{"id":129712,"date":"2025-05-21T14:15:42","date_gmt":"2025-05-21T14:15:42","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=129712"},"modified":"2025-05-21T14:15:42","modified_gmt":"2025-05-21T14:15:42","slug":"ai-tool-claims-97-efficacy-in-preventing-address-poisoning-attacks","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=129712","title":{"rendered":"AI tool claims 97% efficacy in preventing \u2018address poisoning\u2019 attacks"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsCrypto cybersecurity firm Trugard and onchain trust protocol Webacy have developed an artificial intelligence-based system for detecting crypto wallet address poisoning.<br \/>\nAccording to a May 21 announcement shared with Cointelegraph, the new tool is part of Webacy\u2019s crypto decisioning tools and \u201cleverages a supervised machine learning model trained on live transaction data in conjunction with onchain analytics, feature engineering and behavioral context.\u201d<br \/>\nThe new tool purportedly has a success score of 97%, tested across known attack cases. \u201cAddress poisoning is one of the most underreported yet costly scams in crypto, and it preys on the simplest assumption: That what you see is what you get,\u201d said Webacy co-founder Maika Isogawa.<br \/>\nAddress poisoning detection infographic. Source: Trugard and WebacyCrypto address poisoning is a scam where attackers send small amounts of cryptocurrency from a wallet address that closely resembles a target\u2019s real address, often with the same starting and ending characters. The goal is to trick the user into accidentally copying and reusing the attacker\u2019s address in future transactions, resulting in lost funds.<br \/>\nThe technique exploits how users often rely on partial address matching or clipboard history when sending crypto. A January 2025 study found that over 270 million poisoning attempts occurred on BNB Chain and Ethereum between July 1, 2022, and June 30, 2024. Of those, 6,000 attempts were successful, leading to losses over $83 million.<br \/>\nRelated: What are address poisoning attacks in crypto and how to avoid them?<br \/>\nWeb2 security in a Web3 world<br \/>\nTrugard chief technology officer Jeremiah O\u2019Connor told Cointelegraph that the team brings deep cybersecurity expertise from the Web2 world, which they\u2019ve been \u201capplying to Web3 data since the early days of crypto.\u201d The team is applying its experience with algorithmic feature engineering from traditional systems to Web3. He added:<br \/>\n\u201cMost existing Web3 attack detection systems rely on static rules or basic transaction filtering. These methods often fall behind evolving attacker tactics, techniques, and procedures.\u201c<br \/>\nThe newly developed system instead leverages machine learning to create a system that learns and adapts to address poisoning attacks. O\u2019Connor highlighted that what sets their system apart is \u201cits emphasis on context and pattern recognition.\u201d Isogawa explained that \u201cAI can detect patterns often beyond the reach of human analysis.\u201d<br \/>\nRelated: Jameson Lopp sounds alarm on Bitcoin address poisoning attacks<br \/>\nThe machine learning approach<br \/>\nO\u2019Connor said Trugard generated synthetic training data for the AI to simulate various attack patterns. Then the model was trained through supervised learning, a type of machine learning where a model is trained on labeled data, including input variables and the correct output.<br \/>\nIn such a setup, the goal is for the model to learn the relationship between inputs and outputs to predict the correct output for new, unseen inputs. Common examples include spam detection, image classification and price prediction.<br \/>\nO\u2019Connor said the model is also updated by training it on new data as new strategies emerge. \u201cTo top it off, we\u2019ve built a synthetic data generation layer that lets us continuously test the model against simulated poisoning scenarios,\u201d he said. \u201cThis has proven incredibly effective in helping the model generalize and stay robust over time.\u201c<br \/>\nMagazine: Crypto-Sec: Phishing scammer goes after Hedera users, address poisoner gets $70K<a href=\"https:\/\/cointelegraph.com\/news\/ai-system-has-97-claimed-efficacy-in-preventing-address-poisoning-attacks?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsCrypto cybersecurity firm Trugard and onchain trust protocol Webacy have developed an artificial intelligence-based system for detecting crypto wallet address poisoning. According to a May 21 announcement shared&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/129712"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=129712"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/129712\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=129712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=129712"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=129712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}