Back

Crypto Investor Loses Over $12 Million in Ethereum to ‘Address Poisoning’ Scam

31 January 2026 13:35 UTC
  • A crypto investor lost $12.4 million in Ethereum to an address poisoning attack after mistakenly sending funds to a fraudulent wallet.
  • Specter reported that the attacker "dusted" the victim for two months with a small transaction to plant the fake address in recent activity.
  • Scam Sniffer and other security watchers say the incident highlights the need to stop using transaction history for repeat payments.
Promo

A cryptocurrency investor has lost 4,556 Ethereum, valued at approximately $12.4 million, after falling victim to a sophisticated “address poisoning” attack.

Specter, a pseudonymous blockchain analyst, reported that the theft occurred roughly 32 hours after the attacker “dusted” the victim’s wallet with a nominal transaction.

How a Fake Look-Alike Address Cost an Ethereum Holder Millions

According to Specter’s on-chain analysis, the attacker spent two months monitoring the victim’s transaction activity. During this period, the hacker specifically identified a deposit address used for OTC settlements.

Sponsored
Sponsored

The attacker employed vanity address generation software to engineer a look-alike wallet. This fraudulent address shared the exact same starting and ending alphanumeric characters as the victim’s intended destination.

Address poisoning relies on the user’s tendency to check only the first and last few characters of a long hexadecimal string. In this instance, the fraudulent address and the legitimate OTC address appeared identical at a glance.

The attacker first initiated a minor transaction to the victim’s wallet, a tactic designed to populate the user’s activity log. This strategic move ensured the corrupted address appeared prominently at the top of the “recent transactions” history.

Relying on this compromised list, the victim inadvertently copied the poisoned address rather than the legitimate source when attempting to move the $12.4 million.

The Address Poisoning Attack.
The Address Poisoning Attack. Source: Scam Sniffer

This incident marks the second major eight-figure theft via this specific vector in recent weeks. Last month, a separate crypto trader lost approximately $50 million in a nearly identical scheme.

Industry stakeholders argue that these attacks are proliferating because wallet interfaces often truncate addresses to save screen space. This design choice effectively hides the middle characters where the discrepancies lie.

Meanwhile, this breach raises serious questions regarding verification protocols among institutional-grade investors.

While retail traders often rely on copy-pasting addresses, entities moving millions typically employ strict whitelisting procedures and test transactions.

Consequently, blockchain security firm Scam Sniffer has urged investors to abandon reliance on transaction history for recurring crypto payments. Instead, they recommend utilizing verified, hard-coded address books to mitigate the risk of interface spoofing.

Disclaimer

In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and Conditions, Privacy Policy, and Disclaimers have been updated.

Sponsored
Sponsored