icon
icon
icon
icon
๐Ÿท๏ธ$300 Off
๐Ÿท๏ธ$300 Off

News /

Articles /

Bitcoin Address Poisoning Attacks Cost Users $1.8 Million in February

Coin WorldSunday, Apr 6, 2025 6:16 pm ET
1min read

Jameson Lopp, the chief security officer at Bitcoin (BTC) custody company Casa, has raised concerns about Bitcoin address poisoning attacks. These attacks are a form of social engineering scam where threat actors generate BTC addresses that closely resemble those in a victim's transaction history, aiming to deceive them into sending funds to the malicious address.

In his article published on February 6, Lopp detailed how these attacks work. He explained that the threat actors create addresses that match the first and last digits of addresses from the victim's transaction history. Lopp's analysis of the Bitcoin blockchain history revealed that the first such transactions appeared in block 797570 on July 7, 2023, with 36 transactions. After a period of inactivity, these transactions resurfaced in block 819455 on December 12, 2023, and continued intermittently until block 881172 on January 28, 2025. There was a two-month break before the attacks resumed.

Over an 18-month period, nearly 48,000 transactions matching the profile of potential address poisoning were identified. Lopp emphasized the importance of thoroughly checking addresses before sending funds and advocated for better wallet interfaces that fully display addresses to mitigate these risks.

Address poisoning scams and exploits have resulted in significant financial losses. According to cybersecurity firm Cyvers, over $1.2 million was stolen through address poisoning attacks in March 2025. The firm's CEO, Deddy Lavid, reported that these attacks cost users $1.8 million in February. Blockchain security firm PeckShield estimated the total amount lost to crypto hacks in the first quarter of 2025 to be over $1.6 billion, with the Bybit hack in February accounting for the majority of the stolen funds, totaling $1.4 billion.

Cybersecurity experts have linked these attacks to North Korean state-affiliated hackers, who employ complex and evolving social engineering schemes to steal cryptocurrencies and sensitive data. Common tactics used by the Lazarus Group include fraudulent job offers, fake zoom meetings with venture capitalists, and phishing scams on social media.

Comments

Add a public comment...
Post
User avatar and name identifying the post author
Cannannaca
04/06
Bitcoin address poisoning is like phishing 2.0โ€”scammers evolve, we adapt. Better wallets = better defense.
0
Reply
User avatar and name identifying the post author
Touma_Kazusa
04/06
Address poisoning attacks are sneaky AF.
0
Reply
User avatar and name identifying the post author
Throwaway907472
04/06
@Touma_Kazusa Fair enough
0
Reply
User avatar and name identifying the post author
Senyorty12
04/06
Social engineering's the new phishing. Be careful what links you click and who you DM. Keep your bags safe.
0
Reply
User avatar and name identifying the post author
Elibroftw
04/06
I'm holding $BTC and $ETH, but diversifying into $TSLA. Crypto's wild, but tech stocks offer some stability.
0
Reply
User avatar and name identifying the post author
Opening-Finger-4294
04/06
North Korean hackers always stay one step ahead. We need better wallet security, like YOLO-level encryption. ๐Ÿš€
0
Reply
User avatar and name identifying the post author
Very_Guilty_Lawyer
04/06
@Opening-Finger-4294 ๐Ÿ˜‚
0
Reply
User avatar and name identifying the post author
chilly-beans
04/06
Bitcoin address poisoning: where a slight tweak leads to a multimillion-dollar mistake
0
Reply
User avatar and name identifying the post author
Ironman650
04/06
Always check those BTC addresses, don't be a noob.
0
Reply
User avatar and name identifying the post author
Ok-Razzmatazz-2645
04/06
PeckShield's numbers are mind-blowing, $1.6B gone poof.
0
Reply
User avatar and name identifying the post author
throwaway0203949
04/06
@Ok-Razzmatazz-2645 ๐Ÿ‘
0
Reply
User avatar and name identifying the post author
rbrar33
04/06
Bybit hack was a wild ride ๐Ÿคฏ
0
Reply
User avatar and name identifying the post author
makeammends
04/06
North Korean hackers always stay one step ahead.
0
Reply
User avatar and name identifying the post author
Evelyn Gabriel
04/06

๐ถ๐‘Ž๐‘ก๐’‰๐‘’๐‘Ÿ๐‘–๐‘›๐‘’ ๐ธ. ๐‘…๐‘ข๐‘ ๐‘ ๐‘’๐‘™๐‘™, ๐‘ก๐‘Ž๐‘˜๐‘’๐‘  ๐‘Ž ๐‘ก๐’‰๐‘œ๐‘ข๐‘”๐’‰๐‘ก๐‘“๐‘ข๐‘™, ๐‘๐‘’๐‘Ÿ๐‘ ๐‘œ๐‘›๐‘Ž๐‘™๐‘–๐‘ง๐‘’๐‘‘ ๐‘Ž๐‘๐‘๐‘Ÿ๐‘œ๐‘Ž๐‘๐’‰ ๐‘ก๐‘œ ๐‘“๐‘–๐‘›๐‘Ž๐‘›๐‘๐‘–๐‘Ž๐‘™ ๐‘๐‘™๐‘Ž๐‘›๐‘›๐‘–๐‘›๐‘” ๐‘Ž๐‘›๐‘‘ ๐‘–๐‘›๐‘ฃ๐‘’๐‘ ๐‘ก๐‘š๐‘’๐‘›๐‘ก ๐‘ ๐‘ก๐‘Ÿ๐‘Ž๐‘ก๐‘’๐‘”๐‘ฆ, ๐‘’๐‘›๐‘ ๐‘ข๐‘Ÿ๐‘–๐‘›๐‘” ๐‘ก๐’‰๐‘Ž๐‘ก ๐‘’๐‘Ž๐‘๐’‰ ๐‘Ÿ๐‘’๐‘๐‘œ๐‘š๐‘š๐‘’๐‘›๐‘‘๐‘Ž๐‘ก๐‘–๐‘œ๐‘› ๐‘Ž๐‘™๐‘–๐‘”๐‘›๐‘  ๐‘ค๐‘–๐‘ก๐’‰ ๐‘ก๐’‰๐‘’ ๐‘๐‘™๐‘–๐‘’๐‘›๐‘ก'๐‘  ๐‘”๐‘œ๐‘Ž๐‘™๐‘ , ๐‘Ÿ๐‘–๐‘ ๐‘˜ ๐‘ก๐‘œ๐‘™๐‘’๐‘Ÿ๐‘Ž๐‘›๐‘๐‘’, ๐‘Ž๐‘›๐‘‘ ๐‘™๐‘œ๐‘›๐‘”-๐‘ก๐‘’๐‘Ÿ๐‘š ๐‘ฃ๐‘–๐‘ ๐‘–๐‘œ๐‘›. ๐บ๐‘’๐‘ก ๐‘ก๐’‰๐‘’ ๐‘’๐‘‘๐‘”๐‘’ ๐‘–๐‘› ๐‘๐‘Ÿ๐‘ฆ๐‘๐‘ก๐‘œ ๐‘ก๐‘Ÿ๐‘Ž๐‘‘๐‘–๐‘›๐‘” ๐‘๐’‰๐‘Ž๐‘ก ๐Ÿ‘ฅ๐น๐‘Ž๐‘๐‘’๐‘๐‘œ๐‘œ๐‘˜ ๐‘๐‘Ž๐‘”๐‘’, ๐‚๐š๐ญ๐ก๐ž๐ซ๐ข๐ง๐ž ๐„. ๐‘๐ฎ๐ฌ๐ฌ๐ž๐ฅ๐ฅ ๐‘‡๐‘Ÿ๐‘Ž๐‘‘๐‘–๐‘›๐‘”~๐‘ฃ๐‘–๐‘’๐‘ค.
๐‘Š๐’‰๐‘Ž๐‘ก ๐‘ ๐‘’๐‘ก๐‘  ๐’‰๐‘’๐‘Ÿ ๐‘Ž๐‘๐‘Ž๐‘Ÿ๐‘ก ๐‘–๐‘  ๐‘›๐‘œ๐‘ก ๐‘œ๐‘›๐‘™๐‘ฆ ๐‘Ž ๐‘ ๐‘ก๐‘Ÿ๐‘œ๐‘›๐‘” ๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘˜ ๐‘Ÿ๐‘’๐‘๐‘œ๐‘Ÿ๐‘‘ ๐‘œ๐‘“ ๐‘ ๐‘œ๐‘ข๐‘›๐‘‘ ๐‘“๐‘–๐‘›๐‘Ž๐‘›๐‘๐‘–๐‘Ž๐‘™ ๐‘”๐‘ข๐‘–๐‘‘๐‘Ž๐‘›๐‘๐‘’ ๐‘๐‘ข๐‘ก ๐‘Ž๐‘™๐‘ ๐‘œ ๐‘ก๐’‰๐‘’ ๐‘Ž๐‘๐‘–๐‘™๐‘–๐‘ก๐‘ฆ ๐‘ก๐‘œ ๐‘๐‘œ๐‘š๐‘š๐‘ข๐‘›๐‘–๐‘๐‘Ž๐‘ก๐‘’ ๐‘๐‘œ๐‘š๐‘๐‘™๐‘’๐‘ฅ ๐‘“๐‘–๐‘›๐‘Ž๐‘›๐‘๐‘–๐‘Ž๐‘™ ๐‘๐‘œ๐‘›๐‘๐‘’๐‘๐‘ก๐‘  ๐‘–๐‘› ๐‘Ž ๐‘๐‘™๐‘’๐‘Ž๐‘Ÿ, ๐‘Ž๐‘๐‘๐‘’๐‘ ๐‘ ๐‘–๐‘๐‘™๐‘’ ๐‘ค๐‘Ž๐‘ฆ. ๐Ÿ†™

0
Reply
User avatar and name identifying the post author
AP9384629344432
04/07
@Evelyn Gabriel ๐Ÿ‘Œ
0
Reply
User avatar and name identifying the post author
Traglc
04/06
Address poisoning attacks are like whack-a-mole. New defenses pop up, but the threats adapt. What's the next move?
0
Reply
User avatar and name identifying the post author
CopyGrand7281
04/07
@Traglc True, threats evolve. Next move? Stay vigilant.
0
Reply
User avatar and name identifying the post author
Oleksandr_G
04/06
OMG!the Peak Seeker algorithm successfully identified both trough and apex inflection points in AMZN equity's price action, while my execution latency resulted in material opportunity cost.
0
Reply
Disclaimer: The news articles available on this platform are generated in whole or in part by artificial intelligence and may not have been reviewed or fact checked by human editors. While we make reasonable efforts to ensure the quality and accuracy of the content, we make no representations or warranties, express or implied, as to the truthfulness, reliability, completeness, or timeliness of any information provided. It is your sole responsibility to independently verify any facts, statements, or claims prior to acting upon them. Ainvest Fintech Inc expressly disclaims all liability for any loss, damage, or harm arising from the use of or reliance on AI-generated content, including but not limited to direct, indirect, incidental, or consequential damages.
You Can Understand News Better with AI.
Whats the News impact on stock market?
Its impact is
fork
logo
AInvest
Aime Coplilot
Invest Smarter With AI Power.
Open App