$25K USDC Address Poisoning Attack on Base, One of Thousands Today

$25K USDC Address Poisoning Attack on Base, One of Thousands Today

A user on Base was hit with a classic address poisoning attack, losing $25k USDC. While this might not be a “large” incident in the grand scheme of crypto, it reflects a much bigger issue:

💥 There are hundreds of thousands of these attacks every single day.

In this case:

  • Intended recipient: 0x6a33f...cbb1
  • Attacker address: 0x6a332...cbb1
  • Loss: $24,965 USDC
  • Method: Address poisoning (lookalike address)

These subtle, social engineering-style attacks are flooding user wallets and draining funds when users unknowingly copy/paste the wrong address.

This is preventable.

At Webacy, we detect these attacks in real time.

Our Address Poisoning Monitoring and Detection DD engine flags lookalike address activity, preventing malicious transactions before damage occurs. It’s not just about security. Tt’s about building better UX for everyone in the space.

🚨 We’re offering free DD scans for any company that wants real-time feedback on the state of their user wallets. Get in touch: info@webacy.com