{"id":87204,"date":"2025-12-21T08:00:44","date_gmt":"2025-12-21T08:00:44","guid":{"rendered":"https:\/\/freakcryptos.com\/index.php\/2025\/12\/21\/nearly-50m-in-usdt-stolen-after-address-poisoning-scam\/"},"modified":"2025-12-21T08:00:45","modified_gmt":"2025-12-21T08:00:45","slug":"nearly-50m-in-usdt-stolen-after-address-poisoning-scam","status":"publish","type":"post","link":"https:\/\/freakcryptos.com\/index.php\/2025\/12\/21\/nearly-50m-in-usdt-stolen-after-address-poisoning-scam\/","title":{"rendered":"Nearly $50M in USDT Stolen After Address Poisoning Scam"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div xmlns:default=\"http:\/\/www.w3.org\/2000\/svg\">\n<p><span style=\"font-weight: 400;\">A cryptocurrency dealer has misplaced almost $50 million in USDT after falling sufferer to an deal with poisoning rip-off, a way that exploits transaction historical past moderately than sensible contract flaws. Blockchain safety companies mentioned the incident highlights how routine pockets habits can expose customers to large-scale losses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an <a href=\"https:\/\/x.com\/lookonchain\/status\/2002201227959107793\" target=\"_blank\" rel=\"noopener nofollow\">X post<\/a>, on-chain analytics agency Lookonchain reported that the sufferer transferred 49,999,950 USDT to an attacker-controlled pockets on Dec. 20. The funds had simply been withdrawn from Binance and had been supposed for the dealer\u2019s personal deal with. Instead, they had been redirected to a visually related deal with created by the attacker.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Address Poisoning Scam Exploits Spoofed Addresses<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The incident started with a check transaction. The dealer despatched a 50 USDT check transaction to substantiate the vacation spot deal with. Shortly after, an <a href=\"https:\/\/coingape.com\/coinmarketcap-hack-fixed-scammers-targeted-users-via-fake-wallet-verification\/\">automated script generated a spoofed wallet<\/a> designed to resemble the reliable deal with.This step marked the beginning of the deal with poisoning rip-off.\u00a0<\/span><\/p>\n<figure id=\"attachment_277994\" aria-describedby=\"caption-attachment-277994\" style=\"width: 2244px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-277994 size-full\" alt=\"Address Poisoning Scam \" width=\"2244\" height=\"1194\" srcset=\"https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain.jpg 2244w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-300x160.jpg 300w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-1224x651.jpg 1224w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-768x409.jpg 768w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-1536x817.jpg 1536w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-2048x1090.jpg 2048w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-150x80.jpg 150w\" data-lazy-sizes=\"(max-width: 2244px) 100vw, 2244px\" src=\"https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain.jpg\"\/><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-277994 size-full\" src=\"https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain.jpg\" alt=\"Address Poisoning Scam \" width=\"2244\" height=\"1194\" srcset=\"https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain.jpg 2244w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-300x160.jpg 300w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-1224x651.jpg 1224w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-768x409.jpg 768w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-1536x817.jpg 1536w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-2048x1090.jpg 2048w, https:\/\/coingape.com\/wp-content\/uploads\/2025\/12\/Lookonchain-150x80.jpg 150w\" sizes=\"auto, (max-width: 2244px) 100vw, 2244px\"\/><figcaption id=\"caption-attachment-277994\" class=\"wp-caption-text\">Source: X<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The fraudulent deal with shared the identical opening and shutting characters because the supposed pockets, with variations confined to the middle of the string. Many pockets interfaces shorten these center characters, decreasing visibility throughout routine checks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By exploiting this show conduct, the attacker despatched small transactions from the lookalike deal with to the sufferer\u2019s pockets. This inserted the faux deal with into the transaction historical past, inflicting it to seem reliable throughout later transfers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When the dealer later copied an deal with from their historical past to finish the total switch, the lookalike deal with was possible chosen by mistake. Etherscan information reveals the check cost was despatched at 3:06 UTC. The misguided $50 million transaction adopted roughly 26 minutes later, at 3:32 UTC.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Stolen Funds Moved Through DAI, ETH, and Tornado Cash<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Blockchain safety firm SlowMist reported that the attacker moved rapidly in order to reduce restoration threat. In half-hour, the <a href=\"https:\/\/x.com\/SlowMist_Team\/status\/2002201415440347227\" target=\"_blank\" rel=\"noopener nofollow\">$50 USDT was exchanged for DAI<\/a> by by way of MetaMask Swap. The resolution was strategic as a result of Tether can freeze USDT if it\u2019s related to illicit exercise, however DAI doesn\u2019t include any centralized\u2002freezes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DAI was then transformed by the attacker to roughly 16,690 ETH. Approximately 16,680 ETH was deposited into Tornado Cash. The mixer was an try to obfuscate the transaction trails, the standard step subsequent\u2002to an deal with poisoning rip-off.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upon executing the transaction, the sufferer despatched an on-chain message to the attacker by a $1 million white-hat bounty. The supply demanded the reimbursement of 98%\u2002of the stolen cash. There has been no public acknowledgement or reply. The safety firms stay lively monitoring the deal with poisoning rip-off.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Chainalysis, the incident contributes to a 12 months of rising crypto thefts. Losses in <a href=\"https:\/\/coingape.com\/crypto-hacks-2025-north-korean-hackers-steal-over-2b-in-eth-and-sol-this-year\/\">crypo hacks 2025<\/a> exceeded $3.4 billion, extra\u2002than the earlier 12 months. One of these, a February breach of Bybit by North Korea-linked actors, totaled about $1.4 billion and was the most important crypto theft ever.<\/span><\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/coingape.com\/nearly-50m-in-usdt-stolen-after-address-poisoning-scam\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cryptocurrency dealer has misplaced almost $50 million in USDT after falling sufferer to an deal with poisoning rip-off, a way that exploits transaction historical past moderately than sensible contract flaws. Blockchain safety companies mentioned the incident highlights how routine pockets habits can expose customers to large-scale losses. In an X post, on-chain analytics agency [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":87206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[3906,2084,6481,2508,1474,74],"class_list":{"0":"post-87204","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-altcoin","8":"tag-50m","9":"tag-address","10":"tag-poisoning","11":"tag-scam","12":"tag-stolen","13":"tag-usdt"},"_links":{"self":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/comments?post=87204"}],"version-history":[{"count":1,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87204\/revisions"}],"predecessor-version":[{"id":87205,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87204\/revisions\/87205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media\/87206"}],"wp:attachment":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media?parent=87204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/categories?post=87204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/tags?post=87204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}