Phishing losses surge by 207%! Cryptocurrency wallet thefts soar to $6.03 million

SAFE6,69%
GNO6,48%

加密貨幣錢包網路釣魚

In January 2026, cryptocurrency wallet network phishing losses surged to $6.3 million, a 207% increase from December. Scam Sniffer data shows that attackers have shifted toward “whale” strategies, with just two victims accounting for 65% of total losses, and the largest single loss reaching $3.02 million. Another “address poisoning” incident resulted in a single victim losing $12.25 million.

Signature-based phishing losses jump 207%, while the number of victims decreases

According to Scam Sniffer reports, in the first month of this year, signature-based phishing attacks stole approximately $6.3 million from user crypto wallets. This attack method involves tricking users into signing malicious “Permit” or “IncreaseAllowance” functions, granting third parties unlimited access, allowing attackers to steal funds without further user approval.

What’s most shocking is the divergence between loss amounts and the number of victims. While the number of victims decreased by 11% compared to December, the total stolen amount skyrocketed by 207%. This highlights a fundamental shift in cybercriminal tactics—they are moving from a broad “scattershot” approach to precise “whale” attacks targeting high-net-worth individuals holding large assets, rather than attacking many small retail accounts as before.

This strategic shift presents new challenges for crypto wallet security. Traditional phishing defenses often focus on detecting attack volume and victim count, but when attackers target fewer high-value targets, these indicators may no longer serve as early warnings. Even with fewer victims, the explosive growth in total losses indicates the threat is escalating.

Signature-based phishing is particularly dangerous because it exploits the technical features of blockchain interactions. Many decentralized applications (DApps) require users to grant smart contracts permission to access tokens—this is standard procedure. However, attackers disguise malicious contracts as legitimate apps, trick users into signing authorizations. Once signed, attackers can transfer assets from victims’ wallets indefinitely without further user confirmation.

Whale strategy accounts for 65% of losses from two victims, with a single loss of $3.02 million

Scam Sniffer’s report reveals a startling fact: just two victims account for nearly 65% of all signature-based phishing losses in January. In one of the largest cases, a user lost $3.02 million after signing a malicious permission function. This highly concentrated loss distribution clearly illustrates a new attacker tactic—precise targeting of crypto wallets holding large assets.

The whale strategy differs from traditional phishing in its intelligence gathering before the attack. Attackers no longer send random phishing links but analyze on-chain data to identify high-value targets, study their transaction patterns and habits, then craft tailored attack plans. This approach requires more preparation time and technical skill but offers exponentially higher returns.

For users holding large assets, this threat is especially severe. High-net-worth investors might believe they are better at protecting their assets, but in reality, their high value makes them prime targets. Attackers are willing to invest more resources into designing targeted social engineering attacks, including creating more convincing fake websites, impersonating well-known project teams, and even establishing long-term trust through social media.

This trend is also reflected in the sophistication of attack methods. Past phishing often relied on crude scam emails and obvious fake websites, but modern whale attacks may involve perfectly replicated user interfaces, forged domains (using similar characters like i and l to confuse), and carefully crafted emergency scenarios to pressure users into making quick decisions.

Address poisoning causes a $12.25 million loss in a single incident—copy-paste becomes a deadly trap

Besides signature-based phishing, another equally destructive threat—“address poisoning”—is also troubling wallet users. In a typical case in January, an investor lost $12.25 million after transferring funds to a scam address, the largest single loss of the month.

Address poisoning exploits user habits and the technical characteristics of blockchain addresses. Crypto wallet addresses are usually 42-character hexadecimal strings, and verifying these addresses fully is tedious. Many users develop the habit of only checking the first and last few characters, which attackers exploit. They generate “fake” or “cloned” addresses that precisely mimic the start and end of legitimate wallet addresses in the victim’s transaction history.

Address poisoning attack process

Monitoring targets: Attackers track high-value wallet transaction histories

Generating fake addresses: Use algorithms to create fake addresses with matching start and end characters

Sending bait: Send small amounts of tokens (often dust attacks) to the fake address

Polluting history: Fake addresses appear in the victim’s transaction history

Waiting for mistakes: Victims copy and paste addresses from history, unknowingly using the fake address

Attackers hope users will copy and paste addresses from their transaction history for subsequent transfers, rather than verifying the full string. Because the fake address’s start and end match the real one, unless users carefully check the middle part, they cannot distinguish the difference. Once funds are sent to the fake address, the transaction is irreversible on the blockchain, and assets are immediately and permanently transferred to the attacker.

The $12.25 million single loss underscores the destructive potential of this attack. For investors or institutions managing large sums, a single mistake can be catastrophic. More concerning is that this attack relies solely on human psychology and operational habits, not on technical vulnerabilities, making prevention more difficult.

Safe Labs warns of 5,000 malicious addresses launching coordinated attacks

The increase in these incidents prompted Safe Labs (formerly Gnosis Safe, a popular multi-signature wallet developer) to issue an urgent security warning. The company discovered that organized cybercriminal groups are using about 5,000 malicious addresses to launch large-scale coordinated social engineering attacks against its users.

Safe Labs stated: “We have identified malicious actors working together to create thousands of addresses that look very similar to Safe addresses, aiming to trick users into sending funds to the wrong destination. This combines social engineering with address poisoning.” This scale of attack shows that phishing has evolved from individual crimes into an organized industry chain.

Deploying 5,000 malicious addresses simultaneously indicates that attackers possess robust technical infrastructure and automation tools. Generating such a large number of precisely targeted fake addresses requires significant computational resources and algorithm optimization. This industrial-grade attack capability suggests involvement by professional cybercrime organizations rather than lone hackers.

For crypto wallet providers, this large-scale attack presents new security challenges. Traditional security measures like two-factor authentication (2FA) and cold storage are nearly ineffective against address poisoning and signature phishing because these attacks exploit legitimate transaction mechanisms and user behavior. Prevention must involve improvements in user interface design, transaction confirmation processes, and user education across multiple levels.

Key measures to prevent phishing and address poisoning

In response to the growing threat of phishing, Safe Labs and security experts recommend several preventive steps. The most critical is to verify the complete address string before making large transfers, rather than just checking the start and end.

Best practices for crypto wallet security

Full address verification: Compare the entire 42-character address carefully, especially the middle section

Use address book: Save frequently used addresses as contacts to avoid copying from transaction history

Small test transfers: Send a small amount first to confirm the address before transferring large sums

Check permissions: Regularly review and revoke unnecessary token allowances

Enable transaction preview: Use wallets that support transaction review before signing

Multi-signature protection: Use multi-signature wallets for high-value accounts to increase attack difficulty

Additionally, users should stay vigilant against phishing sites, input URLs directly into the browser instead of clicking links, and carefully read permission requests before signing any transaction. For managing large assets, hardware wallets and multi-signature schemes can significantly enhance security.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

The White House will review the new proposed market measures put forward by the US CFTC

Odaily Planet Daily reports that according to market sources: The White House will review the new proposed market measures put forward by the U.S. Commodity Futures Trading Commission (CFTC).

GateNews31m ago

Beijing High Court Typical Case Interpretation: How Live Streaming Revenue and Digital Collectibles Are Enforced

Original Author: Xu Qian, Jin Weilin Recently, a typical enforcement case reported by the Beijing Higher People's Court has attracted widespread attention. The case clearly includes online virtual assets such as live streaming income and digital collectibles within the scope of enforceable property. This judicial practice provides an innovative approach to solving the "difficulty in enforcement" problem. Case Introduction: From "no property available for enforcement" to successfully deducting 200,000 yuan in live streaming income After a contract dispute case involving an industrial company and Wang entered enforcement proceedings, the court, through its inquiry and control system, found that Wang had no real estate, vehicles, bank deposits, or other traditional assets available for enforcement. The case was temporarily concluded at that point. Subsequently, the applicant for enforcement discovered a lead: Wang has been engaged in diamond sales and live streaming activities on a certain platform for a long time, with a fixed account and income. This lead was submitted to the Beijing Court's "Enforcement Property Clue Transfer Center" and quickly transferred to the Fengtai District People's Court of Beijing. After verifying the situation, the court

PANews58m ago

Crack down on illegal black markets! The UK considers opening up the gaming market to accept cryptocurrency payments

Author: Fenrir, Crypto City From the regulatory gray area to the mainstream, the UK Gambling Commission explores the possibility of crypto asset payments The UK Gambling Commission (UKGC) recently signaled a major policy shift, planning to formally explore the integration of cryptocurrencies into compliant gambling markets. During the annual conference of the Betting and Gaming Council (BGC) in London, the commission’s Director of Research and Policy Implementation, Tim Miller, pointed out that digital assets are transitioning from the regulatory gray area to mainstream payment options. Image source: Lottery Daily | UK Gambling Commission (UKGC) Director of Research and Policy Implementation Tim Miller This move reflects the UK government’s commitment to establishing the country as a global “crypto hub,” and aims to connect one of the largest economic pillars domestically with modern consumer payment preferences. According to statistical data, currently

区块客1h ago

The US CFTC will open trading for "perpetual contracts," with guidelines to be announced within a month.

CFTC Chairman Mike Selig pointed out that past regulatory shortcomings in the cryptocurrency industry have led to the development of the perpetual contract market overseas. The CFTC is developing regulatory guidelines and plans to open perpetual contract products in the United States within a month, while also working with the SEC to promote an "Innovation Exemption" mechanism, and will provide clearer regulatory standards for DeFi and prediction markets.

区块客1h ago

FATF warns about the risk of sanctions evasion when trading P2P with stablecoins

The FATF warns that P2P stablecoin transactions using unhosted wallets are a significant blind spot in the crypto ecosystem, potentially evading AML oversight. They urge countries to assess risks and enhance monitoring of such transactions. In 2025, illegal addresses received $154 billion in crypto, with 84% involving stablecoins, although illegal transactions remain under 1% of on-chain volume.

TapChiBitcoin3h ago

ECB Warns Stablecoin Adoption Could Drain Bank Deposits

The ECB warns that increasing stablecoin adoption could threaten Europe's banking system by reducing bank deposits, impacting lending, and complicating monetary policy. The report emphasizes the need for balanced regulation to manage digital finance's growth and stability.

Coinfomania4h ago
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)