Jason Scharfman’s Post

View profile for Jason Scharfman

Chief Compliance Officer | Cryptocurrency Compliance | FinTech | BSA/AML | Digital Asset Licensing (MSB / MTL / NYDFS) | Blockchain | Compliance Lead | Regulatory Risk Management (SEC, CFTC ) | Operational Due Diligence

$700K USDT stolen in address poisoning scam ☠️ - An Ethereum user fell victim to an address poisoning scam on Sunday, resulting in the loss of nearly $700,000 worth of the USDT stablecoin. Experts warn this rising form of scam is easy to fall victim to if users aren’t militant in fully checking the address that they’re sending funds to. What is address poisoning? - For address poisoning to work, malicious actors create an address that looks strikingly similar to an address that the victim has interacted with recently. The attacker will then send a small amount of tokens to the victim, with the goal of deceiving them into thinking the attacker’s address is the one they just interacted with. “Let's say your deposit address is 0x11223344556677889900. On your wallet it will look like: 0x1122...9900,” 0xToolman, pseudonymous on-chain sleuth at Bubblemaps, told Decrypt. “Scammers then create an address with the public key 0x1122aaaaaaaaaaaaaa9900. Although it's different, it still looks like 0x1122...9900 in your wallet or [on] Etherscan, making you think it's the right address, while it's belonging to the scammer.” On Sunday, a malicious attacker sent a transaction of 0 USDT from a wallet that looked almost identical to a Binance wallet that the victim had sent a test transaction of 10 USDT to, just seconds prior. “The victim likely copied what appeared to be a legitimate address from their transaction history, trusting it because they had just successfully completed a test transfer moments before,” a spokesperson for security firm PeckShield told Decrypt. Scammers use specialized software to generate thousands of wallet addresses that match commonly used deposit addresses, in this case a Binance wallet, PeckShield added. “It’s all automated. They use a spray-and-pray tactic, blasting out thousands of fake transactions,” Hakan Unal, Senior Blockchain Scientist at security firm Cyvers, explained. “Even if just 0.1% fall for it, hitting one high-value wallet makes it worth it. Super low effort, high reward.” This is what led to the victim sending 699,990 USDT to the attacker. Soon after receiving the funds, blockchain investigation firm AMLBot told Decrypt, the scammer swapped the USDT to DAI to prevent Tether from freezing the funds. As a decentralized stablecoin, DAI cannot freeze funds connected to malicious activity, AMLBot said, like Tether can with USDT. It appears the scammer has since passed the funds through multiple wallets to hide their tracks. Address poisoning scams are on the rise, Cyvers warned Decrypt. Last year, one crypto trader lost over $70 million due to an address poisoning scam, in what Cyvers believed was the largest of its type. More recently, on Friday, a victim lost $467,000 worth of DAI after falling for the scam. https://lnkd.in/eTXS_SgA

Maria Abello Martinez

👩🏽💻 100% Remote | Digital content creation and production | 📝 Avid translator | ENG-SPA | Docente

10h

Is there a way to fully verify the address? How can you prevent this?

Like
Reply
Thomas Ndege

KYC Analyst | Blockchain & Crypto Compliance | AML & Financial Crime Analyst | EDD | Fraud Prevention | Transaction Monitoring | Risk OPS

10h

Interesting

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics