A large-scale phishing incident has recently been exposed again. An institution or whale was precisely targeted during a transfer operation, resulting in a direct loss of 50 million USDT. This case highlights a common security vulnerability. Let’s see what exactly happened.



The incident is not complicated. The victim withdrew 50 million USDT from a major exchange. To be cautious, they first sent a small test transfer of 50 USDT to the target address for verification. The process seemed fine, so they prepared for a large transfer. But by then, the phishing attacker had already set a trap—creating a malicious address that shares the first and last three characters with the victim’s test address, then transferred 0.005 USDT to the victim.

People tend to copy addresses from recent transaction records to save time. The victim, following normal procedures, copied the address from the transaction history, unaware that it had already been compromised. As a result, the 50 million USDT flowed directly into the attacker’s account. Even more frightening, the attacker didn’t hesitate for half a second—immediately exchanged the funds for DAI stablecoin, then swapped to ETH, and finally laundered the money through mixing tools before disappearing. The entire process was seamless and difficult to defend against.

How can such tragedies be avoided? First, large transfers must be manually checked digit by digit, especially avoiding lazy copying from transaction history—either type the address manually or verify through a second information source. Second, use a blockchain explorer to review the address’s transaction history for anomalies. Third, never skip the small test transfer step; paying 50 USDT for security worth 50 million is well worth it. Fourth, and most often overlooked: stay vigilant. Any strange transfer request, unfamiliar address change, or unusual prompt should be considered carefully for an extra second. Finally, if you notice suspicious activity, immediately contact the platform to freeze the account and pursue recovery.

The compromised address has been exposed in the community: 0xcB80784ef74C98A89b6Ab8D96ebE890859600819. This case reminds us that in the crypto world, there is no such thing as absolute security—only more cautious operations.
DAI-0.05%
ETH-0.09%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 2
  • Repost
  • Share
Comment
0/400
TokenomicsPolicevip
· 16h ago
Another 50 million gone, this is Web3 The phishing method is really clever, just changing the last digits and waiting for you to be lazy This guy is also incredible, testing it and still getting caught, what does that mean...alertness really can't be relaxed Seeing cases like this is frightening, you must develop the habit of manually entering addresses, although it’s troublesome, it’s better than losing money The full process of mixing coins and money laundering can be done in a second, this is the most terrifying part Every time I deal with large amounts, I have to spend half an hour in hesitation before I dare to click confirm, and now it seems that hesitation was right Honestly, most people would make this mistake, it just depends on who is luckier and not sniped
View OriginalReply0
BlockchainArchaeologistvip
· 16h ago
It's the same old trick again, lazy to manually type the address and really end up losing out. Manually checking each digit sounds easy to say, but when actually doing it, who wouldn't find it annoying... But 50 million compared to 50 USDT, it's really worth it. This guy's reaction is also incredible, switching DAI, then ETH, then mixing coins all in one go, unstoppable. Using a block explorer to check history is a trick I hadn't thought of before. Next time, for large transfers, I need to add .
View OriginalReply0
  • Pin
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)