Skip to main content
Loading crypto prices...

Former Binance CEO CZ Calls Out Etherscan Over Address Poisoning Scam Display

Arnas Bach

Arnas Bach

(in about 2 hours)· 4 min read
Cartoon villain firing spam tokens at users while defender blocks attacks, illustrating cryptocurrency address poisoning scams
Click to seek

Key Takeaways

  • CZ criticized Etherscan for displaying zero-value address poisoning transactions, stating TrustWallet already filters them automatically
  • A user received 89 address-poisoning alerts in under 30 minutes after making just two stablecoin transfers on Ethereum
  • Attackers use zero-value transfers and lookalike addresses matching first and last characters to trick users into copying fraudulent addresses
  • Etherscan hides zero-value transfers by default, but BscScan and Basescan require manual filtering, leaving users exposed
  • The automated nature of attacks allows scammers to target thousands of addresses simultaneously when detecting on-chain token movements

Changpeng Zhao, the former CEO of Binance, has publicly criticized Etherscan for its handling of spam transactions linked to address poisoning scams, arguing that blockchain explorers should completely filter out these malicious transfers from user interfaces.

CZ Advocates for Automatic Spam Filtering

In a post on X (formerly Twitter), CZ stated that TrustWallet has already implemented filtering technology to remove zero-value poisoning transactions from view, while Etherscan continues to display these fraudulent entries that overwhelm user wallets with spam. His comments highlight a growing concern within the cryptocurrency community about how blockchain explorers present transaction data to users.

The criticism came after a user known as Nima reported receiving 89 address-poisoning email alerts in less than 30 minutes following just two stablecoin transfers on the Ethereum network. The incident underscores the aggressive and automated nature of these scam campaigns.

How Address Poisoning Attacks Work

These attacks exploit the transferFrom function to initiate zero-value token transfers that generate transfer events visible in victim transaction histories. Because every address defaults to zero value approval, attackers can emit these events without requiring actual token movement or permissions.

Attackers enhance their success rates by combining zero-value transfers with address spoofing. The fraudulent addresses are designed to match the first and last characters of legitimate addresses, making them appear authentic at first glance. When users quickly copy addresses from their transaction history to send funds, they risk selecting the attacker-controlled lookalike address instead of their intended recipient.

Etherscan has issued warnings about these attacks, which specifically target users' tendency to reference recent transaction history when initiating transfers. Following the attack on his wallet, Nima cautioned that "so many will fall victim to this" given the sophisticated and automated nature of the campaign.

Differences Across Block Explorers

User Xeift provided important clarification regarding how different blockchain explorers handle these transactions. While Etherscan hides zero-value transfers by default, both BscScan and Basescan require users to manually click a "hide 0 amount tx" button to remove address poisoning attack transactions from view.

This inconsistency in default settings creates vulnerability gaps, as some users remain exposed to spam that could result in funds being sent to attacker-controlled addresses.

Future Implications and Additional Risks

CZ acknowledged that aggressive filtering could potentially impact legitimate micro transactions between AI agents in the future. He suggested that artificial intelligence could be deployed to distinguish genuine zero-value transfers from malicious spam.

Beyond address poisoning, Dr. Favezy highlighted additional risks associated with token swaps. A recent swap from a 0x98 wallet reportedly converted $50 million into just $36,000, raising serious questions about routing mechanisms and liquidity source selection. "I really hope AI agents will be able to route through the right routers and best liquidity sources to avoid situations like this," Favezy wrote.

Scale of the Threat

Nima's experience demonstrates the industrial scale these attacks have reached. 89 poisoning attempts in 30 minutes from merely two legitimate transfers reveals how attackers deploy automated systems to target thousands of addresses simultaneously whenever they detect stablecoin or token movements on-chain.

The incident has reignited discussions about the responsibility of blockchain infrastructure providers to protect users from increasingly sophisticated scam techniques while maintaining the transparency that defines blockchain technology.

DISCLAIMER

This article is for informational purposes only and does not constitute financial advice. Cryptocurrency investments involve substantial risk and extreme volatility - never invest money you cannot afford to lose completely. The author may hold positions in the cryptocurrencies mentioned, which could bias the presented information. Always conduct your own research and consider consulting a qualified financial advisor before making any investment decisions.

Arnas Bach

About Arnas Bach

Blockchain Researcher & Developer | 8+ Years Crypto Market Experience

Seasoned cryptocurrency researcher and blockchain developer with deep expertise in protocol analysis, smart contract development, and market insights since 2017. Specializes in emerging blockchain technologies, DeFi ecosystems, and cryptocurrency market trends. Combines technical development skills with comprehensive market research to deliver actionable insights for the digital asset space.

Latest Articles

Loading index...
Copyright © 2026 Coinasity. All rights reserved.
Crypto News, Analysis & Tools for Investors

Follow Us