Address Poisoning: The Crypto Wallet Scam
The most dangerous aspect of address poisoning is that it succeeds without requiring any compromise of the victim's actual wallet security or private keys. The scammer never gains access to the victim's account—they simply exploit the user's own interface and behavior patterns. This makes the scam particularly effective against confident cryptocurrency users who believe themselves immune to fraud because they haven't fallen for obvious scams. Victims who lose funds to address poisoning often experience significant psychological impact because they realize the loss was technically their own mistake, even though they were deliberately manipulated by attacker design. Recovery is virtually impossible since cryptocurrency transfers are permanent and the funds are typically moved through multiple addresses or wrapped into different blockchain networks within minutes.
常见手法
- • Sending dozens of small transactions of worthless ERC-20, BEP-20, or other tokens to the target's wallet address from attacker-controlled addresses that differ by one or two characters (such as changing a '0' to 'O' or '1' to 'l') to make them appear identical at first glance.
- • Timing the poisoned transactions to appear recent in the victim's transaction history so that when they copy an address for their next transaction, they unconsciously select the attacker's address instead of their own.
- • Using blockchain explorers and wallet interfaces that display addresses in truncated format (showing only first and last characters) to further increase the visual similarity between the victim's actual address and the attacker's poisoned address.
- • Creating wallet addresses that share the most significant characters with the target address, exploiting the fact that users typically verify only the beginning and end of addresses rather than every character.
- • Targeting high-value wallet addresses by monitoring large transactions on public blockchain explorers and then executing the poisoning attack to intercept transfers of significant amounts.
- • Combining address poisoning with social engineering or fake investment opportunities where victims are already primed to send cryptocurrency to addresses they believe belong to legitimate projects or exchanges.
如何识别
- You receive multiple small transactions of unknown tokens in your wallet within a short timeframe (hours to days) from different addresses that appear similar to your own address when viewed in truncated form.
- Recent transactions in your wallet history show token transfers from addresses with subtle character differences (like 0x...A1B2C3 vs 0x...A1b2C3) that you don't recognize sending.
- When you copy an address from your recent transaction history for a new transfer, careful character-by-character comparison reveals it differs slightly from your actual wallet address.
- You notice transaction confirmations for cryptocurrency you never authorized, and investigation reveals you inadvertently copied and pasted an attacker's address instead of your intended recipient's address.
- Spam tokens with names similar to legitimate projects or exchange tokens appear in your wallet alongside normal transaction history, making it harder to identify your authentic addresses.
- Your wallet interface shows recent transactions to addresses you definitely did not initiate, particularly small value transfers that served no legitimate purpose and came from unfamiliar sources.
如何保护自己
- Never copy and paste wallet addresses directly from your transaction history—instead, use your address book or official application features to store and retrieve trusted addresses, and verify each address manually before sending any funds.
- Always perform a full character-by-character comparison of the destination address before confirming any transaction, particularly for large transfers, by comparing against a known-good source like your address book or official documentation.
- Use wallet software that displays full, untruncated addresses during the transaction confirmation screen and requires explicit address verification before finalizing the transfer.
- Enable address labeling and tagging features in your wallet to mark your own addresses and frequently-used recipient addresses, reducing reliance on copying from transaction history.
- When sending significant amounts of cryptocurrency, send a small test transaction first to verify the destination address is legitimate, waiting for confirmation before sending the full amount.
- Maintain a secure offline record (such as a hardware wallet or encrypted document) of your wallet addresses and frequently-used recipient addresses, allowing you to copy addresses from verified sources rather than transaction history.
真实案例
A cryptocurrency trader regularly moves Ethereum between a Coinbase account and a personal MetaMask wallet for trading. After several months of routine transfers, she opens her wallet to send 2 ETH (approximately $4,000) to a colleague and instinctively copies what appears to be her Coinbase deposit address from her recent transaction history. She doesn't notice that one character has been changed—an '8' replaced with a 'B'—because the address appears in truncated format. After confirming the transaction, the Ethereum is transferred to the attacker's address within seconds and mixed through a bridge protocol. By the time she realizes the error from her Coinbase transaction not arriving, the funds are unrecoverable.
A Bitcoin investor who considers himself security-conscious receives multiple small transactions of a token named 'SafeMoon' or 'EtherMax' in his wallet over two days. Curious about the token, he assumes it's an airdrop from a legitimate project and ignores it. A week later, when he wants to send 0.5 BTC to a hardware wallet manufacturer to purchase a device for $18,000, he copies the address from his most recent transaction history—which is actually the attacker's poisoned address from the spam token transfer. Only after the irreversible transaction confirms does he realize his mistake, and blockchain analysis shows the bitcoins were immediately moved through multiple mixers.
A decentralized finance (DeFi) user regularly swaps tokens on Uniswap and has multiple wallet addresses for different purposes. An attacker targets this active wallet by sending 100 units of a worthless token from an address identical except for one character. When the victim needs to send USDC to a liquidity provider the next day, they quickly copy what they believe is the correct address from their recent transaction history and send $12,500 in stablecoins. The attacker immediately converts the USDC to Monero through privacy mixers. The victim's transaction history now shows they sent funds to an unknown address, but recovery is impossible because the transaction is immutable.