Address poisoning tricks users into sending Bitcoin to attacker-controlled addresses that look like familiar ones. This guide explains the attack, how to identify poisoned transactions, and the simple rules that prevent it.
The most sophisticated Bitcoin security setup in the world can be defeated by a phone call. Social engineering attacks bypass technical security entirely — instead of breaking encryption or hacking software, attackers manipulate people into revealing information or taking actions that compromise their Bitcoin.
These attacks are increasingly targeting Bitcoin holders specifically. This guide covers the most common social engineering attacks, how to recognize them, and the simple rules that protect against them.
What Is a Social Engineering Attack?
Social engineering is psychological manipulation rather than technical exploitation. Attackers exploit trust, urgency, fear, and authority to get victims to:
- Reveal seed phrases or passwords
- Send Bitcoin to "safe" addresses
- Install malware disguised as helpful software
- Grant remote access to their devices
- Verify fake transactions
The defining characteristic: the attacker does not need to break your security — they convince you to break it yourself.
The Most Common Bitcoin Social Engineering Attacks
1. The Fake Support Scam
How it works: You contact what you think is Coinbase, Ledger, or another Bitcoin service's support. The person is actually an attacker.
Variants:
- You search for "Coinbase support phone number" and call a fake number in a Google ad or fake website
- You post about a problem on Reddit or Twitter and an attacker DMs you pretending to be support
- You receive an email from a fake address that looks official
The fake support agent will ask you to:
- Provide your seed phrase "for verification"
- Install remote access software so they can "fix" the problem
- Visit a phishing site and log in
Rule: No legitimate Bitcoin service will ever ask for your seed phrase. No exceptions. Ever.
2. The Fake Ledger Data Breach
How it works: In 2020, Ledger experienced an actual data breach exposing customer names, addresses, emails, and phone numbers. Attackers used this data to send targeted phishing campaigns to known hardware wallet owners.
Emails and texts claim: "Your Ledger has been compromised. You must immediately transfer your funds to a new recovery phrase provided at this link."
The "new recovery phrase" at the link is the attacker's recovery phrase. If you use it, the attacker owns all the Bitcoin you transfer.
Rule: Your hardware wallet recovery phrase is generated by your device, not by Ledger or any service. Never use a recovery phrase provided by someone else.
3. The SIM Swap Attack
How it works: An attacker calls your mobile carrier, impersonates you using information gathered from social media and data breaches, and convinces the carrier to transfer your phone number to a SIM card they control.
Once they have your number:
- They receive your SMS two-factor authentication codes
- They can reset passwords to email, exchange accounts, and banking
- They drain any funds accessible through SMS 2FA
SIM swapping has stolen millions of dollars from Bitcoin holders. High-profile cases include a $1.4M theft from a BlockFi user and numerous exchange account drains.
Defense:
- Never use SMS 2FA for Bitcoin exchanges — use hardware security keys (YubiKey) or TOTP apps (Authy, Google Authenticator)
- Add a carrier-level PIN or passcode that must be provided before any account changes
- Use a Google Voice number for non-critical 2FA (Google numbers are harder to SIM swap)
4. The Wrench Attack (Targeted in-Person)
How it works: Also called the "$5 wrench attack" — someone with physical access to you uses threats or violence to demand your seed phrase or Bitcoin.
This is not hypothetical. Bitcoin holders have been kidnapped, robbed, and physically coerced into transferring Bitcoin. High-profile holders who publicly discuss their holdings are particularly at risk.
Defense:
- Do not publicly disclose how much Bitcoin you hold
- Use multisig with keys in separate locations — you literally cannot hand over all keys at once
- Maintain a duress wallet with small amounts that you can reveal under pressure
- Never share your Bitcoin holdings on social media, forums, or with acquaintances
5. The Fake Bitcoin Giveaway
How it works: A social media account impersonating Elon Musk, Michael Saylor, or a Bitcoin influencer announces: "Sending 2 BTC to the first 100 people who send 0.1 BTC to this address!"
Despite being an obvious scam, this works at scale. YouTube livestreams with hacked celebrity accounts have collected millions in Bitcoin from victims.
Rule: No legitimate giveaway requires you to send Bitcoin first. Bitcoin giveaways that require sending Bitcoin are 100% scams, always.
6. The Romance Scam / Pig Butchering
How it works: Attacker builds a relationship with the victim over weeks or months, often on dating apps or social media. Once trust is established, they introduce a "can't-miss" Bitcoin investment opportunity.
Victims are often shown fake trading platforms with fabricated returns. Early small withdrawals succeed (to build trust). When the victim deposits large sums, the platform suddenly requires "fees" or "taxes" before withdrawal — fees that are sent to the attacker. Eventually the platform disappears.
This is called "pig butchering" — fattening the pig before slaughter.
Defense: Be deeply skeptical of any investment opportunity introduced by someone you have not met in person. The combination of romance and investment is a major red flag.
7. The Impersonation Attack
How it works: An attacker impersonates someone you know — a colleague, a customer, a business partner — and asks you to send Bitcoin for a legitimate-seeming purpose.
Variants:
- Email impersonation using a look-alike domain
- Hacked accounts of people you trust
- Deepfake video/voice calls using AI-generated voice of someone you know
AI voice cloning has made this attack dramatically more convincing. Attackers can generate a realistic voice call from a 30-second audio sample.
Defense: Establish an out-of-band verification protocol with anyone you might send Bitcoin to. A pre-agreed code word or callback to a verified number can defeat impersonation.
Universal Defense Rules
- Never share your seed phrase — not with support, not with Ledger, not with anyone
- Use hardware 2FA — YubiKey instead of SMS 2FA
- Keep holdings private — do not publicize how much Bitcoin you own
- Verify out-of-band — confirm large transaction requests via separate channel
- Slow down under urgency — urgency is a manipulation tactic; legitimate transactions can wait
- Use multisig — makes even physical coercion less effective
Frequently Asked Questions
Can my Bitcoin be stolen without my seed phrase? Through social engineering, attackers can get you to reveal your seed phrase, send Bitcoin voluntarily, or compromise your exchange account. Your on-chain Bitcoin in cold storage is secure as long as you protect your seed phrase.
How do SIM swap victims recover? SIM swap victims rarely recover stolen Bitcoin — blockchain transactions are irreversible. You can report to the FBI's IC3 and your state attorney general, but recovery of Bitcoin itself is extremely unlikely.
Is voice cloning a real threat for Bitcoin users? Yes. AI voice cloning using publicly available tools can produce convincing audio of anyone from a few seconds of sample audio. For large Bitcoin transfers, always verify via a second communication channel.
How do I protect my exchange account from social engineering? Use hardware security keys (YubiKey) as your primary 2FA. Remove phone number from your exchange account if possible. Use a unique email address for Bitcoin exchanges only. Never access exchange from public WiFi.