Everything StablecoinEverythingStablecoin
guide25 min read|

How People Actually Lose Their USDT (With Real Cases and Proof)

From $50M address poisoning to multi-sig wallet traps we verified on-chain. Real cases with dates, amounts, and DOJ seizure records. Updated regularly.

The $50 Million Copy-Paste

Two nearly identical cryptocurrency wallet addresses on a monitor — one character apart, $50 million apart On December 20, 2025, someone sent 49,999,950 USDT to the wrong address. Not a typo. Not a fat finger. They copied an address from their transaction history — the same way most of us do every time we send crypto — and didn't notice that the address they copied wasn't the one they'd used before. An attacker had been watching their wallet. When the victim sent a small test transaction of 50 USDT to a legitimate address, the attacker's script automatically generated a new address matching the first few and last few characters of the real one. Then it sent a zero-value transaction from that fake address to the victim's wallet, planting it in their transaction history like a landmine. The next time the victim went to send funds, they scrolled through their history, found what looked like the right address, and transferred $50 million to a stranger. Within 30 minutes the attacker swapped everything to DAI (Tether can freeze USDT — nobody can freeze DAI), converted it to roughly 16,690 ETH, and routed it through Tornado Cash. The victim posted an on-chain message offering a $1 million bounty for the funds' return. Nothing has been recovered. This is called address poisoning — one of the scam types we break down in this article. We've verified multi-sig wallet traps on-chain, traced Etherscan transactions from real attacks, and pulled from DOJ seizure records and security firm reports. Every case listed here is real, named, and verifiable. The $50 million case wasn't isolated. In May 2024 a crypto whale lost $71 million in wrapped Bitcoin to the same technique — the real address and fake address both started with "0xd9A1" and ended with "53a91." In a rare twist, the attacker returned the funds, but only after ETH had risen during the days they held it, netting them roughly $3 million in profit. Even the US Drug Enforcement Administration got caught. In 2023, the DEA seized roughly $500,000 in USDT from a Binance account and stored it in a Trezor hardware wallet. After sending a test transaction to the US Marshals Service, an attacker cloned the address pattern and poisoned the DEA's transaction history. An agent copied the fake address and sent $55,000 to it. Never recovered. Between July 2022 and June 2024, researchers documented 270 million poisoning attempts across Ethereum and BSC, resulting in over 6,000 successful thefts totaling $83.8 million. The attackers use GPU-powered software to brute-force addresses matching the first 5 and last 4 characters of your real recipient. On BSC, where each attempt costs a fraction of a cent, one group averaged 105 poisoning transactions per block. The fix is boring: verify the full address every time. Don't copy from transaction history. Use your wallet's address book. If you're moving a large amount, the 30 seconds it takes to check each character is cheap insurance.

The Screenshot That Wasn't Real

A phone displaying a fake bank transfer confirmation — the most common P2P scam tool P2P trading on Binance or OKX works like this: a buyer opens a trade, sends you money via bank transfer, you confirm the payment arrived, then release the crypto. The scam version: the buyer sends you a doctored screenshot of a completed bank transfer. They pressure you — "I've already paid, check your messages, please release." The screenshot looks real. But your actual bank balance hasn't changed. Some scammers go further. They initiate a real bank transfer — one that shows as "pending" in your account — and then reverse it after you release the USDT. By the time the reversal hits, the crypto is gone and the P2P trade is closed. Chargeback fraud works on the same principle but through different rails. A buyer pays you via PayPal, credit card, or a reversible payment method. You release the USDT. Days or weeks later, the buyer files a chargeback or dispute with their bank. The fiat gets clawed back. Your crypto doesn't. Nigeria's P2P market — roughly $59 billion in volume between mid-2023 and mid-2024 — sees both variants daily. The defense is simple: ignore screenshots entirely. Open your banking app, confirm the funds have fully settled (not "pending"), and only then release. On Binance and OKX, never release early even if the buyer is aggressive — the escrow exists to protect you.

The Token That Looks Like USDT But Isn't

Examining a suspicious token contract on a blockchain explorer Within hours of PayPal launching PYUSD in August 2023, nearly 30 fake PYUSD tokens appeared on decentralized exchanges. The largest one generated $2.6 million in trading volume in minutes before people realized it wasn't real. The same thing happens with USDT constantly, especially on low-cost chains like BSC and TRON. Anyone can deploy a token contract and name it "Tether USD" or "USDT." The token shows up in your wallet with the right name and logo. But it's not the real USDT — it's a worthless contract that no exchange will accept. "Flash USDT" is a variation that's gotten popular in West African P2P markets. Scammers use specialized tools to send fake USDT transactions that appear in your wallet briefly, then disappear or become untransferable. The transaction looks legitimate in the initial notification, which is enough to trick sellers into releasing goods or fiat. To understand how trivial this is to set up, here's a simplified version of an actual fake USDT contract we've seen deployed (critical parts redacted):
// Fake "Tether USD" contract — looks identical in wallets
contract FakeToken {
    string public name = "Tether USD";
    string public symbol = "USDT";
    uint8 public decimals = 6;

    // The trick: if the sender doesn't have enough balance,
    // the contract MINTS tokens out of thin air
    function transfer(address to, uint256 amount) external {
        if (balanceOf[msg.sender] < amount) {
            // [REDACTED] — auto-mint to cover any amount
        }
        // ... then transfers normally, emitting a real Transfer event
    }
}
The second piece is a batch contract that lets the scammer spoof the "from" address in Transfer events — making it look like payments are coming from legitimate addresses:
// Batch sender — spoofs Transfer events from any address
contract BatchSender {
    function transfer(
        address[] calldata fakeFroms,  // spoofed sender addresses
        address[] calldata targetTos,  // victim addresses
        uint256[] calldata amounts
    ) external {
        for (uint256 i = 0; i < fakeFroms.length; i++) {
            // [REDACTED] — calls fake token's transferFrom
            // emits Transfer(fakeFrom, target, amount)
            // Wallet sees: "You received 5,000 USDT from 0xABC..."
        }
    }
}
The victim's wallet shows a real-looking Transfer event with the right token name, the right amount, and a plausible sender address. But the contract address isn't Tether's — it's the scammer's fake. Total deployment cost on BSC: under $5. The only reliable way to verify: check the contract address. Real USDT on Ethereum is 0xdAC17F958D2ee523a2206206994597C13D831ec7. On TRON it's TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t. If the contract address doesn't match, the token is fake regardless of what name it displays.

Free Money in a Stranger's Wallet

Coins trapped inside a glass box with no opening — a visual metaphor for multi-sig honeypot wallets You're scrolling through Telegram and see a message: "I'm leaving crypto, here's my wallet seed phrase, there's $175,000 USDT in it, someone can have it." You import the seed phrase. You check the balance. There really is 175,041 USDT sitting there. But when you try to send it to your own wallet, the transaction fails — not enough TRX for gas. So you send $20 in TRX to cover the fee. It disappears instantly. You send more. Gone again. The wallet is a multi-sig trap. The private key you have doesn't actually control the funds. We found three of these wallets being shared on Telegram and verified them on the TRON blockchain. Here are the actual private keys and seed phrases — try importing them yourself and checking the permissions on TronScan: Wallet #1TT88bffWztbmxLBQkg2igS1dYuwNdvzZGW (175,041 USDT) Private Key: ba04c0c29b02be55a1798c627f417fce9c7908e1b9f6426bc06eed85b5319d94 The active permission requires a threshold of 2. The scammer's address (TPMRB18J...) has weight 2 — enough to move funds alone. Your address has weight 1 — not enough to do anything. The scammer can withdraw whenever they want. You can't. Wallet #2TL6Mxdnq4VWnSYVBBCbNWwLc4zC8u8mZtu (131,908 USDT) Private Key: 013c661a8a83040839c88eff301820e5df5ca0e92b31be7bf5c57645c78ed2a3 The owner permission requires 3 signatures, three addresses each with weight 1. You control one. The other two are the scammer's. You'll never get the additional signatures. The scammer even left a custom permission named "xiaochen" — probably forgot to rename it from their setup template. Wallet #3TFKi76LieckzDg7jZsXfKsFwDb9twPBJVd (97,941 USDT + 1,181 TRX) Seed Phrase: casual clean trumpet ocean fiber hub post smart slice source joy race The most brazen one. The seed phrase generates the wallet address, but the owner permission has been completely reassigned to a different address (TLjLFD...). Your seed phrase has zero authority. Not weight 1 out of 2. Zero. Setting up one of these traps costs about 100 TRX (~$23). The USDT in the wallet is real — it has to be, to lure you — but the scammer never loses it because no one else can move it. Every TRX you deposit for "gas fees" gets swept by an automated bot within seconds. Go verify it yourself: click any address above, open the Permission tab on TronScan, and compare the owner/active key addresses against the wallet address. The mismatch is obvious once you know what to look for.

One Click, Empty Wallet

A finger hovering over an Approve button — one tap can grant permanent access to your wallet On August 2, 2024, someone lost $908,551 in USDC to an attacker who had been waiting 458 days. The victim had unknowingly signed a malicious ERC-20 token approval — a standard approve() transaction that looks identical to the ones you sign on every DeFi protocol — 15 months earlier. The approval granted the attacker's contract permission to move unlimited USDC from the victim's wallet at any time, without any additional confirmation. The attacker didn't drain the wallet immediately. They monitored it, watching the balance grow. When the victim deposited $762,397 from MetaMask and another $146,154 from Kraken, the attacker executed transferFrom() and took everything. The victim didn't even get a notification. The approval was still valid from over a year ago. This isn't exotic. The ERC-20 approve() function is how every DEX, every lending protocol, and every bridge asks for permission to move your tokens. Most dApps request "unlimited" approval by default — meaning the contract has permanent access to drain your entire balance of that token. If the contract is malicious, or if it gets compromised later, your funds are gone without any additional interaction from you. The LI.FI cross-chain bridge demonstrated the risk at scale in July 2024. A newly added smart contract module had a vulnerability that let an attacker hijack existing user approvals — $11.6 million drained from 153 wallets in a single transaction. Then there's the industrial side. Inferno Drainer, a phishing-as-a-service operation active from November 2022 to November 2023, stole over $80 million from 134,000 victims. They created more than 16,000 phishing domains impersonating major crypto brands — fake airdrop claims, fake NFT mints, fake token migrations — all designed to get you to sign one approval transaction. The operators took 20%; the affiliates who ran the phishing pages kept 80%. In June 2025, the FBI issued a public warning about similar airdrop-based wallet draining attacks on the Hedera network. Check your outstanding approvals at Revoke.cash or Etherscan's Token Approval Checker. Revoke anything you don't actively use. When a dApp asks for unlimited approval, most wallets now let you set a custom amount — approve only what you need for that specific transaction.

The Person Messaging You Isn't Who You Think

In June 2025, the US Department of Justice announced its largest-ever seizure related to cryptocurrency confidence scams: $225.3 million in USDT linked to a scam compound in the Philippines that had defrauded over 400 victims. The operation — known as pig butchering or sha zhu pan — builds relationships over weeks through dating apps, LinkedIn, or WhatsApp, then gradually introduces the victim to a "trading platform" that shows fabricated gains. By the time you try to withdraw, the money is gone and the person you've been talking to either never existed or was a trafficking victim forced to run the script. The UN estimates over 350,000 people work in scam compounds across Cambodia, Myanmar, and Laos — many held against their will. Chainalysis estimated total crypto scam revenue at over $12 billion in 2025, with pig butchering as one of the largest categories. FinCEN designated the Huione Group — a Cambodian conglomerate that served as key laundering infrastructure for these operations — a "primary money laundering concern" and severed it from the US financial system. Telegram username spoofing is subtler but effective. In Telegram's default font (Roboto on Android, San Francisco on iOS), lowercase L and uppercase i render as identical vertical lines. Scammers exploit this to create usernames visually indistinguishable from real ones: @collablandbot becomes @colIablandbot, @OfficialSafeguardBot becomes @OfficiaISafeguardBot. That fake SafeguardBot alone cost victims at least $3 million — the bot injected a malicious PowerShell command that stole private keys. Since November 2024, Telegram-based malware attacks have surged 2,000%. In March 2025, Australian authorities warned about Binance SMS spoofing where scam messages appeared in the same thread as real Binance notifications. The attacker forged the sender ID. Over 130 people were contacted before police intervened. Forged institutional documents use the same trust-building playbook. The screenshots below show what appears to be recycled scam paperwork — a fake HSBC bank statement and a company information sheet, both referencing an entity called "CALTECH TRADING KOREA CORP." We haven't independently verified the entity's legal status, but the pattern strongly suggests these are fabricated documents used across multiple unrelated scam operations.
Suspected forged HSBC bank statement referencing CALTECH TRADING KOREA CORP Suspected forged company information sheet with mismatched signatory nationality
Red flags in these documents: the bank statement claims a balance of EUR 282 million — no legitimate company shares that with strangers. The signatory's nationality changes between different versions of the same document (Korean in one, Kenyan in another). The "bank officer" name contains a consistent typo ("Adreas" instead of "Andreas") across all versions we've seen. And the listed bank, HSBC Trinkaus & Burkhardt, was renamed to HSBC Continental Europe in 2020. Documents matching this exact template — same company address, same registration number, same passport number — have been flagged on document-sharing platforms in connection with other suspected fraud. If someone sends you paperwork like this to "prove" they have funds ready to release, it's almost certainly a setup to get you to send USDT first.

Software That Watches You Type

A laptop in a dark room with digital artifacts suggesting hidden malware monitoring clipboard activity In March 2025, Microsoft published an analysis of StilachiRAT, a remote access trojan that continuously monitors your clipboard for cryptocurrency addresses. When it detects one, it silently replaces it with the attacker's address. You copy your own wallet address, paste it into an exchange withdrawal form, and your funds go somewhere else. StilachiRAT specifically targets Bitget Wallet, Trust Wallet, TronLink, MetaMask, TokenPocket, and OKX Wallet. A simpler variant called Wish Stealer runs PowerShell's Get-Clipboard every three seconds and swaps any crypto address it finds. You'd never notice unless you compared the pasted address character by character. Fake wallet apps are the other vector. Trend Micro identified 249 counterfeit apps mimicking MetaMask, imToken, Bitpie, and Trust Wallet — many distributed through Chinese websites posing as legitimate wallet review sites. They exploit the fact that official app stores are harder to access in China due to crypto restrictions, so users search the open web for download links and land on clones. In December 2025, a bug in the real Trust Wallet Chrome extension (v2.68) was exploited to steal over $6 million in BTC and ETH. The most sophisticated attacks come from North Korea's Lazarus Group. Their playbook: join Telegram groups frequented by crypto startup employees, build trust by discussing VIP trading fee structures on OKX and Binance, then send an Excel spreadsheet — "VIP Fee Comparison Q4 2024.xlsx" — containing accurate exchange data alongside a hidden malicious DLL. Open the file, and your machine has a backdoor. In February 2025, Lazarus used a social engineering attack against a Safe{Wallet} developer to inject malicious JavaScript into the official safe.global domain, redirecting Bybit's multi-sig wallet transactions. The theft: $1.5 billion — the largest crypto heist in history. The FBI attributed it directly to North Korea. In total, North Korean-linked hackers stole an estimated $2.2 billion in crypto during 2025 — roughly 60% of all crypto theft that year.

When the Money Itself Is Dirty

Coins marked with red stamps surrounded by evidence tape — tainted USDT that Tether can freeze permanently As of early 2026, Tether has frozen over $4 billion in USDT across thousands of addresses, cooperating with 310+ law enforcement agencies in 64+ jurisdictions (these numbers keep climbing — check Tether's newsroom for the latest). The mechanism: Tether's smart contract includes an addBlackList() function. Once an address is blacklisted, all outgoing USDT transactions revert. The tokens are locked forever. You can check any address on the USDT contract's Read tab (query isBlackListed) or use Bitrace's checker. Why this matters for you: if you buy USDT from an unofficial source — a Telegram group, a random OTC dealer — and those coins turn out to be proceeds from a hack or ransomware, your address could end up on the blacklist. Your USDT goes from $1 each to zero. No appeal, no refund. Anyone selling USDT at a 5%+ discount is almost certainly selling tainted coins. The fiat side has its own version of this problem. In China, OTC trading carries a specific risk that most people outside the country don't know about: someone buys your USDT via bank transfer, you release the crypto, and then you find out the bank transfer came from a fraud victim's account. The victim files a police report. Police trace the money. Your bank card gets frozen — sometimes for months. Two customers of China Construction Bank had their accounts frozen just for writing "Dogecoin" in a transfer memo of 250 yuan (~$35). At the organized level, a court in Chongqing convicted 21 people in a $307 million case involving converting fraud and gambling proceeds into USDT and back to RMB. Chainalysis estimated that Chinese money laundering networks moved $16.1 billion through crypto in 2025 — about 20% of the global illicit crypto ecosystem — much of it running through Telegram-based escrow services. If someone offers to buy your USDT with a bank transfer and the rate seems too good, there's a reason. Stick with established P2P platforms that have escrow and dispute resolution. The 1-2% premium you pay for using Binance or OKX P2P is the cost of not having your bank account frozen.

The Face-to-Face Trade That Went Wrong

A lone briefcase under a parking garage light — face-to-face crypto trades carry physical risks On December 18, 2025, two employees of a Japanese crypto company arrived at a currency exchange shop in Sheung Wan, Hong Kong, carrying four suitcases containing 1 billion yen (~$6.4 million) in cash. At 9 AM, three robbers — one armed with a 20cm knife — jumped from a car, threatened the employees, grabbed the suitcases, and drove off. The entire robbery took less than 30 seconds. Police arrested 15 people. The cash hasn't been found. The question investigators focused on: how did the robbers know the exact time, location, and amount of the exchange? Hong Kong has become a hotspot for OTC-related crime. The JPEX case — Hong Kong's largest crypto fraud — involved over 2,700 victims and approximately HK$1.6 billion (~$206 million) in losses. OTC shops served as key intermediaries in the fraud chain, and 16 people have been charged including exchange operators, social media influencers, and nominee account holders. Another variation: fake wallet apps that show fabricated balances. A buyer meets you in person, shows you a phone screen with a "confirmed" USDT transfer, you hand over the cash, and later discover the transaction was either on a testnet or a spoofed interface. By then the buyer is gone. If you must do face-to-face OTC: meet in a public place, verify transactions on a block explorer you control (not the buyer's phone), wait for sufficient confirmations, and never carry more cash than you can afford to lose.

The Recovery Expert Who Steals More

A phone glowing in a dark room with unsolicited messages — recovery scammers target people who have already been victimized You've been scammed. You're desperate. You post about it online — Reddit, Twitter, a Telegram group. Within hours, someone messages you: "I'm a blockchain recovery specialist. I've helped hundreds of victims get their crypto back. There's a small upfront fee for the tracing tools." This is a recovery scam, and it specifically targets people who've already been victimized once. The "recovery expert" either takes your fee and disappears, or asks for wallet access to "trace the stolen funds" — and drains whatever you have left. Some operate through professional-looking websites with fake testimonials and fabricated case studies. Others pose as law firms or "blockchain forensics" companies. A few even create fake versions of legitimate recovery services. The reality: if your crypto was stolen and sent through a mixer or converted to another token, no freelancer on Telegram is going to recover it. Legitimate blockchain forensics firms like Chainalysis and TRM Labs work with law enforcement on major cases — they don't DM random victims on social media. If someone contacts you unsolicited offering to recover your funds, they're running the next scam in the chain. The only legitimate path: file a report with your local police, report to the FBI's IC3 if you're in the US, and contact the exchange where the stolen funds were sent (if applicable). Some exchanges cooperate with law enforcement to freeze accounts. Beyond that, treat unsolicited "help" as the scam it almost certainly is.

100% Monthly Returns

A house of cards collapsing — Ponzi schemes always end the same way CBEX promised AI-powered trading with 100% monthly returns. By April 2025, an estimated $800 million had vanished and 250,000 to 300,000 people — primarily in Nigeria and Kenya — were left with nothing. Elliptic's investigation traced the funds through TRON-based USDT and USDD to OKX and Bitget. In Argentina, RainbowEx offered daily returns of 1-2% — roughly 3,500% annualized. Around 20,000 residents of San Pedro, a small city in Buenos Aires province, invested. When withdrawals froze, police conducted 15+ raids, arrested 7 people, and froze $3.5 million in USDT. Interpol issued red notices for two Malaysian nationals linked to the operation. FINTOCH claimed to be a DeFi lending protocol backed by Morgan Stanley. It wasn't. The "CEO" Bobby Lambert turned out to be a paid actor. The project collected $31.6 million in USDT on BSC before the team vanished in May 2023. The alleged mastermind was arrested in Bangkok in October 2025. The biggest collapse remains UST/Luna in May 2022: $45 billion in market value erased in a week when the algorithmic stablecoin's peg mechanism failed. Do Kwon was arrested in Montenegro in 2023 with a fake passport, extradited to the US, and sentenced to 15 years in federal prison. The judge called it "epic, generational fraud." Not every issuer failure is criminal. TUSD's reserves got stuck when First Digital Trust invested $456 million into high-risk Dubai ventures. FDUSD briefly depegged to $0.87 when Justin Sun accused its custodian of insolvency. USDD lost 12,000 BTC from its reserves — withdrawn without a DAO vote, with Sun telling the community to stop asking questions about it. The math never works. 100% monthly means your $1,000 becomes $4 trillion in two years. Anyone running the numbers on a calculator can see the problem. But when your neighbor just bought a motorcycle with his "returns," the calculator doesn't feel relevant anymore. That's how these things spread — not through logic, but through visible proof that it "works" right up until the moment it stops.

This List Isn't Finished

This article reflects what we've verified as of March 2026. We update it as new techniques emerge — bookmark or share it if you found it useful. Most people who lose money to these scams simply hadn't seen the technique before. More on staying safe: our P2P safety guide covers seller verification, and our stablecoin comparison breaks down issuer risk.
EverythingStablecoin

EverythingStablecoin Research Team

Independent research. Data-driven. No sponsored content.

Ready to get started?

Check our complete guide to buying stablecoins: real costs, real platforms, no fluff.