Key takeaways
-
Fix the behavior of poisoning exploits, not private keys. Attackers manipulate transaction history and rely on users to mistakenly copy a similar malicious address.
-
Cases such as the loss of 50 million USDT in 2025 and the leak of 3.5 wBTC in February 2026 demonstrate how simple interface deception can lead to massive financial damage.
-
Copy buttons, visible transaction history, and unfiltered dust transfers make poisoned addresses appear trustworthy in wallet interfaces.
-
Since blockchains are permissionless, anyone can send tokens to any address. Wallets typically display all transactions, including spam, which attackers use to plant malicious entries.
Most cryptocurrency users believe that their funds remain safe as long as their private keys are protected. However, as a growing number of scams show, this is not always the case. Fraudsters use an insidious anti-poisoning tactic to steal assets without ever accessing the victim’s private key.
In February 2026, a phishing scheme targeted a Phantom Chat feature. Using an address poisoning tactic, the attackers managed to drain approximately 3.5 wrapped Bitcoin (wBTC), worth over $264,000.
In 2025, a victim lost $50 million in USDt (USDT) from Tether after copying a poisoned address. Such incidents have highlighted how poor interface design and daily user habits can lead to massive losses.

Prominent crypto figures, like Binance co-founder Changpeng “CZ” Zhao, have publicly urged wallets to add stricter safeguards following poisoning incidents.
This article explains how address poisoning scams exploit user behavior rather than private key theft. It details how attackers manipulate transaction history, why the tactic succeeds on transparent blockchains, and what practical steps users and wallet developers can take to reduce the risk.
What does poisoning at the address actually entail?
Unlike traditional hacks that target private keys or exploit code flaws, address poisoning manipulates a user’s transaction history to trick them into sending funds to the wrong address.
Usually, the attack proceeds as follows:
-
Fraudsters identify high-value wallets via public blockchain data.
-
They create a wallet address that closely resembles the one the victim often uses. For example, the attacker can match the first and last character.
-
They send a small or zero value transaction to the victim’s wallet from this fake address.
-
They rely on the victim to later copy the attacker’s address from their list of recent transactions.
-
They collect the funds when the victim accidentally pastes them and sends them to the malicious address.
The victim’s wallet and private keys remain intact, and the blockchain cryptography remains intact. The scam thrives solely on human error and reliance on familiar patterns.
Did you know? Poisoning scams have increased alongside the rise of layer 2 Ethereum networks, where lower fees make it cheaper for attackers to send mass dust transactions to thousands of wallets at once.
How attackers create deceptive addresses
Cryptographic addresses are long hexadecimal strings, often 42 characters long on Ethereum compatible chains. Wallets usually only display a truncated version, such as “0x85c…4b7”, which fraudsters take advantage of. Fake addresses have identical beginnings and endings, while the middle part differs.
Legitimate address (example format):
0x742d35Cc6634C0532925a3b844Bc454e4438f44e
Poisoned lookalike address:
0x742d35Cc6634C0532925a3b844Bc454e4438f4Ae
Scammers use personalized address generators to create these almost identical strings. The fake appears in the victim’s transaction history through the dust transfer. For users, this seems reliable at first glance, especially since they rarely check the full address string.
Did you know? Some blockchain explorers now automatically label suspicious transactions, helping users detect potential poisoning attempts before interacting with their transaction history.
Why this scam is so successful
There are several interrelated factors that make the fight against poisoning extremely effective:
-
Human limits in managing long chains: Since the addresses are not user-friendly, users rely on quick visual checks at the beginning and end. Scammers are exploiting this trend.
-
Convenient but risky wallet features: Many wallets offer easy copy buttons next to recent transactions. Although this feature is useful for legitimate use, it becomes risky when spam entries infiltrate. Investigators such as ZachXBT have reported cases where victims copied poison addresses directly from their wallet UI.

3. No need for technical exploits: Since blockchains are public and permissionless, anyone can send tokens to any address. Wallets generally display all incoming transactions, including spam, and users tend to rely on their own history.
The vulnerability lies in behavior and UX, not encryption or key security.
Why keys don’t protect enough
Private keys control authorization, meaning they ensure that only you can sign transactions. However, they cannot verify whether the destination address is correct. The key features of blockchain – permissionless access, transaction irreversibility and trust minimization – mean that malicious transactions are permanently recorded.
In these scams, the user voluntarily signs the transfer. The system works exactly as intended and the fault lies in human judgment.
The underlying psychological and design issues involve:
-
Common habits: People tend to send funds repeatedly to the same addresses, so they copy their transaction history instead of re-entering addresses.
-
Cognitive tension: Transactions involve multiple steps, such as addresses, fees, networks, and approvals. Many users find it tedious to review each character.
-
Truncated displays: Wallet user interfaces hide most addresses, resulting in partial verifications.
Did you know? In some cases, attackers automate the generation of similar addresses using custom GPU-based tools, allowing them to produce thousands of nearly identical wallet addresses in minutes.
Practical ways to stay safer
Even though address poisoning exploits user behavior rather than technical vulnerabilities, small changes in transaction habits can significantly reduce the risk. Understanding a few practical security measures can help crypto users avoid costly mistakes without requiring advanced technical knowledge.
For users
Simple checking habits and transaction discipline can significantly reduce your chances of falling victim to poisoning scams.
-
Create and use a verified address book or whitelist for frequent recipients.
-
Check the full address. Use a checker or compare it character by character before making payments.
-
Never copy addresses from recent transaction history. Instead, re-enter addresses or use bookmarks.
-
Ignore or report small, unsolicited transfers as potential poisoning attempts.
For wallet developers
Thoughtful interface design and built-in protections can minimize user errors and make address poisoning attacks much less effective.
-
Filtering or hiding low-value spam transactions
-
Similarity detection for recipient addresses
-
Pre-signing simulations and risk warnings
-
Built-in poison address checks via chain requests or shared blacklists.
Cointelegraph maintains complete editorial independence. The selection, ordering and publication of Reports and Magazine content is not influenced by advertisers, partners or commercial relationships.


