
O envenenamento de endereço é um golpe aparentemente simples, que, no entanto, pode afetar até mesmo usuários experientes de criptografia. Chainalysis descobriu até 82 mil carteiras vinculadas a uma campanha direcionada a usuários com saldos elevados.
O envenenamento por endereço continua sendo um dos ataques mais comuns, porém eficientes. As blockchains públicas revelam carteiras com saldos trac , e os bots as atacam, na esperança de misturar ataques tecnológicos com um erro humano. Os endereços envenenados foram criados num curto espaço de tempo, mas as perdas pessoais acontecem várias vezes, uma vez que a vítima se torna novamente ativa na rede. No último dia, foi registrada uma perda de US$ 57 mil devido a um endereço envenenado copiado do histórico de transações.
🚨💔 Há 42 minutos, uma vítima perdeu US$ 57.000 ao copiar o endereço errado de um histórico de transações contaminado.
Nota: Nunca copie endereços do histórico de transações. 🚫📋 pic.twitter.com/ypjn8iMOcO
— SOLUÇÃO DE GUARDA DE NÓ. (@NodeGuard_Pro) 23 de outubro de 2024
Chainalysis has tracked down 82K wallets tied to attempts at poisoning by posting fake zero-value tokens. The address poisoning scam is also similar to the zero-value token attack, though with the added generation of a confusing address. Tools for poisoned address attacks are also distributed on darknet markets.
The attack depends on users not verifying their addresses closely enough, by issuing similar digits at the beginning and end of the address. The attack hinges on crypto user habits of only checking the first and last four digits of an address.
Some of the most common fake tokens or zero-sum transactions involve USDT, TRX, or MATIC, or a faked version of the token. A part of the transactions also copy the amount previously used, creating a similar-looking wallet entry. Others send entirely new tokens as an airdrop. The wallet itself is not hacked in this type of attack, and there is no risk to the funds when receiving seeding transactions.
Poisoned address scams may target even small balances, but this type of attack was behind one of the biggest losses in 2024. Poisoned addresses managed to drain $68M Wrapped BTC (WBTC) from a single wallet.
In this case, the exploiter later returned the funds, after earning $3M due to the appreciation of BTC at that time. The victim contacted the exploiter through Ethereum micro-transactions with messages attached, leading to a full refund three days later.
The large-scale heist helped Chainalysis discover more poisoned addresses. A total of eight wallets were responsible for launching the fake addresses during a campaign-like, concentrated event.
Chainalysis discovered a total of 82,031 spoofed addresses, which resemble legitimate counterparties. The newly created poisoned addresses were close to 1% of all new Ethereum wallets launched in a similar time period.
The network of poisoned addresses managed to scam more experienced users with a higher wallet balance. A total of 2,774 wallets sent funds to the faked addresses, diverting a total of $69.72M. The wallets contained up to $338K, though most held smaller sums of $1,000. What was also common is that the victims were usually active traders and Ethereum users.
The wide network of poisoned addresses had a relatively small success. Of the wallets targeted, 756 caught the scam with a test transaction or a smaller sum under $100. The transactions sometimes even spoofed the victim’s own wallets. In that case, owning a human-readable ENS address could mitigate the risk.
Similar campaigns have ran on Binance Smart Chain, with the Binance team now flagging zero-value transactions and spoof addresses. Reports of Toncoin (TON) poisoned addresses have also surfaced, with 0 TON transactions as the bait.
While the biggest $68M haul was not laundered efficiently, smaller sums could be disguised and liquidated. Scammers used DeFi protocols, then centralized exchanges to both clear their tracks and swap the initial funds.
Some of the exchanges involved in the scam were no-KYC markets in Eastern Europe, with less stringent regulations on the origin of funds. The transfers to an exchange were the last leg of the destination, after mixing the funds through DeFi protocols and decentralized markets.
Campaigns of seeding wallets are usually short, but can have outsized earnings. Block explorers have started flagging the fake transactions, so users can check their history before sending funds.