Papers
Topics
Authors
Recent
Search
2000 character limit reached

Blockchain Address Poisoning

Published 28 Jan 2025 in cs.CR | (2501.16681v3)

Abstract: In many blockchains, e.g., Ethereum, Binance Smart Chain (BSC), the primary representation used for wallet addresses is a hardly memorable 40-digit hexadecimal string. As a result, users often select addresses from their recent transaction history, which enables blockchain address poisoning. The adversary first generates lookalike addresses similar to one with which the victim has previously interacted, and then engages with the victim to ``poison'' their transaction history. The goal is to have the victim mistakenly send tokens to the lookalike address, as opposed to the intended recipient. Compared to contemporary studies, this paper provides four notable contributions. First, we develop a detection system and perform measurements over two years on both Ethereum and BSC. We identify 13~times more attack attempts than reported previously -- totaling 270M on-chain attacks targeting 17M victims. 6,633 incidents have caused at least 83.8M USD in losses, which makes blockchain address poisoning one of the largest cryptocurrency phishing schemes observed in the wild. Second, we analyze a few large attack entities using improved clustering techniques, and model attacker profitability and competition. Third, we reveal attack strategies -- targeted populations, success conditions (address similarity, timing), and cross-chain attacks. Fourth, we mathematically define and simulate the lookalike address generation process across various software- and hardware-based implementations, and identify a large-scale attacker group that appears to use GPUs. We also discuss defensive countermeasures.

Summary

  • The paper introduces a robust detection system that identified 270 million attack attempts and revealed an attack scale 13 times larger than earlier estimates.
  • The paper analyzes sophisticated attacker strategies, including tiny, zero-value, and counterfeit token transfers, using lookalike addresses to mislead users.
  • The paper proposes defensive measures at protocol, wallet, and user interface levels to mitigate phishing risks in cryptocurrency transactions.

Blockchain Address Poisoning

Abstract

The paper "Blockchain Address Poisoning" (2501.16681) investigates a novel attack vector in cryptocurrency transactions where adversaries exploit the memorability issues associated with blockchain wallet addresses. The study focuses on blockchains such as Ethereum and Binance Smart Chain (BSC), where addresses typically consist of 40-digit hexadecimal strings. This complexity often leads users to rely on their transaction history, making them susceptible to address poisoning attacks. The adversary generates addresses visually similar to those the victim has interacted with, thus misleading them into sending tokens to incorrect addresses.

Detection System and Measurement

The paper introduces a robust detection system evaluated over two years, identifying a staggering 270 million attack attempts that affected approximately 17 million victims. Notably, 6,633 of these incidents resulted in losses exceeding 83.8 million USD, establishing blockchain address poisoning as one of the most significant phishing schemes in cryptocurrency history. The study’s detection methodology surpasses previous efforts, revealing attack scopes 13 times greater than reported earlier (2501.16681). Figure 1

Figure 1: CDF showcasing the targeting intensity, highlighting more aggressive targeting in 'active' groups.

Attack Analysis and Strategies

The analysis covers three specific transfer types—tiny transfers, zero-value transfers, and counterfeit token transfers—that adversaries use to infiltrate transaction histories. The paper uncovers a detailed picture of attacker operations, including bundling multiple transfers, address reusability, and cross-chain targeting. Attack profitability was explored by modeling attacker revenues and losses across distinct groups, revealing some structured entities managing consistently profitable operations. Figure 2

Figure 2: Illustration of the attack mechanism demonstrating the transfer poisoning strategy.

Technical Capacities and Simulation

The researchers mathematically defined and simulated lookalike address generation techniques, observing varied attack capacities. They found evidence suggesting large-scale attackers employ GPUs, significantly bolstering the address generation rate compared to CPU-based operations. Figure 3

Figure 3: Success probability correlated to address similarity, emphasizing strategic address selection.

Implications and Future Directions

The paper’s findings have significant implications for blockchain security, particularly in designing user interfaces and transaction protocols to minimize human error and enhance address verification mechanisms. The authors propose several defensive measures spanning protocol, contract, wallet, and user-level solutions to mitigate the risks posed by address poisoning attacks. Figure 4

Figure 4

Figure 4: Visualizing attack profitability against incurred costs, illustrating variance in operation success.

Conclusion

Overall, "Blockchain Address Poisoning" provides a comprehensive exploration into a sophisticated financial attack, emphasizing the importance of proactive measures in the blockchain ecosystem to safeguard user assets from phishing schemes. The paper serves as a foundational study for further operational threat modeling and preventative defense architecture in cryptocurrency transactions.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 10 tweets with 76 likes about this paper.