2026-03-20 | DeFi and Blockchain Security | Oracle-42 Intelligence Research
```html
Crypto Address Poisoning via Zero-Value Transfer Attacks: Detection, Defense, and Mitigation in DeFi Ecosystems
Executive Summary
Zero-value transfer attacks—commonly referred to as "address poisoning" or "fake transaction spam"—represent a growing vector of manipulation within decentralized finance (DeFi) and blockchain ecosystems. These attacks exploit user interface (UI) simplifications, wallet address auto-fill mechanisms, and human error to trick users into sending funds to attacker-controlled addresses disguised as trusted counterparts. While the transferred tokens hold no intrinsic value, the malicious transaction payload is engineered to replace truncated or partially visible address strings in wallet UIs, leading to irreversible fund misappropriation. This article examines the mechanics of zero-value address poisoning, draws parallels to DNS and cache poisoning techniques (e.g., CPDoS, SAD DNS), and provides a comprehensive defense framework for DeFi developers, wallet providers, and end users.
Key Findings
Zero-value transfer attacks are a form of semantic cache poisoning in blockchain UIs, where malicious transactions poison the user’s transaction history or address book.
These attacks exploit UI display truncation, auto-complete features, and lack of address verification, similar to how DNS cache poisoning corrupts name resolution.
Common attack vectors include ERC-20 approvals, NFT transfers, and native token sends with zero value and crafted memo or input data.
Defense-in-depth requires wallet-side validation, transaction parsing, and user education; smart contract logic alone is insufficient.
Mechanics of Zero-Value Transfer Attacks
In a zero-value transfer attack, an attacker sends a transaction with zero token value but includes crafted calldata or a memo field that mimics a known address prefix. For example:
User Alice intends to send 1 ETH to Bob at address 0x71C...8a5.
Attacker sends a zero-value transaction from address 0x71C...8a5 (with suffix ff...ff) containing a misleading note: "Change of address—use new endpoint."
Alice’s wallet, displaying only the first six characters and last four, shows both addresses as 0x71C...8a5.
Alice confirms the transaction, sending 1 ETH to the attacker’s address.
This mirrors DNS cache poisoning, where a rogue resolver injects false mappings into a cache, altering resolution paths. Similarly, the wallet’s "cache" of recent transactions and address labels becomes poisoned, leading to semantic confusion.
Additional variants include:
Approval Poisoning: Attacker sends a zero-value ERC-20 approval to a user’s address, overwriting a legitimate allowance with malicious spender.
NFT Transfer Spam: Zero-value NFT transfers with misleading metadata populate NFT galleries, tricking users into interacting with fake assets.
Input Data Crafting: Malicious calldata in a zero-value call that triggers UI-side address substitution via front-running bots or spam relays.
It is a common misconception that smart contracts can prevent address poisoning. In reality:
Smart contracts validate on-chain state, not off-chain presentation.
A zero-value transfer is valid if the sender has sufficient gas and the transaction signature is correct.
Contract logic cannot detect if the recipient address displayed to the user is fraudulent.
Thus, prevention must occur at the application layer—in wallets, dApps, and address book services—mirroring how DNS security (DNSSEC, encrypted DNS) protects name resolution integrity.
Defense Strategies: A Multi-Layered Approach
1. Wallet-Side Address Verification and UI Safeguards
Full Address Display with Copy Verification: Always show the full 42-character (or 66 for checksummed) address. Disable truncation in transaction confirmations.
Checksum Validation: Use EIP-55 checksums. Display warnings if the address is not checksummed or is invalid.
Address Book Integration: Maintain a local, signed address book. Warn if a transaction recipient is not in the book or has a similar prefix (Levenshtein distance < 4).
Memo/Note Scrutiny: Highlight or block transactions where the memo contains keywords like "change," "new address," or "update."
2. Transaction Parsing and Heuristic Detection
Zero-Value with Non-Zero Gas: Flag transactions where value = 0 but gasUsed > 0, especially from unknown senders.
Crafted Input Data: Parse input field for misleading strings or encoded addresses. Use regex to detect appended fake suffixes.
Spam Filtering: Integrate on-chain spam detection (e.g., using community-maintained lists like eth-phishing.db).
3. User Education and Behavioral Controls
Educate Users: Promote the "Never trust an address you didn’t paste" rule. Use in-app tutorials and banners during high-risk actions (e.g., approvals).
Require Manual Input: Disable auto-fill for addresses not previously used. Require users to re-enter the full address for high-value transactions.
Multi-Signature Confirmation: For approvals > threshold (e.g., $1,000), require a second device or biometric confirmation.
4. Network-Level Protections (Analogous to DNSSEC)
Signed Address Book Services: Deploy decentralized address book protocols (e.g., ENS with verified records) where addresses are cryptographically linked to identities.
Transaction Receipt Verification APIs: Wallet providers can query third-party services (e.g., Chainalysis, TRM Labs) to validate address reputation before display.
Zero-Knowledge Proofs for Address Integrity: Emerging ZK-based identity systems could allow wallets to prove that an address is legitimately owned by a verified entity without exposing private data.
Case Study: The $2 Million Address Poisoning Incident (2023)
In May 2023, a DeFi user lost $2.1M in ETH after approving a zero-value transfer from an attacker-controlled address. The attacker had previously sent multiple zero-value transactions with the address prefix 0xAbC..., which appeared identical to the user’s intended recipient in the wallet’s truncated view. The user confirmed the approval, granting the attacker unlimited token spending rights. The incident underscored the need for full address display and input validation in wallet UIs.
Future Trends and Research Directions
As blockchain UIs mature, we anticipate:
AI-Powered Anomaly Detection: Machine learning models trained on transaction graphs to flag suspicious zero-value transfers in real time.
Decentralized Identity (DID) Integration: Wallets that resolve addresses via DID documents, where ownership is cryptographically verifiable and immutable.
Regulatory and Insurance Frameworks: Mandates for wallet providers to implement address verification controls, with liability for non-compliance.
Recommendations
For Wallet Providers:
Disable address truncation in transaction confirmations.
Implement heuristic spam filters for zero-value transfers.
Add "Address Safety Score" badges based on reputation feeds.
Publish security advisories on address poisoning risks.