Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Scams & Fraud

Etherscan Warns of Rising Address Poisoning Attacks on Ethereum

Rising dust transfers and automated lookalike addresses are increasing the risk of address poisoning scams across the Ethereum network.

by Sathish Kumar Kaliraj
March 13, 2026
in Scams & Fraud
0 0
Etherscan Warns of Rising Address Poisoning Attacks on Ethereum

Image Source: etherscan.io

Share on FacebookShare on Twitter
  • Address poisoning attacks are rising on Ethereum, inserting fake lookalike wallet addresses into transaction histories.
  • A study identified 17 million poisoning attempts targeting 1.3 million users, with at least $79.3 million in losses.
  • Automated attack campaigns can launch poison transactions within minutes of legitimate transfers.
  • Lower transaction costs after the Fusaka upgrade have made these scams cheaper to execute.
  • Security experts stress one key rule: always verify the destination wallet address before sending funds.

Rising Address Poisoning Attacks Raise Security Concerns on Ethereum

Address poisoning attacks are becoming increasingly common on the Ethereum network, raising concerns among users and blockchain security researchers. The tactic involves attackers sending transactions that insert deceptive wallet addresses into a user’s transaction history, with the goal of tricking victims into copying and using the wrong address in future transfers.

According to blockchain explorer Etherscan, address poisoning campaigns have become increasingly automated, allowing attackers to flood wallets with spoofed transactions within minutes of legitimate transfers.

The issue recently came into focus when an Etherscan user named Nima reported receiving more than 89 Address Watch Alert emails shortly after completing just two stablecoin transfers. The alerts were triggered by a series of address poisoning transactions sent to the wallet shortly after the legitimate transfers were recorded.

These transactions were designed to insert lookalike addresses into the user’s transaction history. If a user later copies an address from the list without verifying it carefully, they may inadvertently send funds to an attacker. While address poisoning is not new, recent incidents indicate that these campaigns have become more automated and widespread.

From Occasional Spam to Industrialized Attacks

In earlier years, address poisoning was often viewed as a minor nuisance – an occasional spam transaction sent by opportunistic attackers.  However, recent research suggests the tactic has evolved into a large-scale operation.

A 2025 study examining poisoning activity between July 2022 and June 2024 identified approximately 17 million poisoning attempts targeting around 1.3 million Ethereum users. Researchers estimated that confirmed losses linked to these attacks reached at least $79.3 million during the study period.

The data also showed that poisoning activity occurs across multiple blockchain networks. On Binance Smart Chain (BSC), for example, poisoning transactions were found to occur 1,355% more frequently than on Ethereum, largely due to lower transaction fees.

Attackers often rely on automated systems that continuously monitor blockchain activity. When a transaction is detected, the system quickly generates spoofed addresses designed to mimic the beginning and ending characters of legitimate addresses used by the victim.

These spoofed addresses are then used to send small transactions known as “poison transfers” to the target wallet. This causes the fake address to appear in the victim’s transaction history alongside legitimate ones.

Automated Campaigns Target High-Value Wallets

Attackers typically focus on wallets that appear more likely to produce profits. Addresses that frequently transfer funds, hold significant token balances, or conduct large transactions are more likely to become targets. Once a target is identified, automated systems can generate multiple lookalike addresses and send poison transfers within minutes of a legitimate transaction.

Researchers also observed that attackers often compete with one another. In some cases, multiple groups send poisoning transactions to the same address almost simultaneously. Each attacker attempts to insert their spoofed address into the transaction history before others do, increasing the chances that their address will be copied later.

In one observed case, 13 poisoning transfers appeared within minutes after a legitimate USDT transaction, highlighting the intense competition among attackers.

Common Techniques Used in Address Poisoning

Several techniques are commonly used in address poisoning campaigns, including:

  • Dust transfers: Attackers send extremely small amounts of tokens or ETH to victims.
  • Spoofed token transfers: Transactions involving tokens designed to mimic legitimate assets.
  • Zero-value transfers: Transactions that record address activity without transferring actual value.

These transactions are often inexpensive to execute and can be sent in large volumes.

Why Address Poisoning Works Despite a Low Success Rate

At first glance, address poisoning may seem ineffective. Research suggests that the success rate for a single poisoning attempt on Ethereum is only around 0.01%. This means that only one in roughly 10,000 poisoning transactions leads to a user mistakenly sending funds to the attacker.

However, attackers rely on scale rather than precision. By sending thousands or even millions of poison transfers, attackers increase their chances of capturing occasional successful transactions. A single mistaken transfer involving a large amount of cryptocurrency can easily cover the costs of thousands of failed attempts.

Lower Transaction Costs Encourage More Attacks

Another factor contributing to the rise in poisoning attacks is the reduction in transaction costs on Ethereum. The Fusaka upgrade, activated on December 3, 2025, introduced improvements that significantly increased the network’s scalability and reduced transaction fees. While the upgrade benefited developers and users by making transactions cheaper, it also lowered the cost of sending poison transfers.

Following the upgrade, network activity increased noticeably.

In the 90 days after the Fusaka upgrade, Ethereum processed about 30% more transactions per day compared to the previous 90-day period. At the same time, the number of new addresses created each day increased by approximately 78%.

Dust transfer activity also surged significantly across major assets:

  • USDT dust transfers: increased from 4.2 million to 29.9 million (+612%)
  • USDC dust transfers: increased from 2.6 million to 14.9 million (+473%)
  • DAI dust transfers: increased from 142,405 to 811,029 (+470%)
  • ETH dust transfers: increased from 104.5 million to 169.7 million (+62%)

Dust transfers involving very small amounts – often less than $0.01 – rose sharply following the upgrade before stabilizing at levels higher than those seen before Fusaka. While not all dust transfers are malicious, analysts believe a significant portion of these transactions may be linked to poisoning campaigns.

Protecting Against Address Poisoning

Despite the sophistication of these attacks, security experts emphasize that the primary defense remains simple: always verify the destination address before sending funds. Several practices can help reduce the risk of falling victim to address poisoning.

Use recognizable address labels: Wallet users can assign name tags to frequently used addresses using services such as Etherscan or wallet address books. This makes legitimate addresses easier to identify.

Use ENS domains: Ethereum Name Service (ENS) domains can help simplify addresses and make them easier to recognize.

Enable address highlighting: Explorer tools such as Etherscan provide highlighting features that visually distinguish between known addresses and suspicious ones.

Pay attention to security alerts: Blockchain explorers may warn users when copying addresses associated with suspicious activity, including spoofed tokens or unusual transaction patterns.

Final Thoughts

Address poisoning attacks illustrate how even simple scams can become highly effective when combined with automation and scale. As blockchain networks grow and transaction costs decrease, attackers are able to launch increasingly large campaigns targeting unsuspecting users. For Ethereum users, the key defense remains vigilance. Carefully verifying the destination address before sending funds can prevent costly mistakes in an ecosystem where transactions are irreversible.

Meanwhile, blockchain explorers and wallet providers continue developing tools to detect and flag suspicious activity. These improvements aim to make it easier for users to identify potential scams and navigate transaction histories that may increasingly contain spam or malicious entries. As address poisoning campaigns continue to evolve, user awareness and improved interface design will likely play a crucial role in reducing their impact.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto ScamsEthereumEtherscan

Related Posts

Florida Man Loses $450,000 in Crypto Romance Scam as Authorities Recover Millions
Scams & Fraud

Florida Man Loses $450,000 in Crypto Romance Scam as Authorities Recover Millions

by Sathish Kumar Kaliraj
April 16, 2026

A Florida man who lost $450,000 in a crypto romance scam didn’t report the crime because he assumed the money...

Read moreDetails
Fake Ledger App Drains

Fake Ledger App Drains $9.5M from Apple App Store Users

April 15, 2026
Bitmine Reports $3.8 Billion Quarterly Net Loss Due to Unrealized ETH Decline

Bitmine Reports $3.8 Billion Quarterly Net Loss Due to Unrealized ETH Decline

April 15, 2026
ether.fi Commits $3 Billion ETH to ETHGas for Realtime Ethereum

ether.fi Commits $3 Billion ETH to ETHGas for Realtime Ethereum

April 15, 2026
Blockchain On-Chain Metrics: Ethereum, Bitcoin, Solana, BSC, Tron & Base Weekly Report (April 06 – 12, 2026)

Blockchain On-Chain Metrics: Ethereum, Bitcoin, Solana, BSC, Tron & Base Weekly Report (April 06 – 12, 2026)

April 13, 2026
G. Love Loses $424K Bitcoin in Fake App Scam

Philadelphia Musician G. Love Loses $424K in Bitcoin to Fake Ledger App on Apple App Store

April 12, 2026
Scams on Meta Platforms

State AGs Warn of Rising Investment Scams on Meta Platforms

April 10, 2026
Next Post
Eightco Holdings Secures $125M in New Institutional Funding from Bitmine, ARK Invest, and Payward

Eightco Holdings Secures $125M in New Institutional Funding from Bitmine, ARK Invest, and Payward

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • Jack Dorsey ‘s Block Reveals $2.2B in Bitcoin Holdings for Q1 2026
  • ZetaChain GatewayEVM Hack: $300K Loss from Team Wallets, Cross-Chain Transactions Paused
  • Saylor’s Strategy buys 3,273 BTC for $255 Million – Total Holdings Reach 818,334

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.