Cointime

Download App
iOS & Android

Exploring the Nuances of Address Poisoning

Validated Media

The world of crypto-crime is ever-evolving and just a month into 2023, a new crypto scam is on the rise. Known primarily as address poisoning, but also referred to as address spoofing, this scam has already prompted a consumer alert from a major cryptocurrency wallet, MetaMask, to its users on Twitter.

According to MetaMask, after a customer sends a normal transaction a scammer will send them a token transaction worth nothing or a nominal value, effectively “poisoning” or tainting the entire transaction history. Instead of using a normal wallet address that is automatically generated, the attacker will use a custom-made vanity address closely resembling the one belonging to the user. Attackers often duplicate four or five of the beginning and ending characters using an open-source tool like Profanity. The attacker is hoping that the user will mistakenly copy their vanity address, instead of the user’s actual address, for future transactions.

How Do Address Poisoning Scams Work?

The address poisoning scam works as follows.

First, attackers monitor the blockchain to look for regularly active wallet addresses. By doing so, they can generate a shortlist of addresses to attack - sparing them the hassle of attacking dead, dormant, or secondary wallet addresses. Targeting addresses in this way is critical as the marginal cost of each attack isn’t zero, as attackers still have to pay network fees when spoofing an address.

These scammers rely on the fact that it is not practical for people to memorize a wallet address. Variably composed of either alphanumeric characters as in the case of BTC or hexadecimal characters as in the case of ETH (which generates them cryptographically), they are typically very long. A Bitcoin wallet address, for example, ranges from 26 to 35 characters, while a MetaMask wallet address is 42 characters.

Given how difficult it is to commit a full address to memory, people rely on mental shortcuts for validation. For instance, someone may only scan the first and last letters of an address to check if it’s correct. Using this technique, it would be hard to differentiate between:

0xC660DC4250C4F07cF780cBf0c897nHQPLN123Bn0 (a hypothetical user address)

and

0xC660EL1NDZK8L69cP9LKdRZNd213wPOX9T523Bn0 (a spoofed vanity address)

It may be easy for you to distinguish the two addresses because you have been primed to find a difference, but to someone rushing to complete a transaction, they may seem close enough to avoid drawing suspicion.

Because users cannot remember addresses in their entirety, the scammer can easily create similar-looking vanity addresses to fool users. In practice, it’s very similar to how cyber criminals spoof banking websites like Wells Fargo hoping to capture unsuspecting victims’ login credentials.

Second, scammers then execute the process of poisoning or modifying a person’s transaction history by sending them a very small or negligible amount of cryptocurrency.

Third and finally, users then copy and paste the address from their transaction history when it’s needed for other transactions. If a user is unknowingly copying and pasting a poisoned address, it may be a while before the user even notices that something is wrong. Funds may be inadvertently sent to the spoofed address on multiple occasions.

Unfortunately, there’s no complex explanation for why this happens: people are lazy. Rather than grab their wallet address from its address book, they will grab it from where it is most readily available, which is commonly their transaction history. The poisoning scam succeeds because it takes advantage of human psychology and behavior, which indicates that people will follow the most convenient path.

While MetaMask may be the biggest brand to warn about address spoofing, it is not alone. Ledger, which manufactures hardware wallets, also noted the rise of this scam. While Ledger gave advice on how to prevent falling victim to address poisoning with any Ledger product, they noted that the scam could happen on any blockchain. It theorized that attackers would prioritize blockchains where network fees are cheap, such as Polygon, Tron, or Binance.

Some platforms may even be unintentionally facilitating this scam. To improve their user experience, some platforms and wallets provide wallet address shorteners that visibly compress the address in some way, such as by only showing the first five and last five characters. This feature increases the chance of address poisoning succeeding. Instead of relying on users to overlook the middle characters, a vanity address and a shortened address can now appear indistinguishable from one another. With the advent of address poisoning, any wallet or platform that offers address shortening should consider discontinuing the feature to better protect users from scammers.

How Can We Prevent Address Poisoning from Succeeding?

To best combat the rise of address poisoning across wallets and blockchains, it’s important to distinguish this scam from similar schemes, such as dusting attacks. As with address poisoning, a dusting attack relies on sending a negligible amount of cryptocurrency to different wallet addresses. But this is where the resemblance ends, and the goals diverge. The intent of address poisoning is to mimic the person’s address so that the conflation of wallet addresses results in funds mistakenly being sent to the poisoned address. The purpose behind a dusting attack is almost the opposite: de-anonymizing the recipient by watching how funds are spent, so they can possibly be identified. Once identified, the attackers may escalate the attack by blackmailing the de-anonymized user, trying to extort them, or targeting them for phishing.

Address poisoning more closely resembles a common variation of spear phishing, a scam where attackers create similar-looking email addresses to one that the target regularly works with. If the target uses [email protected], the attacker may send an email from the address [email protected], much, in the same way, crypto scammers create vanity addresses. From there, the spear phisher will send an email requesting payment for overdue services and provide a bank account. The method of both address poisoning and spear phishing is nearly one and the same: combine people’s carelessness with digital mimicry so funds end up in the wrong hands.

As with spear phishing, there are several ways to combat address poisoning, which have already made the rounds amidst these early warnings.

  • Double-check the address. If the user has a known location where they previously stored the wallet address, such as an offline document, they can double-check that every character matches. While this cross-referencing may be accurate, it can be tedious.
  • Source the original address. This will be product-specific, but there should be a location where users can access their addresses. On Ledger, users are encouraged to refer to the address on the receive button in “Ledger Live” on their Ledger device - if the addresses do not match, users are advised to cancel the transaction. For other software or hardware wallets, users should consult the documentation to ensure they are getting the wallet address from the correct location.
  • Use an address book. On MetaMask, users can input and confirm a specific address through the Address Book feature, which cannot be changed by any attackers attempting address poisoning. Most major wallets, such as Binance and Coinbase also offer this feature, which users should take advantage of.
  • Keep funds in a cold wallet or hardware wallet. Users can also elect to keep some of their cryptocurrency in a cold wallet, as suggested by Binance. Cold wallet storage can even be paired with a test transaction, whereby a user sends a small amount and waits for it to be confirmed, before executing the full transaction. The caveat is that there have been some reports of cold wallets also falling victim to address poisoning. Another option is the use of a hardware wallet, which are devices that secure a user’s keys offline. Because any transaction must be signed with the private keys that match the wallet, it would be nearly impossible to send funds to the wrong wallet as part of an address-poisoning scam.
  • Leverage forensic analysis. Just as proof-of-reserve emerged as an innovation to prove whether exchanges really have ownership over said funds, other cryptographic or forensic techniques may arise that combat address poisoning. Some methods may include the ability to better track the creation of the vanity addresses at the center of these scams and the flow of funds in and out of any associated wallets.

The story around address spoofing is still developing, and if you’re interested in seeing how this develops please look out for our next piece in the address spoofing series, as well as in our upcoming Hackhub report. Stay tuned until then and watch your wallet addresses closely!

Read more: https://blog.merklescience.com/general/exploring-the-nuances-of-address-poisoning?

Get the latest news here: Cointime channel — https://t.me/cointime_en

Comments

All Comments

Recommended for you

  • BTC Falls Below $76,000

    Market data shows that BTC has fallen below $76,000, currently priced at $75,990.02, with a 24-hour increase of 0.9%. The market is highly volatile, so please ensure proper risk management.

  • Iranian Military Spokesman: Control Over Strait of Hormuz Restored Due to U.S. 'Breach of Promises'

    On April 18, Iranian media reported that an Iranian military spokesman stated that control over the Strait of Hormuz has been restored to its previous state due to the U.S. 'repeatedly breaching promises.' The strait is currently under strict management and control by the Iranian armed forces. (Xinhua News Agency)

  • BTC Falls Below $77,000

    Market data shows that BTC has fallen below $77,000, currently priced at $76,997.37, with a 24-hour increase of 2.68%. The market is experiencing significant fluctuations, so please ensure proper risk management.

  • Iranian Civil Aviation Organization Announces Partial Reopening of Airspace

    According to Iranian media reports on the 18th, the Iranian Civil Aviation Organization announced the reopening of part of Iran's airspace and several airports. (Xinhua)

  • Bitcoin ETF Sees $663.9 Million Net Inflow, Ethereum ETF Sees $127.4 Million Net Inflow

    On April 18, according to Farside Investors, the U.S. Bitcoin spot ETF saw a net inflow of $663.9 million yesterday, with IBIT net inflow at $284 million, FBTC net inflow at $163.4 million, and ARKB net inflow at $117.9 million. The Ethereum ETF recorded a net inflow of $127.4 million yesterday, marking the seventh consecutive day of net inflows, with ETHA net inflow at $30.8 million and FETH net inflow at $84.1 million.

  • Trump Hints at 'Good News' on Iran Issue

    On April 18, U.S. President Donald Trump stated that there is some 'pretty good news' regarding the Iran issue, but he declined to provide further details. 'We heard some pretty good news about 20 minutes ago, and it seems that progress related to Iran in the Middle East is going very smoothly,' Trump told reporters aboard Air Force One. When asked what the so-called good news was, Trump replied, 'You will hear it. I think it is something that should happen. It is a matter of course. And I believe it will happen. We will see, but I think it will happen.' (Jinshi)

  • Trump Suggests War Will Resume if No Agreement with Iran is Reached

    On April 18, President Trump told reporters aboard Air Force One that if an agreement with Iran is not reached by Wednesday, war will resume. When asked if he was prepared to extend the ceasefire agreement if no deal is made by the time the ceasefire expires on Wednesday, Trump replied, "Maybe I won't extend the ceasefire. But the blockade will continue. So, the blockade remains in place, and unfortunately, we will have to start dropping bombs again," Trump warned.

  • Chinese Ship Trapped in Strait of Hormuz Informs Crew to Prepare for Departure

    On April 18, according to Yicai, around 4 PM local time on the 17th, the Chinese ship trapped in the Strait of Hormuz has informed its crew to 'prepare for departure.' According to CCTV, on the afternoon of the 17th, Iranian Foreign Minister Amir-Abdollahian stated on social media that, based on the ceasefire agreement in Lebanon, all commercial vessels are allowed to pass through the Strait of Hormuz completely open during the remaining time of the ceasefire, following the coordinated routes announced by Iranian ports and maritime organizations.

  • DeepSeek Seeks Over $300 Million in First Round of External Funding

    According to The Information, DeepSeek is seeking over $300 million in its first round of external funding, with a valuation exceeding $10 billion.

  • BTC Surpasses $78,000

    Market data shows that BTC has surpassed $78,000, currently priced at $78,024.64, with a 24-hour increase of 5.63%. The market is highly volatile, so please ensure proper risk management.