Someone is doing a massive Adress spoofing - dust attacks on BCH. Be careful. Do not copy paste past addresses from the Blockchain. Verify on your own!
Here is one of the BCH malicious addresses: https://explorer.cloverpool.com/bch/address/bitcoincash:qzu9mypqts9fk4rdfslsfs3ff22enrs09uwuc09523
A new crypto scam is on the rise, called address poisoning or address spoofing. Perpetrators use the transparency of public blockchains to identify pairs of addresses that transact with each other often and “poison” one of the addresses’ transaction history by sending to it a small amount of crypto from an address that is similar but not identical to their usual counterpart. The scammers hope that the next time the victim is about to send funds to the familiar address, they will unwittingly copy the “poisoned” string of characters and misplace the funds for the criminals' benefit.
One might think, who would fall for such a basic trick? In fact, more people than you think, especially when criminals deploy this technique at scale. Just a few days ago, a trader lost some $68 million worth of crypto in a single transaction to an address-poisoning scammer.
Poison for the Unwary Crypto wallet addresses can consist of as much as 42 alphanumeric characters. We have all been there – when transferring some crypto to a friend or withdrawing funds from an exchange to our own self-custodial wallet, we don’t always scrutinize each character of the destination address. Dealing with a hodgepodge of seemingly random digits and letters that is an average address, the temptation is strong to rely on cognitive shortcuts.
For example, it is common for crypto users to only glance at the first and last several characters of the address copied from one’s smartphone notes or transaction history, especially if this is a wallet with which one has previously interacted.
Address poisoning, also known as address spoofing, is a deceptive tactic where scammers send small amounts of cryptocurrency, NFTs, or worthless tokens from a wallet that closely mimics the recipient's or a frequently used partner's address, thus making its way to transaction history. If the victim is in the habit of copying and reusing addresses from recent transactions when sending crypto, they can end up sending their funds to the scammer’s wallet.
Criminals scan public blockchains to identify potential victims, often looking for pairs of addresses that interact frequently. Such scams can occur on any blockchain, but Ethereum and networks like Polygon, Avalanche, and BNB Smart Chain are particularly vulnerable – the latter three due to relatively low transaction fees, which enable bad actors to deploy their schemes cheaply and at scale.
Scammers rely on vanity address generators – services that allow users to customize parts of addresses to make them appear recognizable and “less random.” For example, an authentic Ethereum address like 0x19x30f…62657 could be spoofed using a similar-looking 0x19x30t…72657, which can be totally different in the middle while maintaining the first and last few characters.
[link] [comments]