Maybe you have noticed strange transactions in your own wallet.
For example, tiny amounts of USDT sent to you out of nowhere.
Or even fake tokens called “USDT” that you never asked for.
If you look closely, the sender address often looks very familiar.
The beginning and the end match your own address almost perfectly.
Only the middle part is different.
This is not random.
It is not a glitch.
This is called address poisoning.
In my own wallets, I have dozens, probably hundreds, of these incoming transactions.
Most active wallets do.
Yesterday, however, address poisoning caused something extreme.
Someone lost $50 million USDT in a single mistake.
That’s insane.
Especially because this “hack” costs scammers almost nothing and requires very little effort.
Today, we explain what address poisoning is, why it works, how the $50 million loss happened, and how you can protect yourself.
What Is Address Poisoning?
Address poisoning is a scam technique that targets human behavior, not smart contracts.
Scammers send a transaction from an address that looks almost identical to yours or to a wallet you recently interacted with.
They carefully match the first and last characters of the address.
Because most wallets shorten addresses like this:
0xbaf4…F8b5
Users often only check the start and the end.
The middle part is hidden behind “…”.
That’s exactly what scammers rely on.
When you later copy an address from your transaction history, you might copy the scammer’s address instead of the real one.
No exploit.
No private key leak.
Just a copy-paste mistake.
How the Victim Lost $50 Million
This is one of the most painful on-chain lessons we have seen.
Here is what happened, step by step.
The victim withdrew $50 million USDT from Binance.
Before sending the full amount, they did what many traders consider “safe behavior”.
They sent a $50 USDT test transaction to their own new wallet:
0xbaf4b1aF…B6495F8b5
So far, so good.
Immediately after that transaction, a scammer acted.
The scammer generated a wallet address with the same last characters.
Then they sent a fake $50 transaction using a fake USDT token (Not even a $50 real USDT, no, a fake token called USDT).
Because wallets display addresses in shortened form, the fake address looked identical in the transaction history.
The victim then copied the address from the history.
They only checked the end of the address.
When sending the remaining 49,999,950 USDT, they unknowingly copied the scammer’s address.
Oof.

The full amount went straight to the attacker.
This was not a smart contract exploit.
This was address poisoning combined with human habit.
Why Do Scammers Do Address Poisoning?
Because it works.
Address poisoning preys on speed, convenience, and overconfidence.
Most crypto users:
- Copy addresses from transaction history
- Only check the first and last characters
- Trust wallet UI shortcuts like “…”
- Assume test transactions guarantee safety
Scammers know this.
They don’t need malware.
Hacking is unnecesarry
And they don’t need expensive tools.
They just wait for humans to make a mistake.
At this point we wonder, is crypto is getting too professional for retail?
What Happened After the Scammer Received $50 Million?
USDT has a central issuer.
In theory, funds can be frozen if law enforcement is contacted fast enough.
The scammer knew this.
They moved extremely fast.
Within 30 minutes after receiving the funds, the attacker:
- Swapped $50 million USDT to DAI via MetaMask Swap
- Swapped all DAI into 16,690 ETH
- Deposited 16,680 ETH into Tornado Cash
Once funds enter Tornado Cash, tracing becomes much harder.
Not impossible, but very difficult.
The scammer used multiple addresses, including:
- 0xbaff2f13638c04b10f8119760b2d2ae86b08f8b5
- 0xbcb94f7609973e5ea7d2cbedaf0c5518b911e6cb
- 0x7a1bee3d53bf70861ef6c0652c63b206ea8fde76
- 0x9da061291e11dad806d68c20730c516c34a17b9b
- 0x8e5a768c4c2916be8d2e663b325f8f2f045ce4b6
- 0x5f90e59d0a03fd2f8c56b8cc896c5b42594eb3a0
- 0x1424236fe7fcb4a9e53d841ba3196628a92c9587
At this point, recovery becomes unlikely.
What Happens Now?
Realistically, the funds are probably gone.
If the scammer deposits ETH into a centralized exchange, there is still a chance.
Some exchanges cooperate with investigations.
Not all do.
After Tornado Cash, the trail is cold.
The best hope is that on-chain investigators like ZachXBT get involved.
Sometimes attackers slip up later when cashing out.
For now, this is a brutal reminder.
How Can You Prevent Address Poisoning?
This is the most important part.
Here are practical rules you should follow.
1] Never copy addresses from transaction history.
- Not from your wallet.
- Most definitely not from Etherscan.
- And not from past transfers.
Always copy the address directly from the source you are sending to.
2] Use saved and named addresses in your wallet.
For example, if you regularly send funds from MetaMask to Bybit, save that address once.
Name it clearly, like “Bybit Main”.
Double-check the full address, not just the start and end.
Yes, it’s boring.
Yes, it takes extra seconds.
It can save millions.
Slow down.
Triple-check.
Do not rush.
4] Consider using fresh wallets for large movements.
Address poisoning mostly targets active wallets with transaction history.
5] Ignore random incoming micro-transactions and fake tokens.
Do not interact with them.
Do not copy addresses from them.
Convenience is the enemy of security.
Support Our Work
If you found this helpful, consider signing up on BloFin (Non-KYC) or Bybit using our referral links. Your support keeps this content free and flowing.
Final Words
Address poisoning is not new.
But yesterday showed how dangerous it still is.
Losing $50 million because of a copy-paste mistake is every trader’s nightmare.
This was not greed.
It wasn’t leverage.
This was not a risky protocol.
This was human error, exploited at scale.
Take wallet safety seriously.
Slow down when moving funds.
And never trust shortened addresses.
RIP to the victim.
Let this be the lesson that saves someone else from the same fate.
If you enjoyed this blog, you may want to read the claims that Airdrop Alerts’ data breach is false.
As always, don’t forget to claim your bonus below on Bybit. See you next time!

Credit: Source link

















