Address Poisoning Scams Drain $62M From Ethereum Users in Two Months

ETH-1,42%
WLFI-4,17%
SLVON1,44%
  • Address poisoning scams erased $62 million after users copied wallet addresses without full verification during routine transfers.

  • Lower Ethereum fees enabled mass dust attacks making address poisoning cheap, scalable and harder to detect across the network.

  • Signature phishing surged in January causing over $6 million in losses through routine token approval actions.

Ethereum wallet security risks intensified over December and January after two routine transfer mistakes erased $62 million in crypto assets. Blockchain security trackers tied both losses to address poisoning schemes. These scams exploit everyday wallet habits rather than protocol flaws. As transaction fees dropped, simple user actions started carrying much higher financial risk.

Someone lost $12.25M in January by copying the wrong address from their transaction history. In December, another victim lost $50M the same way.

Two victims. $62M gone.

Signature phishing also surged — $6.27M stolen across 4,741 victims (+207% vs Dec).

Top cases:
· $3.02M —… pic.twitter.com/7D5ynInRrb

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) February 8, 2026

The incidents highlight a growing threat for Ethereum users. Copying addresses without full verification now leads to irreversible losses. Moreover, attackers rely on speed and repetition instead of complex technical exploits. As a result, operational mistakes now rank among Ethereum’s biggest security risks.

Copy Habits Trigger Massive Losses

In December 2025, a user lost about $50 million after copying a fake address from transaction history. The address closely resembled a previously used destination. Consequently, funds moved directly to an attacker controlled wallet.

In January 2026, another user lost roughly $12.25 million, equal to about 4,556 ETH at the time. This transfer followed the same pattern as the earlier incident. Both cases relied on users reusing addresses from past activity without full checks.

These losses show how routine habits expose wallets to major risks. Users often prioritize speed during transfers. However, attackers now depend on that behavior to succeed.

How Address Poisoning Works at Scale

Address poisoning uses vanity addresses designed to resemble real wallet strings. Attackers monitor transactions and identify frequent senders. They then send tiny dust transfers to those wallets.

These near zero value transactions insert fake addresses into transaction histories. Later, copied addresses redirect funds to scammers. As Ethereum fees fell after the Fusaka upgrade, this method became cheap to deploy.

Millions of dust transactions now hit the network daily. Many serve no purpose beyond preparing future thefts. Consequently, address poisoning expanded rapidly across Ethereum. Earlier last year, the EOS blockchain was under attack by malicious actors using an address-poisoning scheme.

Network Data Distortion and Organized Campaigns

Security researchers report that poisoning activity now distorts Ethereum usage data. Rising transaction counts increasingly reflect spam rather than genuine demand. This shift complicates network analysis.

Coin Metrics reviewed 227 million stablecoin balance updates between November and January. The firm found 38% of updates carried values below one cent. This pattern strongly points to poisoning deposits.

Today, stablecoin dust accounts for 11% of Ethereum transactions on average days. It also represents 26% of active addresses. Investigations link many campaigns to organized groups reusing infrastructure across thousands of wallets.

Signature Phishing Adds to Losses

Alongside poisoning, signature based phishing increased sharply in January. ScamSniffer recorded $6.27 million stolen across 4,741 victims during the month. This marked a 207% increase compared with December. Additionally, WLFI also confirmed that attackers accessed some user wallets through phishing and third-party lapses before its platform launched in November.

Two wallets alone caused about 65% of total losses. Major cases included $3.02 million stolen from SLVon and XAUt tokens. Another $1.08 million came from aEthLBTC through malicious approvals. These scams rely on routine looking transaction prompts. Once approved, attackers gain long term token access.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Whale Swaps 1,000 ETH for XAUT, Incurs $60K Loss

Gate News bot message, a whale swapped 1,000 ETH ($1.94M) for 358.49 XAUT at a price of $5,413, facing a loss of over $60K. Over the past 2 years, the whale received 1,645 ETH for $3.26M and still holds 645 ETH ($1.25M). Address: 0x744b0b1c4132d79ec106cb62c630d961c4a0d849

GateNews1m ago

Crypto Market Review: Strong Bullish XRP Case, $67,000 Bitcoin (BTC) Bounce Secures Recovery, Ethereum (ETH) Catches $2,000 by the Tail - U.Today

It is finally building up Bearish for now Bitcoin is not overreacting Cycle is yet to begin Ethereum is crawling back The market is bouncing up following geopolitical instability — a traditional trait of the cryptocurrency market, which some people consider a safe haven whenever the traditiona

UToday11m ago

Vitalik outlines the Ethereum execution layer roadmap, focusing on changes to the state tree and the virtual machine.

Ethereum co-founder Vitalik Buterin discussed the Ethereum execution layer roadmap on social media, including changes to the state tree and virtual machine. He supports upgrading the Merkle Patricia tree to a binary tree to improve efficiency and reduce verification costs. At the same time, he recommends replacing the EVM with RISC-V architecture to enhance execution and proof efficiency, as well as simplify code implementation. The overall deployment will be carried out in three steps to ensure backward compatibility.

GateNews12m ago

ETH Drops 60% from 2025 High, Yet TradFi Bets on ETH: Here’s Why

Ethereum remains a focal point for institutional on-chain activity even as price momentum stalls. In 2026, Ether has retreated about 36% for the year, slipping back from the $3,000 milestone toward the $1,900 zone as traders weigh macro headwinds and network dynamics. Yet major financial institution

CryptoBreaking2h ago
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)