A single copy-paste error wiped out $50 million in seconds on December 20, marking one of the largest individual wallet losses of 2025. A trader inadvertently transferred 49,999,950 USDT to a fraudulent address designed to mimic their intended recipient, a vector known as "address poisoning." The funds were immediately liquidated into Ethereum and funneled through Tornado Cash.
The Mechanics of a $50M Mistake
The attack relied on visual deception rather than a smart contract exploit. The attacker generated a vanity address sharing the same first and last characters as the victim’s legitimate destination. Most wallet interfaces shorten addresses (e.g., 0xbaf...f8b5), masking the middle characters where the discrepancy lies.
According to on-chain data cited by Web3 Antivirus, the sequence unfolded rapidly:
- Legitimate Test: The victim sent a valid 50 USDT test transaction to their intended wallet (
0xbaf4...f8b5). - The Poison: The attacker detected this activity and instantly sent a "dust" transaction (often 0.005 USDT or $0) from the look-alike address (
0xBaFF...f8b5) to the victim. - The Error: When the victim returned to send the full balance, they copied the most recent address from their transaction history, the attacker’s wallet, instead of the verified test address.
Liquidation and Laundering
Speed was critical. Tether (USDT) has a centralized freeze function, allowing the issuer to blacklist addresses holding stolen funds. To circumvent this, the attacker immediately swapped the 49.99 million USDT for DAI, a decentralized stablecoin that cannot be frozen as easily.
The DAI was then converted into approximately 16,680 ETH. With Ether trading around $2,965 (-0.3%), the attacker began depositing the haul into Tornado Cash, a privacy protocol that breaks the on-chain link between source and destination wallets. This "mixing" process complicates recovery efforts significantly.
The $1 Million Desperation Play
With the funds moving into privacy mixers, the victim attempted a final negotiation. An on-chain message sent to the attacker offered a white-hat bounty:
"We have officially filed a criminal case… If you return 98% of the funds, you may keep $1,000,000 USD as a bounty."
As of press time, the attacker has not responded, and the laundering process continues.