Everyone who has done on-chain transfers knows that the first step is usually like this: send over 5U, 10U to test. Make sure the address is correct, the chain is right, and everything is OK before sending real funds.



This trick was originally meant to protect oneself. But on a completely transparent blockchain, it has instead become a signal gun saying "I'm coming."

Robots scanning for large wallet addresses, once they detect a test transfer, can immediately infer: large funds are on the way.

Next comes the sneaky move. Attackers quickly generate an address that looks almost identical—completely matching the first and last characters of your target address. Then they immediately send a tiny junk transaction (industry called "dust transaction") to you. Your wallet transaction history instantly shows a twin address.

When you prepare to copy the address to transfer a large amount, if you're not careful, you might copy that fake one. Just one confirmation, and millions of USDT could flow directly into the hacker’s account. It’s completely untraceable.

This kind of poisoning attack is not a new trick. A major exchange has fallen victim to it. So next time you make a transfer, be extra cautious—especially for large transactions, always verify the address repeatedly. Don’t just go with what looks familiar.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)