There are several very elaborate scams in the Crypto world that do not only involve running a malicious smart contract, trying to trade a scam token on a compromised dex or attacking the frontend of a website (where the original domain is hijacked to the attacker's domain) but also others directly related to sending and the wallet.
ADDRESS POISONING
Poisoning attack is a simple but at the same time quite elaborate scam. While it does not involve direct theft of funds or unauthorized access to the wallet, it can lead to the user accidentally sending cryptocurrency to the wrong address. This scam takes advantage of the fact that some crypto wallets, such as MetaMask, store and display recent transactions. Scammers send a small amount of cryptocurrency, such as 0.00001 ETH or insignificant tokens, to a legitimate wallet, but use an address that is very similar to one that already exists in the victim's transaction history (just check the latest addresses the victim has interacted with in the explorer and create a similar one). The idea is that the user, when referring to the transaction history to copy an address to move funds, may mistakenly copy the malicious address, which resembles a trusted one. The result is that the user sends their funds to the scammer's address.
How can you generate a similar address? Addresses are made up of hexadecimal characters (0-9 and a-f), which allows for a very large combination of unique addresses. Despite their cryptographic uniqueness, they can appear similar to the human eye, especially if one address is designed to look like another. It is possible to randomly generate similar addresses until one is found that resembles the victim's address, focusing on the first and last digits of the address, which are what most users check before sending a transaction. There are scripts and programs that automate this process, allowing scammers to quickly generate thousands of addresses until they find a close enough match.
-For example, if the legitimate address is:
0xAEC12545...67890DFE
-Scammers can generate an address like:
0xAEC12546...67890DEF
This way, only one or two digits are different, but the similarity can be deceiving to the naked eye. Another technique involves using vanity addresses that contain a specific sequence of characters at the beginning or end. There are tools that allow you to generate vanity addresses, such as the "Vanitygen" tool for Bitcoin or "Vanity-ETH" for Ethereum. Scammers can use these tools to create an address that has the same first or last digits as a legitimate address, making it difficult to distinguish. Scammers focus on matching the first (or last) digits, because that's what a user tends to check.
Another technique is to create addresses with subtle variations that are difficult to quickly notice, such as replacing characters that appear visually similar.
For example:
"1" and "l" (the number one and the lowercase letter "L") can be confused in some fonts.
"0" (zero) and "O" (the uppercase letter O) are often indistinguishable to the naked eye.
For example:
Legit address: 0x17341BCDEF...
Scam address: 0x1734lBCDEF... (where "l" replaces "1")
CLIPBOARD HIJACKING
This scam uses malware that infiltrates the computer and monitors the clipboard, which is the temporary memory where text or data is copied and pasted. When the user copies a cryptocurrency address to send funds, the malware automatically replaces the copied address with the scammer's. So when the user pastes the address to make the transaction, they don't realize that the address has been changed, and end up sending the funds to the scammer.
DUST ATTACK
A dusting attack is not a scam in the traditional sense, but is often used as a prelude to more advanced scams. It is an operation in which an attacker sends a small amount of cryptocurrency (often infinitesimal fractions, known as "dust") to many wallet addresses. The goal is to track future transactions of these addresses to try to identify the owners. If the attacker can identify a user, they can use that user as part of other targeted scams, such as phishing or social engineering attacks.
FAKE QR CODE
QR codes are often used to simplify the sending and receiving of funds, especially to avoid mistakes when copying and pasting long, complex addresses. Scammers exploit this behavior by creating fake QR codes that contain the scammer's address instead of the correct address. The user scans a QR code provided on a website to send cryptocurrencies to a supposedly trusted address. However, the QR code contains a malicious address and the funds are sent to the scammer's address.
MAN IN THE MIDDLE ATTACK
This is a classic cyber attack where a scammer intercepts the communication between the user and the recipient of the transaction (often on unsecured platforms or networks) and changes the wallet address to which the cryptocurrencies are sent. This attack can occur on compromised websites or exchange platforms that do not implement adequate security protocols (old HTTP and not the updated HTTPS).
Are you interested in ways to earn crypto bonus? Check it out here: Some Sites To Earn Crypto Bonus (Old & New)