Security Advisory : Address Poisoning and Dusting Attacks

Overview

Address poisoning and dusting attacks are transaction-layer techniques that exploit the transparent nature of blockchain networks to misdirect transfers or analyze wallet ownership patterns. Although these methods rely largely on behavioral gaps, organizations can materially reduce risk by consistently applying available platform controls alongside structured operational practices.

Threat Snapshot

Address Poisoning: Attackers introduce wallet addresses that closely resemble legitimate destinations into transaction histories, increasing the chance of funds being sent to an unintended recipient if copied without full verification.

Dusting Attacks: Small amounts of cryptocurrency are distributed across wallets so adversaries can monitor subsequent movements and cluster addresses, potentially enabling targeted phishing or social engineering.

Distinction between dusting and address poisoning attacks: Address poisoning targets transaction accuracy, while dusting primarily supports reconnaissance for future attacks.

Built-In Controls Supporting Client Security

Clients are encouraged to actively leverage custody and transaction safeguards already embedded within the Liminal platform:

  • Transaction screening and simulation help validate transfers before broadcast, reducing exposure to manipulated addresses.
  • Integrated threat intelligence improves early detection of suspicious addresses and emerging attack patterns.
  • Continuous monitoring identifies anomalous behavior, including micro-transactions associated with dusting attempts.
  • Configurable controls such as wallet whitelisting, token whitelisting, and IP-restricted API access secured with HMAC-SHA256 authentication strengthen transaction governance.

When operationalized consistently, these measures provide a strong preventive layer against transaction errors and unauthorized interactions.

What Clients Should Do Now - Control Checklist

Prioritize Transaction Integrity

  • Enforce wallet address whitelisting for approved destinations.
  • Validate full wallet addresses before authorizing transfers.
  • Use transaction simulation and test transfers for high-value movements.

Strengthen Operational Hygiene

  • Standardize use of approved address books rather than copying from transaction history.
  • Restrict API access by IP and ensure strong authentication mechanisms are enabled.

Protect Privacy

  • Avoid interacting with unsolicited micro-transactions.
  • Use coin-control features where available.
  • Generate new receiving addresses periodically to reduce traceability.