According to GoPlus Security, a user lost 100,000 DAI on May 14 in a typical address poisoning attack after copying a similar address from transaction history. The attacker used a near-identical address to send the user 0.0003 DAI, tricking them into selecting the fake address during a subsequent transfer. GoPlus Security advised users not to copy addresses from transaction history and to verify complete addresses before transfers, particularly conducting a small test transaction before large transfers.
Related News
Gate Daily Report (May 14): TAC cross-chain layer attacked on the TON side; Polymarket monthly trading volume down nearly 9%
A Telegram username sold for a million-dollar price triggers a forged USDT phishing attack
AI suite supply chain sees two-way attacks: Mistral and fake OpenAI models are both compromised