Trust Wallet, the non-custodial cryptocurrency wallet, has launched a new security feature called Address Poisoning Protection designed to combat one of the fastest-growing threats in crypto. The feature automatically screens destination addresses against a database of known scam and lookalike wallets to prevent users from sending funds to malicious actors.
The rollout initially covers 32 Ethereum Virtual Machine (EVM)-compatible blockchains, including Ethereum (ETH), BNB Smart Chain (BNB), Polygon (MATIC), Optimism (OP), Arbitrum (ARB), Avalanche (AVAX), and Base. The tool uses aggregated intelligence from security partners HashDit and Binance Security to cross-check addresses and creates a side-by-side comparison to show users where addresses differ.
Trust Wallet CEO Felix Fan emphasized the stealthy nature of the threat, stating, "The threat is designed to be invisible: a handful of characters buried in the middle of a long string, easy to miss and expensive to ignore. Address Poisoning Protection is our response to that reality: automatic, real-time alerts that give users the information they need before they act."
The company highlighted the severity of the problem, citing over 225 million address poisoning attacks to date with confirmed losses exceeding $500 million. Recent high-profile incidents include a single victim losing $50 million in Tether (USDT) in December 2025, and another two investors collectively losing $62 million. Security firm Cyvers reports detecting over 1 million address-poisoning "preparations" per day on Ethereum alone.
This move follows public pressure from industry leaders, including former Binance CEO Changpeng Zhao, who in December 2025 called on all wallets to implement checks for poison addresses. The feature builds upon Trust Wallet's existing Security Scanner, introduced in 2023, but operates earlier in the transaction process—the moment a user copies or enters a destination address.
The launch comes shortly after a security incident in late December 2025, where Trust Wallet's Chrome browser extension was compromised in a supply chain attack, resulting in estimated user losses between $7 million and $8.5 million. The company stated it has covered those losses and released a patched version.