Crypto users lost tens of millions of dollars in January to address poisoning and signature phishing scams, as attackers exploited lower transaction costs and user inattention to steal funds at scale.
Crypto wallet scams intensified in January, with address poisoning and signature phishing attacks driving significant losses, according to data from blockchain security firm Scam Sniffer.
In one of the most striking cases, a single victim lost $12.2 million after mistakenly copying a malicious address from their transaction history. The incident followed a similar address poisoning attack in December that resulted in roughly $50 million in losses.
Scam Sniffer reported that address poisoning remains one of the most reliable methods for draining large sums from crypto wallets. Attackers create addresses that match the first and last characters of a trusted wallet, while subtly altering the middle portion, making them difficult to spot at a glance.
Alongside address poisoning, signature phishing attacks also surged in January. Scam Sniffer estimates that $6.27 million was stolen from 4,741 victims through malicious signature requests, marking a 207% increase compared to December. Notably, just two wallets were responsible for 65% of all signature phishing-related losses during the month.
Unlike address poisoning, signature phishing relies on tricking users into signing harmful blockchain transactions, such as granting unlimited token approvals or authorizing fund transfers without realizing the consequences.
Analysts believe the recent rise in attack volume may be partly linked to Ethereum’s Fusaka upgrade, rolled out in December. By reducing transaction costs, the upgrade made it cheaper for attackers to send large numbers of dust transactions, lowering the barrier to running address poisoning campaigns at scale.
Read more: SEC Sounds Alarm as Crypto Scammers Flood Group Chats With AI-Powered Cons
Security firms continue to urge users to double-check wallet addresses, avoid copying addresses from transaction histories, and carefully review signature requests before approving them, as these attack methods show no signs of slowing down.
Scammers send look-alike wallet addresses to trick users into copying the wrong one.
Victims lost tens of millions, including a single $12.2 million address poisoning case.
Attackers exploited user inattention, stealing $6.27 million via malicious signatures.
Lower transaction fees made large-scale scam campaigns cheaper and easier to run.
Related Articles
CertiK Report: Cryptocurrency ATM Fraud Losses Reach $330 Million in 2025, AI Technology Escalates Criminal Sophistication
China AI Industry Development Alliance Continuously Tracks OpenClaw Security Risks, Compiles Enterprise-Level Deployment Risk Management Guidelines
Tencent Launches OpenClaw Security Toolbox to Address Security Challenges of Lobster AI Agent
Bonk.fun Hack Exposes Solana Users to Wallet Drainer Attack
Solana-Based BONKfun Memecoin Launchpad Suffers Security Exploit
GoPlus Scans ClawHub Ecosystem Top 100 Skills, 21% Exhibit Clear High-Risk Operations