CZ Goes After Etherscan For Displaying Spam Transactions From Address Poisoning Scams
CZ goes after Etherscan for displaying spam transactions from address poisoning scams, stating block explorers should filter out the malicious transfers completely.
Summary
- CZ says block explorers should filter address-poisoning spam.
- A user received 89 poisoning alerts in 30 minutes after two transfers.
- Attackers use lookalike addresses and zero-value transfers to trick users.
The former Binance CEO posted on X that TrustWallet already implements this filtering, while Etherscan continues showing zero-value poisoning transactions that flood user wallets.
The criticism follows an incident where a user identified as Nima received 89 address-poisoning emails in under 30 minutes after making just two stablecoin transfers on Ethereum.
Etherscan issued a warning about the attack, which aims to trick users into copying lookalike addresses from transaction history when sending funds.
“So many will fall victim to this,” Nima warned after the automated attack campaign targeted his wallet.
https://twitter.com/cz_binance/status/2032597991413133639
CZ goes after Etherscan for displaying spam transactions
Xeift clarified that Etherscan hides zero-value transfers by default, but BscScan and Basescan require users to click a “hide 0 amount tx” button explicitly to remove address poisoning attack transactions.
The difference in default settings leaves some users exposed to viewing spam that could lead to sending funds to attacker-controlled addresses.
CZ noted the filtering may affect micro transactions between AI agents in the future, suggesting AI could be used to distinguish legitimate zero-value transfers from spam.
Dr. Favezy pointed out that swaps create additional risks beyond address poisoning. A swap from the 0x98 wallet that turned $50 million into $36,000 yesterday raised concerns about routing and liquidity source selection.
“I really hope AI agents will be able to route through the right routers and best liquidity sources to avoid situations like this,” Favezy wrote.
Address poisoning floods wallets with lookalike addresses
The attack works by initiating zero-value token transfers using the transferFrom function. Attackers send 0-value tokens to create transfer events that appear in victim transaction histories. Every address defaults to 0 value approval, allowing the event emission.
Attackers then combine this with address spoofing to increase the likelihood victims copy the wrong transfer address.
The spoofed addresses match the first and last characters of legitimate addresses.
Nima’s case shows the scale these attacks can reach, with 89 poisoning attempts in 30 minutes from just two legitimate transfers. The automated nature means attackers can target thousands of addresses simultaneously whenever they detect stablecoin or token movements on-chain.
Crypto Firms Push Into US Banking
America’s cryptocurrency companies are scrambling to secure a foothold in the country’s traditional banking system, ... Read more
Ether Surges 16% Amid Speculation Of US ETF Approval
New York, USA – Ether, the second-largest cryptocurrency by market capitalization, experienced a significant surge of ... Read more
BlackRock And The Institutional Embrace Of Bitcoin
BlackRock’s strategic shift towards becoming the world’s largest Bitcoin fund marks a pivotal moment in the financia... Read more
Robinhood Faces Regulatory Scrutiny: SEC Threatens Lawsuit Over Crypto Business
Robinhood, the prominent retail brokerage platform, finds itself in the regulatory spotlight as the Securities and Excha... Read more
Only 5% Of Altcoins Beat The 200‑day As Volume Collapses 80%
Altcoins are stuck in one of the deepest drawdowns of this cycle, with just 5% of Binance‑listed tokens trading above ... Read more
Ex‑Kalshi Staff Launch $35M Fund For Prediction Market Infrastructure
Two early Kalshi alumni are raising up to $35M for 5c(c) Capital, a fund backed by Kalshi and Polymarket CEOs to invest ... Read more