Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Desperate victim lost 50 million USDT due to address poisoning scam
A tragic incident from last December shows how quickly huge amounts of cryptocurrency can disappear due to a simple mistake. One trader found himself in a desperate situation after losing nearly 50 million USDT in an advanced attack that used not the latest technology, but human nature’s tendency to rely on browser and wallet history.
How the attacker set a trap for the trader
It all started innocently. The trader wanted to transfer his assets from an exchange to a private wallet and, before the main transfer, made a test transaction of 50 USDT. However, this small, cautious transaction to his real wallet address became a discovery for the attacker, who was watching every move.
The cybercriminal immediately generated a fake wallet address — and here’s the key detail — the first four and last four characters of this counterfeit address matched the real one. For example, if the authentic address looked like 0xBAF4…F8B5, the scammer created an address that appeared indistinguishable from the original at first glance.
Poisoned transaction history — an invisible trap
The attacker sent a small amount of cryptocurrency from this fake address directly to the victim. This move was brilliant — it corrupted the trader’s transaction history by placing the fake address in recent entries. Most modern wallets and block explorers shorten addresses with ellipses in the middle due to length — so the fake address looked identical to the real one.
When the victim decided to transfer the remaining 49,999,950 USDT, he fell for a natural reflex: copying the recipient address from recent transactions instead of fetching it directly from the “Receive” tab in his wallet. One second of inattention, one copy-paste from the wrong source — and the funds ended up on the scammer’s account.
Rapid escape: DAI, ETH, and anonymity
Only 30 minutes passed from the address poisoning attack. During this short window, the stolen USDT was exchanged for the stablecoin DAI (which maintains a stable value around $1.00), then quickly converted into about 16,690 ETH. According to data from the time of the incident, ETH was valued at several thousand dollars each, confirming the dollar value of the loss. The cryptocurrencies then went through Tornado Cash — a mixing service that removes the direct link between sender and receiver addresses, making tracking and recovery practically impossible.
Desperate attempt — and failure
When the trader realized what had happened, he sent an on-chain message to the attacker offering a white-hat bounty — proposing $1 million in exchange for returning 98% of the stolen funds. It was an attempt to negotiate with the person who had just lost their money. The response? Nothing. As of the report’s publication, the assets had not been recovered.
Security researcher Specter, who analyzed the incident, expressed his astonishment at how the situation unfolded: “This is probably the least likely way to lose such a huge sum. Just a few seconds spent copying the address correctly could have prevented the entire tragedy.”
Why are these attacks becoming more common?
As the value of crypto wallets increases, address poisoning scams have become more profitable for cybercriminals than ever before. This isn’t a complex hack on advanced protocols, nor does it require Zero Day exploits — it only needs observation, speed, and exploiting human nature.
Four practical ways to protect against address poisoning
To avoid a similar fate, experienced traders and beginners alike should adopt a few simple habits:
First, always fetch the recipient address directly from the “Receive” tab in your wallet or directly from the person/service you’re sending funds to. Never copy an address from transaction history, no matter how confident you are that it’s correct.
Second, add all trusted addresses to your wallet’s whitelist. Many modern crypto wallets offer this feature — it allows you to mark certain addresses as safe and receive alerts if you try to send funds to an address outside the list.
Third, if you use full address verification, set a pattern on your hardware wallet or other device requiring physical confirmation for each transfer. This adds a second layer of verification — even if you copy the wrong address, the device will display it in full, alerting you to the mistake.
Fourth, for large transfers, always perform a small test transaction first. This classic strategy was used by the trader in this article — but in his case, the attacker was prepared for this caution and responded accordingly.
This incident is a recurring lesson that security in the crypto world isn’t always about the latest technology — sometimes it’s simply about vigilance and habits.