𝗦 stāstus par BTC, mudinot cilvēkus pārdot.

🤔 ​Ir skaidrs, ka tradicionālās bankas un finanšu institūcijas ir fundamentāli pret Bitcoin. Šī atklāsme ir izraisījusi milzīgu 𝗪𝗶𝘁𝗵𝗱𝗿𝗮𝘄𝗮𝗹 𝗪𝗮𝘃𝗲 🌊 starp amerikāņu Bitcoin atbalstītājiem, mudinot visus izņemt savus līdzekļus no 𝗝𝗣 𝗠𝗼𝗿𝗴𝗮𝗻 bankām.

⚠️ ​Ja BTC paceltos līdz $120K līmenim, 𝗠𝗶𝗰𝗿𝗼𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝘆 𝗦𝘁𝗼𝗰𝗸 𝗰𝗼𝘂𝗹𝗱 𝗦𝘁𝗼𝗰𝗸 𝗰𝗼𝘂𝗹𝗱 𝘀𝘂𝗿𝗴𝗲 𝗯𝘆 𝗮𝗯𝗼𝘂𝘁 60%, kas arī apdraudētu 𝗟𝗶𝗾𝘂𝗶𝗱𝗮𝘁𝗶𝗼𝗻 💥 JP Morgan īso pozīciju.💔

💥 ​Šis nesenais kritums tiek raksturots kā 𝗣𝗹𝗮𝗻𝗻𝗲𝗱 𝗔𝘁𝘁𝗮𝗰𝗸 ⚠️ uz kriptonauda tirgu. Šī informācija plaši izplatās pa X (Twitter); noteikti izpētiet to tālāk.

📌 "Kādas ir jūsu domas par šo? 🤔 Dalieties ar saviem komentāriem zemāk." 👇

#JPMorgan #MicroStrategy #FinancialNews
DROŠĪBAS BRĪDINĀJUMS! Saskaņā ar CryptoPotato, kāds indivīds nesen kļuva par upuri kripto pikšķerēšanas uzbrukumam, zaudējot šokējošus 4,2 miljonus dolāru vērts aEthWETH un aEthUNI. 😱 Scam Sniffer, Web3 drošības firma, atklāja, ka uzbrucējs izmantoja maldinošu ERC-20 atļauju parakstu, lai manipulētu ar apstiprinājumiem vairākiem darījumiem. Upuris neapzināti parakstīja darījumus, ļaujot uzbrucējam novirzīt līdzekļus uz neautorizētu adresi pirms izpildes. 🕵️‍♂️ Šis sarežģītais uzbrukums izmantoja Opcode ļaunprātīgu programmatūru, kas ir ļaunprātīga programmatūra, kas izmanto darbību kodus skriptu valodās dažādās platformās. Šāda veida ļaunprātīga programmatūra var novirzīt līdzekļus, autorizēt neautorizētus izdevumus un imobilizēt aktīvus viedajos līgumos, vienlaikus izvairoties no tradicionālajām drošības pasākumiem. Eksperti brīdina, ka Opcode ļaunprātīga programmatūra var pārņemt kontroli pār upura CPU, atmiņu un sistēmas resursiem, izmantojot vājības operētājsistēmā vai citā programmatūrā. Pikšķerēšanas aktivitātes pieaug, krāpniekiem izmantojot progresīvas taktikas, lai apietu drošības pasākumus. Pat kripto vaļi, kuriem pieder ievērojami tirgus ietekmējoši aktīvi, ir kļuvuši par krāpnieku upuriem, zaudējot miljoniem šī procesa laikā. Palieciet modri #cryptoattack #Write2Earn #ETH
DROŠĪBAS BRĪDINĀJUMS!

Saskaņā ar CryptoPotato, kāds indivīds nesen kļuva par upuri kripto pikšķerēšanas uzbrukumam, zaudējot šokējošus 4,2 miljonus dolāru vērts aEthWETH un aEthUNI. 😱

Scam Sniffer, Web3 drošības firma, atklāja, ka uzbrucējs izmantoja maldinošu ERC-20 atļauju parakstu, lai manipulētu ar apstiprinājumiem vairākiem darījumiem.

Upuris neapzināti parakstīja darījumus, ļaujot uzbrucējam novirzīt līdzekļus uz neautorizētu adresi pirms izpildes. 🕵️‍♂️

Šis sarežģītais uzbrukums izmantoja Opcode ļaunprātīgu programmatūru, kas ir ļaunprātīga programmatūra, kas izmanto darbību kodus skriptu valodās dažādās platformās.

Šāda veida ļaunprātīga programmatūra var novirzīt līdzekļus, autorizēt neautorizētus izdevumus un imobilizēt aktīvus viedajos līgumos, vienlaikus izvairoties no tradicionālajām drošības pasākumiem.

Eksperti brīdina, ka Opcode ļaunprātīga programmatūra var pārņemt kontroli pār upura CPU, atmiņu un sistēmas resursiem, izmantojot vājības operētājsistēmā vai citā programmatūrā.

Pikšķerēšanas aktivitātes pieaug, krāpniekiem izmantojot progresīvas taktikas, lai apietu drošības pasākumus.

Pat kripto vaļi, kuriem pieder ievērojami tirgus ietekmējoši aktīvi, ir kļuvuši par krāpnieku upuriem, zaudējot miljoniem šī procesa laikā.

Palieciet modri

#cryptoattack #Write2Earn #ETH
Viņi jau nopirka… bet tu vēl meklē “kas ir blokķēde?” 🤷‍♂️📉📲Kamēr tu domā — PEPE jau ir uz 12% augšu 🚀 Kamēr tu analizē — JUP meklē jaunu dibenu, lai atspērtos uz augšu! 🪙 Un ORDI vienkārši klusi uzlēk pa augšu bez tavas līdzdalības 💥 --- Ko tagad pērk tie, kas ir peļņā? 1. $PEPE — jo, kas smejas, tas pēdējais pārdod ar peļņu 😎 2. $JUP — jo “airdrop ir pagājis — tagad īstā kustība sāksies” 🛸

Viņi jau nopirka… bet tu vēl meklē “kas ir blokķēde?” 🤷‍♂️📉📲

Kamēr tu domā — PEPE jau ir uz 12% augšu 🚀
Kamēr tu analizē — JUP meklē jaunu dibenu, lai atspērtos uz augšu! 🪙
Un ORDI vienkārši klusi uzlēk pa augšu bez tavas līdzdalības 💥

---

Ko tagad pērk tie, kas ir peļņā?

1. $PEPE
— jo, kas smejas, tas pēdējais pārdod ar peļņu 😎
2. $JUP

— jo “airdrop ir pagājis — tagad īstā kustība sāksies” 🛸
Skatīt tulkojumu
How Do Crypto Address Poisoning Attacks Work?Blockchain address poisoning is a scam in the crypto world where attackers take advantage of the similarity between wallet addresses to trick users into sending money to the wrong wallets.Scammers create wallet addresses resembling those a user often interacts with and “pollute” their transaction history by sending small transactions from these fraudulent addresses.The irreversible nature of blockchain transactions increases the risk and impact of these address poisoning scams.Mitigation requires improvements at the protocol, wallet, and user education levels, along with blockchain analysis and real-time monitoring. Introduction With the rise of blockchain technology and cryptocurrencies, cybercriminals have also developed more clever ways to exploit users. One increasingly common and troubling tactic is called blockchain address poisoning. This scam tricks users into sending funds to wallet addresses that look very similar to ones they usually use. Unfortunately, because blockchain transactions are final and can’t be undone, users who make this mistake can suffer huge losses. In this article, we explore how blockchain address poisoning attacks work, the techniques scammers use, real-world examples illustrating their impact, and strategies for prevention. What Are Address Poisoning Attacks in Crypto? This scam happens when fraudsters create wallet addresses that closely mimic the legitimate ones a user frequently transacts with. They then send small, seemingly harmless transactions from these “lookalike” addresses to the victim’s wallet. This action fills the victim’s recent transaction list or address book with “fake” addresses, increasing the chance they will accidentally pick a malicious address for their next transaction. Blockchain wallet addresses are long strings of hexadecimal characters, which are hard to remember. Because of this, users often copy and paste addresses or select from recent addresses shown in their wallets, creating an opening for scammers to slip in malicious addresses that may appear familiar. How do attackers generate similar addresses? Scammers use computer programs to generate many wallet addresses repeatedly until they find ones that match the beginning and end characters of their target’s regular address. Wallet apps usually only display a few characters at the start and finish of addresses, so these similarities fool users into thinking the lookalike address is genuine. Steps of a typical address poisoning attack Study the victim: The scammer reviews the victim’s transaction patterns to learn which wallet addresses they frequently use.Generate fake addresses: Using automated tools, the attacker creates similar addresses that look like the ones used by the victims.Poison transaction history: They send tiny payments from these fake addresses to the victim’s wallet, embedding them in their address history.Catch the victim: Later, when the victim sends crypto and picks an address from their recent activity, they may pick the wrong one by accident, sending funds to the scammer. Real-World Example: The 2024 Crypto Whale Attack One high-profile case from May 2024 involved a [crypto whale](https://www.binance.com/en/academy/articles/what-are-crypto-whales-and-how-can-you-spot-them) who mistakenly sent nearly $68 million in [wrapped bitcoin (WBTC)](https://www.binance.com/en/academy/articles/what-is-wrapped-bitcoin-wbtc) to a scammer’s Ethereum address. The attacker spoofed the first six characters of the victim’s legitimate address to create a convincing fake. After receiving the funds, the scammer moved the assets through multiple [crypto wallets](https://www.binance.com/en/academy/articles/crypto-wallet-types-explained). Following negotiations, the scammer returned the original $68 million several days later but kept approximately $3 million profit due to price appreciation. The campaign behind this attack involved tens of thousands of fake addresses and targeted mostly experienced users with large wallet balances, highlighting the sophistication and scale these scams can reach. Who Are the Victims? The victims are usually active crypto users who hold larger amounts of cryptocurrency than typical users.Although most fake addresses don’t successfully deceive users, the overall amount stolen can reach hundreds of millions.Many victims reduce risk by performing small “test” transfers before sending large sums. How to Prevent Address Poisoning Attacks Improvements at the protocol level Human-friendly addresses: Systems like Blockchain Domain Name System (BNS) and [Ethereum Name Service (ENS)](https://www.binance.com/en/academy/articles/what-is-ethereum-name-service-ens) allow easier-to-remember names instead of long hexadecimal strings, which can help reduce errors.Higher costs for address creation: Introducing measures that slow down address creation or use larger character sets can potentially make generating fake addresses more difficult and costly. Wallet and interface upgrades Better address visibility: Wallets could show longer parts of addresses or alert users when sending to addresses similar to known fake ones.Blocking suspicious transfers: Wallets and blockchain explorers might hide or flag suspicious zero-value and counterfeit token transfers used in these scams. User awareness and best practices Test before sending: Always make small test transfers before sending large amounts.Keep trusted address lists: Use personal allowlists to avoid accidentally selecting fraudulent addresses.Use security tools: Consider using extensions or apps that detect phishing and address poisoning attempts. Real-time blockchain monitoring Real-time tools can spot unusual patterns linked to address poisoning and alert users, exchanges, or security teams to stop scams before they cause significant damage. Closing Thoughts Blockchain address poisoning is a growing and costly scam that takes advantage of complex wallet addresses and user convenience. Because crypto transactions cannot be undone, even small mistakes can mean serious losses. Preventing these scams requires a team effort involving better blockchain protocols, smarter wallet designs, educated users, and advanced monitoring systems. By understanding how these attacks happen and following safety practices, the crypto community can reduce risk and stay more secure. Further Reading [What Are Multisig Scams and How to Avoid Them?](https://www.binance.com/en/academy/articles/what-are-multisig-scams-and-how-to-avoid-them) [5 Tips to Secure Your Cryptocurrency Holdings](https://www.binance.com/en/academy/articles/5-tips-to-secure-your-cryptocurrency-holdings)[What Is Wrapped Bitcoin (WBTC)?](https://www.binance.com/en/academy/articles/what-is-wrapped-bitcoin-wbtc)  Disclaimer: This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Products mentioned in this article may not be available in your region. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Binance Academy. Please read our [full disclaimer](https://academy.binance.com/en/articles/disclaimer) for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions and Binance Academy is not liable for any losses you may incur. This material should not be construed as financial, legal or other professional advice. For more information, see our [Terms of Use](https://www.binance.com/en/terms) and [Risk Warning](https://www.binance.com/en/risk-warning). $BTC $ETH #CryptoAttack

How Do Crypto Address Poisoning Attacks Work?

Blockchain address poisoning is a scam in the crypto world where attackers take advantage of the similarity between wallet addresses to trick users into sending money to the wrong wallets.Scammers create wallet addresses resembling those a user often interacts with and “pollute” their transaction history by sending small transactions from these fraudulent addresses.The irreversible nature of blockchain transactions increases the risk and impact of these address poisoning scams.Mitigation requires improvements at the protocol, wallet, and user education levels, along with blockchain analysis and real-time monitoring.
Introduction
With the rise of blockchain technology and cryptocurrencies, cybercriminals have also developed more clever ways to exploit users. One increasingly common and troubling tactic is called blockchain address poisoning. This scam tricks users into sending funds to wallet addresses that look very similar to ones they usually use. Unfortunately, because blockchain transactions are final and can’t be undone, users who make this mistake can suffer huge losses.
In this article, we explore how blockchain address poisoning attacks work, the techniques scammers use, real-world examples illustrating their impact, and strategies for prevention.
What Are Address Poisoning Attacks in Crypto?
This scam happens when fraudsters create wallet addresses that closely mimic the legitimate ones a user frequently transacts with. They then send small, seemingly harmless transactions from these “lookalike” addresses to the victim’s wallet. This action fills the victim’s recent transaction list or address book with “fake” addresses, increasing the chance they will accidentally pick a malicious address for their next transaction.
Blockchain wallet addresses are long strings of hexadecimal characters, which are hard to remember. Because of this, users often copy and paste addresses or select from recent addresses shown in their wallets, creating an opening for scammers to slip in malicious addresses that may appear familiar.
How do attackers generate similar addresses?
Scammers use computer programs to generate many wallet addresses repeatedly until they find ones that match the beginning and end characters of their target’s regular address. Wallet apps usually only display a few characters at the start and finish of addresses, so these similarities fool users into thinking the lookalike address is genuine.
Steps of a typical address poisoning attack
Study the victim: The scammer reviews the victim’s transaction patterns to learn which wallet addresses they frequently use.Generate fake addresses: Using automated tools, the attacker creates similar addresses that look like the ones used by the victims.Poison transaction history: They send tiny payments from these fake addresses to the victim’s wallet, embedding them in their address history.Catch the victim: Later, when the victim sends crypto and picks an address from their recent activity, they may pick the wrong one by accident, sending funds to the scammer.
Real-World Example: The 2024 Crypto Whale Attack
One high-profile case from May 2024 involved a crypto whale who mistakenly sent nearly $68 million in wrapped bitcoin (WBTC) to a scammer’s Ethereum address. The attacker spoofed the first six characters of the victim’s legitimate address to create a convincing fake. After receiving the funds, the scammer moved the assets through multiple crypto wallets.
Following negotiations, the scammer returned the original $68 million several days later but kept approximately $3 million profit due to price appreciation. The campaign behind this attack involved tens of thousands of fake addresses and targeted mostly experienced users with large wallet balances, highlighting the sophistication and scale these scams can reach.
Who Are the Victims?
The victims are usually active crypto users who hold larger amounts of cryptocurrency than typical users.Although most fake addresses don’t successfully deceive users, the overall amount stolen can reach hundreds of millions.Many victims reduce risk by performing small “test” transfers before sending large sums.
How to Prevent Address Poisoning Attacks
Improvements at the protocol level
Human-friendly addresses: Systems like Blockchain Domain Name System (BNS) and Ethereum Name Service (ENS) allow easier-to-remember names instead of long hexadecimal strings, which can help reduce errors.Higher costs for address creation: Introducing measures that slow down address creation or use larger character sets can potentially make generating fake addresses more difficult and costly.
Wallet and interface upgrades
Better address visibility: Wallets could show longer parts of addresses or alert users when sending to addresses similar to known fake ones.Blocking suspicious transfers: Wallets and blockchain explorers might hide or flag suspicious zero-value and counterfeit token transfers used in these scams.
User awareness and best practices
Test before sending: Always make small test transfers before sending large amounts.Keep trusted address lists: Use personal allowlists to avoid accidentally selecting fraudulent addresses.Use security tools: Consider using extensions or apps that detect phishing and address poisoning attempts.
Real-time blockchain monitoring
Real-time tools can spot unusual patterns linked to address poisoning and alert users, exchanges, or security teams to stop scams before they cause significant damage.
Closing Thoughts
Blockchain address poisoning is a growing and costly scam that takes advantage of complex wallet addresses and user convenience. Because crypto transactions cannot be undone, even small mistakes can mean serious losses.
Preventing these scams requires a team effort involving better blockchain protocols, smarter wallet designs, educated users, and advanced monitoring systems. By understanding how these attacks happen and following safety practices, the crypto community can reduce risk and stay more secure.
Further Reading
What Are Multisig Scams and How to Avoid Them? 5 Tips to Secure Your Cryptocurrency HoldingsWhat Is Wrapped Bitcoin (WBTC)? 
Disclaimer: This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Products mentioned in this article may not be available in your region. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Binance Academy. Please read our full disclaimer for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions and Binance Academy is not liable for any losses you may incur. This material should not be construed as financial, legal or other professional advice. For more information, see our Terms of Use and Risk Warning.
$BTC
$ETH
#CryptoAttack
Pieraksties, lai skatītu citu saturu
Uzzini jaunākās kriptovalūtu ziņas
⚡️ Iesaisties jaunākajās diskusijās par kriptovalūtām
💬 Mijiedarbojies ar saviem iemīļotākajiem satura veidotājiem
👍 Apskati tevi interesējošo saturu
E-pasta adrese / tālruņa numurs