Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
If you've ever heard of address poisoning, you probably wondered how it really works. It's one of those fraud techniques that seems simple on paper but is surprisingly effective in the crypto world.
What is poisoning in practice? A scam where hackers create fake addresses that look impressively similar to your usual addresses. They are not identical, but close enough to confuse anyone making a quick transaction. The idea is to contaminate your transaction history with these counterfeit addresses, hoping that sooner or later you will copy the wrong one.
There are two main methods attackers use. The first is trailing transfer: after you make a normal transaction from your address, they quickly launch a transfer of a minimal amount or even zero from the fake address. This transfer ends up in your history and starts polluting the record. The address differs only in the middle characters from the original, and since most people only check the beginning and end during quick operations, it's easy to fall into the trap.
The second method exploits a peculiarity of USDT: the contract allows third parties to initiate zero-dollar transfers. Hackers take advantage of this to generate false transactions from your account to counterfeit addresses, without even needing your authorization. Some wallets do not filter these zero transactions, so they appear as normal movements in the history.
Why does it work so well? First, poisoning exploits a mental habit: when you see an address that starts and ends like the one you know, your brain tends to trust it. The middle part? That’s skipped during quick operations. Also, many of us copy addresses directly from the wallet or exchange history rather than searching for them from scratch. Hackers know this and rely on this dependency. They also use automated tools to monitor target addresses in real time and launch attacks when it matters.
How to protect yourself? First: don’t trust the history for important addresses. Use the exchange or wallet’s whitelist feature, or copy manually from verified sources. Second: before sending a significant amount, always do a test with a small amount to confirm the address is correct. Third: really check the integrity of the address, especially the middle part that hackers modify. And if you can, use a hardware wallet, which protects you from many of these attacks.
In summary, poisoning is a contamination technique that exploits our habits and blind spots. It’s not complicated, but it’s effective and hard to notice. By increasing awareness and adopting some good security practices, you can avoid falling into this trap and protect your digital assets.