{"id":28700,"date":"2025-05-27T01:31:44","date_gmt":"2025-05-27T01:31:44","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=28700"},"modified":"2025-05-27T01:31:44","modified_gmt":"2025-05-27T01:31:44","slug":"double-trouble-crypto-user-loses-2-5m-by-copying-same-scam-address-twice","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=28700","title":{"rendered":"Double Trouble: Crypto User Loses $2.5M By Copying Same Scam Address Twice"},"content":{"rendered":"<div>\n<p>A crypto user has just lost more than $2.5 million in a simple copy-and-paste mistake. They tried to move 843,166 <a href=\"https:\/\/www.coingecko.com\/en\/coins\/tether\" target=\"_blank\" rel=\"noopener nofollow\">USDT<\/a> to a safe wallet. Instead, they sent a chunk of it to the wrong address.<\/p>\n<p>Then they did it again\u2014this time sending $1.7 million to the same scammer. It\u2019s a costly reminder that even small slips can erase fortunes.<\/p>\n<h2><strong>Copy-Paste Blunder Leads To Million-Dollar Loss<\/strong><\/h2>\n<p>According to on-chain records, the victim first moved $838,611 in USDT to the right address (0x4668D1Fe87444a4d750\u2026). A moment later, they clicked the wrong entry in their transaction history.<\/p>\n<p>That misstep cost them 843,166 USDT at current prices. They tried once more. And again the funds went to the scammer\u2019s account\u2014and another $1.7 million vanished.<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-486385\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2025\/05\/a_81fe53.png?resize=511%2C347\" alt=\"\" width=\"511\" height=\"347\"><\/p>\n<h2><strong>History Poisoning Trick Catches Many Off Guard<\/strong><\/h2>\n<p>Based on reports from Scam Sniffer, scammers are using \u201c<a href=\"https:\/\/support.ledger.com\/article\/address-poisoning-scams\" rel=\"nofollow noopener\" target=\"_blank\">transaction history poisoning<\/a>\u201d to pull off these cons. They send tiny \u201cdust\u201d transfers from look-alike addresses\u2014just enough to clutter a wallet\u2019s history.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.1.0\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\"> Transaction History Poisoning:<\/p>\n<p>1. Scammer sends fake\/dust transfer with similar address<br \/>\n2. Their fake address appears in your history<br \/>\n3. You copy address from history thinking it\u2019s legitimate<br \/>\n4. Funds get sent to scammer instead<a href=\"https:\/\/t.co\/S2lM8J8XWm\" rel=\"nofollow\" target=\"_blank\">https:\/\/t.co\/S2lM8J8XWm<\/a><\/p>\n<p>\u2014 Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) <a href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1926790487601475696?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">May 26, 2025<\/a><\/p>\n<\/blockquote>\n<p>When users scroll back through past transactions, they can\u2019t tell the real address from the bogus one. Copy. Paste. Gone. In this case, the attack address (0x4668EE748c88DA4FEc\u2026) looked almost identical to the real one. And it showed zero balance, adding to the confusion.<\/p>\n<p><strong>Phishing Scams Remain High<\/strong><\/p>\n<p>April\u2019s <a href=\"https:\/\/www.proofpoint.com\/us\/threat-reference\/phishing\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> losses hit $5.29 million. That\u2019s down 17% from March. But the number of victims climbed 26%, from 5,992 to 7,565 addresses. A single \u201cwhale\u201d lost $1.43 million to a phishing signature. Back in March, the biggest haul was $1.82 million.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.1.0\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\"> ScamSniffer April 2025 Phishing Report<\/p>\n<p>April losses: $5.29M | 7,565 victims<br \/>\nVS March: -17% in losses | +26% in victims<\/p>\n<p>Key insight: Notable spike in victim count despite lower total losses. Largest attack netted $1.43M via phishing, followed by $700K from address poisoning\u2026 <a href=\"https:\/\/t.co\/mJbGgGyGrN\" rel=\"nofollow\" target=\"_blank\">pic.twitter.com\/mJbGgGyGrN<\/a><\/p>\n<p>\u2014 Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) <a href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1918534743630725516?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">May 3, 2025<\/a><\/p>\n<\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full\" style=\"font-weight: 600; text-align: center;\" src=\"https:\/\/www.tradingview.com\/x\/k04r7eZk\/\" width=\"1835\" height=\"884\"><\/p>\n<p>April\u2019s second-largest attack saw one user lose $700,000 after copying the wrong address. Another person sent $150,000 by mistake. And wallet 0xEFc4f1d5 alone lost over $467,000 in a similar copy-paste trap.<\/p>\n<p><strong>New Threats From EIP-7702 Upgrade<\/strong><\/p>\n<p>On May 24, the phishing gang <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/inferno-drainer-returns-stealing\/\" target=\"_blank\" rel=\"noopener nofollow\">Inferno Drainer<\/a> used Ethereum\u2019s new EIP-7702 rules to steal almost $150,000 in one hit. EIP-7702 lets regular accounts act like smart contracts for a moment.<\/p>\n<p>The scammers guided victims to approve a batch of hidden token transfers through a delegated MetaMask setup. One click opened the door for a silent \u201cexecute\u201d command that drained the wallets in seconds.<\/p>\n<p><strong>Greed Breeds Risk<\/strong><\/p>\n<p>Crypto markets are near $3.5 trillion in total value. Bitcoin hit a fresh all-time high of $111,900 on May 22. Traders are chasing big gains. That rush makes urgent moves, and urgent moves invite mistakes.<\/p>\n<p><em>Featured image from Unsplash, chart from TradingView<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A crypto user has just lost more than $2.5 million in a simple copy-and-paste mistake. They tried to move 843,166 USDT to a safe wallet. Instead, they sent a chunk of it to the wrong address. Then they did it again\u2014this time sending $1.7 million to the same scammer. It\u2019s a costly reminder that even [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-28700","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/28700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28700"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/28700\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}