Trader Loses $68M of Wrapped Bitcoin in Address Poisoning Scam

An unknown trader lost $68 million worth of Wrapped Bitcoin (WBTC) in a single transaction in an address-poisoning scam on May 3, according to security firm Cyvers.

The victim’s wallet was drained of over 97% of its total assets, and the rest of its contents have since been removed, leaving them with just $13.56 worth of ETH, according to CoinStats.

Address poisoning, also known as address spoofing, exploits a trader’s haste and negligence during transactions. It involves tricking victims into sending their digital assets to fraudulent addresses belonging to scammers.

This is just one instance in a string of address-poisoning scams.

In October 2023, a hacker made off with $1.2 million worth of ARB tokens using the method.

Address Poisoning Scams on the Decline


Scams continue plaguing mainstream trust in the crypto industry. In April, investors lost at least $33 million of digital assets in a fraud case surrounding the ZKasino gambling platform. Dutch authorities arrested a suspect related to the ZKasino scam on April 29.

Despite the ZKasino incident, April only saw $25.7 million worth of cryptocurrency lost to scams and hacks. According to on-chain intelligence firm CertiK, this marks the lowest monthly figure since 2021. 

Total losses from exploits and scams fell 141% from the previous month, mainly attributed to a lack of private key compromises. There were 11 attacks against protocols via private key compromises in March, whereas in April, there were only three.

Crypto is Becoming a Safer Space


The current trend clearly indicates progress within the space, not only in security developments but in education. People are more aware of how to protect themselves from hacks and scams.

Despite the record-low month, crypto attacks are still a serious industry issue. According to CertiK, over $502 million worth of digital assets were stolen across 223 hacks and exploits during the first quarter of 2024.

Leave a Reply

Your email address will not be published. Required fields are marked *