Jameson Lopp, the chief security officer at Bitcoin (BTC) custody company Casa, sounded the alarm on Bitcoin address poisoning attacks, a social engineering scam that uses similar addresses from a victim’s transaction history to fool them into sending funds to the malicious address.

According to Lopp’s Feb 6 article, the threat actors generate BTC addresses that match the first and last digits of addresses from the victim’s transaction history. Lopp analyzed the Bitcoin blockchain history for this type of attack and found:

“The first such transactions did not appear until block 797570, July 7, 2023, which had 36 such transactions. Then, all was quiet until block 819455, December 12, 2023, after which we can find regular bursts of these transactions up until block 881172, January 28, 2025, then there was a 2-month break before they started up again.”

“Over these 18 months, just shy of 48,000 transactions were sent that match this profile of potential address poisoning,” Lopp added.

Example of a poisoned address attack. Source: Jameson Lopp

The executive urged Bitcoin holders to thoroughly check addresses before sending funds and called for better wallet interfaces that fully display addresses. Lopp’s warning highlights the emerging cybersecurity exploits and fraudulent schemes plaguing the industry.  

Related: Crypto exploit, scam losses drop to $28.8M in March after February spike

Address poisoning scams and exploits claim billions in stolen user funds

According to cybersecurity firm Cyvers, over $1.2 million was stolen through address poisoning attacks in March 2025. Cyvers CEO Deddy Lavid said these types of attacks cost users $1.8 million in February.

Blockchain security firm PeckShield estimates the total amount lost to crypto hacks in Q1 2025 to be over $1.6 billion, with the Bybit hack accounting for the vast majority of the stolen funds.

The Bybit hack in February was responsible for $1.4 billion in losses and represents the biggest crypto hack in history.

Cybersecurity experts have tied the attacks to North Korean state-affiliated hackers that use complex and evolving social engineering schemes to steal cryptocurrencies and sensitive data from targets.

Common Lazarus Group social engineering scams include fraudulent job offers, zoom meetings with fake venture capitalists, and phishing scams on social media.

Magazine: 2 auditors miss $27M Penpie flaw, Pythia’s ‘claim rewards’ bug: Crypto-Sec

Read the full article here

Share.

Leave A Reply

Your road to financial

freedom starts here

With our platform as your starting point, you can confidently navigate the path to financial independence and embrace a brighter future.

Registered address:

First Floor, SVG Teachers Credit Union Uptown Building, Kingstown, St. Vincent and the Grenadines

CFDs are complex instruments and have a high risk of loss due to leverage and are not recommended for the general public. Before trading, consider your level of experience, relevant knowledge, and investment objectives and seek financial advice. Vittaverse does not accept clients from OFAC sanctioned jurisdictions. Also, read our legal documents and make sure you fully understand the risks involved before making any trading decision