Signature Phishing Up 200% As January Losses Pass $6M

ETH0,49%
XAUT-1,05%
TOKEN1,02%

In brief

  • Signature phishing victims jumped more than 200% in January, with $6.27 million stolen, blockchain security firm Scam Sniffer warned.
  • Despite the spike, total phishing losses in 2025 were sharply lower than in 2024.
  • Cheaper Ethereum fees after the Fusaka upgrade have made phishing tactics like mass address poisoning attacks more attractive for scammers, researchers said.

Blockchain security firm Scam Sniffer is warning of a sharp spike in signature phishing, with losses totaling $6.27 million and 4,700 wallets drained in January—an increase of 207% from December. Signature phishing occurs when attackers lure users to malicious decentralized applications that prompt them to sign off‑chain messages. While the requests appear harmless—such as approving a token deposit or listing an NFT—the signatures can instead authorize unlimited token spending or the transfer of NFTs, allowing attackers to later drain wallets.

Someone lost $12.25M in January by copying the wrong address from their transaction history. In December, another victim lost $50M the same way.

Two victims. $62M gone.

Signature phishing also surged — $6.27M stolen across 4,741 victims (+207% vs Dec).

Top cases:
· $3.02M —… pic.twitter.com/7D5ynInRrb

— Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) February 8, 2026

The January surge contrasts with a broader decline in crypto phishing over the past year. Scam Sniffer reported total phishing losses of $83.85 million across 106,106 victims in 2025 on Ethereum and EVM-based chains, down 83% in value and 68% in victims compared with 2024. Losses last month were highly concentrated. Two wallets accounted for roughly 65% of the total stolen through phishing and other attacks, including $3.02 million taken through a permit and increaseAllowance attack involving SLV and XAUt tokens, and $1.08 million drained via a permit attack. Beyond signature phishing, Scam Sniffer pointed to address poisoning and permit scams as key contributors. Address poisoning attackers send tiny transactions, or dust, to targets using addresses that closely resemble legitimate ones the wallet has already interacted with. When users later copy an address from their transaction history, they may inadvertently send funds to an attacker-controlled lookalike address.  Ethereum’s Fusaka upgrade changes scam economics Researchers said tactics like address poisoning have become more attractive following Ethereum’s Fusaka upgrade, which sharply reduced transaction fees. Blockchain researcher Andrey Sergeenkov found that new address creation surged last month, with one week seeing 2.7 million new addresses, about 170% above typical levels. He said roughly two-thirds of new addresses received less than $1 in stablecoins as their first transaction, consistent with large-scale address poisoning campaigns.

Sergeenkov argued that lower Ethereum fees have changed the economics of mass poisoning attacks. While conversion rates remain extremely low, the reduced cost of sending millions of dust transactions has made the strategy viable, with profits now coming from a small number of high-value mistakes. In addition to ensuring users check transactions and make sure they understand what they are signing or where they are sending money, wallets are also trying to introduce features to limit the risk of attacks. Tara Annison, head of product at Twinstake, said wallets are increasingly adding transaction simulations, clearer warnings and pre-execution checks to flag risky interactions. “Rabby does pre-execution simulation and will warn you if you’re interacting with known malicious smart contracts or if there’s hidden logic in the transaction,” she told_ Decrypt_. Metamask, meanwhile, “gives you a nice big warning if the site you’re connecting to looks like a phishing website and includes human readable warnings if the transaction looks like it might be about to do something dodgy for your assets,” Annison said. She added wallets are placing security features like this “front and centre to avoid you signing something you shouldn’t.” Decrypt has approached the Ethereum Foundation for comment.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Fantasy.top founder denies "soft Rug Pull" allegations, states investor funds were not used

Fantasy.top faces accusations from angel investors, claiming the team went silent and refused to refund $50,000, sparking "soft Rug Pull" allegations. Founder Travis Bickle countered that the company operates based on product revenue and has not used investors' funds. Several well-known investors also reported experiencing similar situations.

GateNews1h ago

Indian police arrest suspect involved in GainBitcoin Ponzi scheme at Mumbai airport

Gate News Report, March 11 — India's Central Investigation Bureau (CBI) announced the arrest of Darwin Labs co-founder and CTO Ayush Varshney at Mumbai Airport on suspicion of involvement in the GainBitcoin Ponzi scheme. It is reported that Varshney was attempting to leave India at the time. Investigations revealed that the scheme was operated by Variabletech Pte. Ltd., which attracted investors by promising high returns on crypto investments. Law enforcement officials accused Darwin Labs of developing and deploying critical technological infrastructure for the scheme, including the MCAP cryptocurrency token and ERC-20 smart contracts. Additionally, Darwin also provided technology for GBMiners.com Bitcoin mining platform, BitCoin Payment Gat

GateNews1h ago

Ledger Security Team Discovers MediaTek Processor Vulnerability That Could Lead to Wallet Mnemonic Theft

The team behind the crypto wallet Ledger has discovered a vulnerability in the secure boot chain of MediaTek processors. Attackers can extract encryption keys through physical access, affecting approximately 25% of Android phones. The vulnerability can be fixed with a patch, but it highlights the risks of storing keys on insecure devices. Users are advised to update promptly.

GateNews12h ago

AI code failure: Stop idolizing AI; Claude's coding caused a DeFi platform to lose $1.78 million

Moonwell Lending Protocol experienced a security incident on-chain due to an oracle configuration error, leading to a severe underestimation of cbETH asset prices. This event was caused by a logic error in AI-generated code, which was exploited by liquidation bots for profit. Although no traditional hacking was involved, users suffered a loss of $1.78 million. The incident highlights the oversight in AI programming review processes and emphasizes the importance of human oversight in the context of technological automation.

PANews12h ago

The Ministry of Industry and Information Technology releases OpenClaw intelligent agent security risk prevention recommendations, proposing four response strategies for financial transaction scenarios.

On March 11, the Ministry of Industry and Information Technology issued recommendations on preventing security risks associated with the open-source intelligent agent OpenClaw, emphasizing its potential risks in financial transactions. The "Six Musts and Six Don'ts" response strategy was proposed, such as implementing network isolation, secondary confirmation, and strengthening supply chain audits to prevent erroneous transactions and account hijacking.

GateNews13h ago

Aave experiences $27 million in abnormal liquidations, with 34 accounts being liquidated; the official promises full compensation

Aave experienced an abnormal liquidation on March 11th, with approximately $27 million in lending positions liquidated due to an internal security module CAPO parameter misconfiguration, resulting in a 2.85% underestimation of wstETH valuation. The liquidation affected 34 accounts, with about 10,938 wstETH forcibly closed. Chaos Labs has committed to fully compensate affected users and emphasized the need to improve risk management mechanisms. This incident highlights the risks posed by internal configuration errors within decentralized finance systems.

動區BlockTempo14h ago
Comment
0/400
No comments