Key Takeaways
The EOS blockchain is under attack from scammers deploying an address poisoning scheme, a tactic designed to deceive users into transferring funds to fraudulent addresses.
The attackers are actively sending small amounts of EOS tokens to random wallet addresses, exploiting user habits to gain control over transactions.
Security analytics firm SlowMist has issued a warning to EOS users, highlighting the rising cases of address poisoning attacks on the blockchain.
According to SlowMist, the scammers create fraudulent accounts with names closely resembling those of major trading platforms.
Examples include “binanecleos” impersonating Binance’s official EOS address “binancecleos,” and “oktothemoon” mimicking OKX’s legitimate “okbtothemoon.”
These attackers send minuscule EOS transactions—often 0.001 EOS—to users, embedding deceptive messages designed to lure them into returning a significantly larger sum.
Address poisoning is one of the oldest crypto scams, similar to phishing attacks and two-factor authentication (2FA) exploits.
The technique involves scammers analyzing a victim’s transaction history to identify frequently used wallet addresses.
They then generate new addresses that closely resemble legitimate ones, inserting them into a user’s transaction records through small, seemingly harmless transfers.
Many users rely on their transaction history to copy and paste addresses when making transfers, making them particularly vulnerable.
The slight variations in the poisoned address often go unnoticed, leading victims to mistakenly send funds to the scammer instead of the intended recipient.