Celebrating
Web3
Excellence

Nearly $50M in USDT Stolen After Address Poisoning Scam Targets Crypto Trader Wallet

Coingapestaff
2 hours ago
Coingapestaff

Coingapestaff

Journalist
CoinGape comprises an experienced team of native content writers and editors working round the clock to cover news globally and present news as a fact rather than an opinion. CoinGape writers and reporters contributed to this article.
Read full bio
Why Trust CoinGape
CoinGape has covered the cryptocurrency industry since 2017, aiming to provide informative insights to our readers. Our journal analysts bring years of experience in market analysis and blockchain technology to ensure factual accuracy and balanced reporting. By following our Editorial Policy, our writers verify every source, fact-check each story, rely on reputable sources, and attribute quotes and media correctly. We also follow a rigorous Review Methodology when evaluating exchanges and tools. From emerging blockchain projects and coin launches to industry events and technical developments, we cover all facets of the digital asset space with unwavering commitment to timely, relevant information.
Address Poisoning Scam

Highlights

  • Address poisoning scam redirected $49.9M USDT after a routine test transfer.
  • Spoofed wallet entries in transaction history triggered the mistaken transfer.
  • Stolen funds were swapped to DAI, converted to ETH, then sent to Tornado Cash

A cryptocurrency trader has lost nearly $50 million in USDT after falling victim to an address poisoning scam, a technique that exploits transaction history rather than smart contract flaws. Blockchain security firms said the incident highlights how routine wallet habits can expose users to large-scale losses.

In an X post, on-chain analytics firm Lookonchain reported that the victim transferred 49,999,950 USDT to an attacker-controlled wallet on Dec. 20. The funds had just been withdrawn from Binance and were intended for the trader’s own address. Instead, they were redirected to a visually similar address created by the attacker.

Address Poisoning Scam Exploits Spoofed Addresses

The incident began with a test transaction. The trader sent a 50 USDT test transaction to confirm the destination address. Shortly after, an automated script generated a spoofed wallet designed to resemble the legitimate address.This step marked the start of the address poisoning scam. 

Address Poisoning Scam
Source: X

The fraudulent address shared the same opening and closing characters as the intended wallet, with differences confined to the center of the string. Many wallet interfaces shorten these middle characters, reducing visibility during routine checks.

By exploiting this display behavior, the attacker sent small transactions from the lookalike address to the victim’s wallet. This inserted the fake address into the transaction history, causing it to appear legitimate during later transfers.

When the trader later copied an address from their history to complete the full transfer, the lookalike address was likely selected by mistake. Etherscan data shows the test payment was sent at 3:06 UTC. The erroneous $50 million transaction followed roughly 26 minutes later, at 3:32 UTC.

Stolen Funds Moved Through DAI, ETH, and Tornado Cash

Blockchain security company SlowMist reported that the attacker moved quickly in order to minimize recovery risk. In 30 minutes, the $50 USDT was exchanged for DAI by via MetaMask Swap. The decision was strategic because Tether can freeze USDT if it’s associated with illicit activity, but DAI doesn’t come with any centralized freezes.

The DAI was then converted by the attacker to approximately 16,690 ETH. Approximately 16,680 ETH was deposited into Tornado Cash. The mixer was an attempt to obfuscate the transaction trails, the usual step subsequent to an address poisoning scam.

Upon executing the transaction, the victim sent an on-chain message to the attacker by a $1 million white-hat bounty. The offer demanded the repayment of 98% of the stolen money. There has been no public acknowledgement or reply. The security companies remain active monitoring the address poisoning scam.

According to Chainalysis, the incident contributes to a year of rising crypto thefts. Losses in crypo hacks 2025 exceeded $3.4 billion, more than the previous year. One of those, a February breach of Bybit by North Korea-linked actors, totaled about $1.4 billion and was the largest crypto theft ever.

Advertisement
coingape google news

Why Trust CoinGape

CoinGape has covered the cryptocurrency industry since 2017, aiming to provide informative insights Read more… to our readers. Our journal analysts bring years of experience in market analysis and blockchain technology to ensure factual accuracy and balanced reporting. By following our Editorial Policy, our writers verify every source, fact-check each story, rely on reputable sources, and attribute quotes and media correctly. We also follow a rigorous Review Methodology when evaluating exchanges and tools. From emerging blockchain projects and coin launches to industry events and technical developments, we cover all facets of the digital asset space with unwavering commitment to timely, relevant information.

Newsletter
Your crypto brief.
Delivered every day.
  • Insights that move markets
  • 100,000 active subscribers
By signing-up you agree to our Terms and Conditions and Privacy Policy.
About Author
About Author
CoinGape comprises an experienced team of native content writers and editors working round the clock to cover news globally and present news as a fact rather than an opinion. CoinGape writers and reporters contributed to this article.
Investment disclaimer: The content reflects the author’s personal views and current market conditions. Please conduct your own research before investing in cryptocurrencies, as neither the author nor the publication is responsible for any financial losses.
Ad Disclosure: This site may feature sponsored content and affiliate links. All advertisements are clearly labeled, and ad partners have no influence over our editorial content.
Celebrating
Web3
Excellence
Cross