
A dust attack is an on-chain privacy attack in which an attacker sends tiny amounts of cryptocurrency to numerous wallet addresses, aiming to entice recipients into interacting with these funds. Once victims use or transfer the "dust," blockchain analysis tools can link multiple addresses to the same entity. Dust attacks often serve as a precursor to phishing, extortion, or targeted harassment.
In practice, attackers send very small amounts of assets (such as fractions of a Bitcoin or unfamiliar ERC-20 tokens) to many addresses, then monitor whether recipients spend or move the dust along with other assets. If this occurs, blockchain analytics can more easily associate those addresses with a single user.
Dust attacks exploit the pseudonymous nature of crypto addresses. If attackers can map multiple addresses to a single person, their chances of successful scams increase. The cost to conduct dust attacks is low and the process can be automated at scale. For attackers, the expense of sending tiny transactions is usually much less than the potential rewards of uncovering private information.
Between 2019 and 2024, the community has frequently observed such behavior on Bitcoin and EVM-based chains. During periods of low network fees, batch dusting becomes more feasible, as sending small transactions is cheaper and attacks can scale up.
The core principle of a dust attack is behavioral deanonymization. Attackers send micro-transactions and wait for victims to combine them with their other funds in future transactions, allowing address clustering—grouping apparently independent addresses into one user profile.
On Bitcoin, which uses the UTXO accounting model, you can think of each UTXO as a separate “note” of varying denominations. When you spend Bitcoin, your wallet may combine several UTXOs in one transaction. If one includes dust sent by an attacker, your various Bitcoin addresses become linked by on-chain behavior. Wallets supporting Coin Control allow users to manually select which UTXOs to spend, reducing this risk.
On Ethereum and similar account-based blockchains, balances aren’t split into individual notes. Dust often appears as unfamiliar tokens, NFTs, or random airdrops. The risk is not merging UTXOs but interacting with, transferring, or approving (authorize) these unknown tokens—potentially leading users to phishing sites or malicious contracts.
On Bitcoin, dust attacks typically involve mass transfers of tiny UTXO amounts. If your wallet spends these UTXOs together with others, address linkage becomes clearer.
On Ethereum, BSC, and other EVM chains, dust often takes the form of unfamiliar tokens or NFTs suddenly appearing in your wallet. These tokens may mimic popular projects and include transaction notes or website links prompting you to “claim rewards”—which are actually phishing attempts or authorization traps.
On low-fee networks and certain Layer 2 solutions, the cost of mass dusting is even lower, making spam airdrops and micro-transfers more common. When fees rise, such activity typically declines.
Frequent dust attack scenarios include:
Key indicators include: unexpected incoming transfers from unknown sources, very small amounts, and the sudden appearance of unfamiliar tokens or NFTs.
Step 1: Review sender addresses and transaction notes. Be cautious if you receive funds from newly generated addresses sending tiny amounts to many people, especially if the transaction includes external links.
Step 2: Use a block explorer to check transaction patterns for batches of similar micro-transfers from the same source within a short period—classic signs of dusting.
Step 3: Mark or hide unfamiliar small assets on your wallet or exchange asset page to avoid further interaction. On Gate’s asset page, verify any fund changes against recent activity before withdrawing or bridging; avoid immediate engagement with suspicious deposits.
Effective response strategies are “don’t interact” and “segregate management.”
Step 1: Do not claim, transfer, or approve unfamiliar tokens. Avoid clicking any links or “reward” prompts attached to these transactions.
Step 2 (Bitcoin): Use wallets with Coin Control features to manually exclude dust UTXOs from spending and prevent mixing dust with regular funds.
Step 3 (Ethereum/EVM): Check your wallet’s approval list regularly and revoke unnecessary token authorizations using reputable permission management tools.
Step 4: Practice cold-hot wallet separation. Keep frequently used wallets apart from long-term storage wallets; avoid mixing addresses that have received dust with main fund addresses.
Step 5: Retain evidence and enhance security. Enable two-factor authentication, set strong passwords and anti-phishing codes; always verify messages or calls claiming to be customer support through official channels.
On exchanges like Gate, your custodial account is managed by the platform on-chain. Receiving unfamiliar small deposits won’t force you to spend dust; however, when withdrawing to a non-custodial wallet, ensure you don’t mix dust funds with your main holdings—use segregation first before interacting with primary addresses.
Typical Gate procedures include:
For non-custodial wallets, regularly review authorizations and transaction history; avoid interacting with unfamiliar contracts. In Bitcoin wallets, manual coin control significantly reduces the chance of combining dust UTXOs.
Privacy risks: Interacting with dust makes it easier for attackers to cluster multiple addresses under one identity, enabling targeted phishing or extortion campaigns. Financial risks: Authorizing unknown tokens or visiting phishing sites may result in asset theft or being lured into refund/fee scams by fake customer support.
Compliance risks: If your address interacts with flagged suspicious addresses, future compliance checks may become stricter—withdrawals or cross-chain operations might require more explanation and time.
At its core, a dust attack aims to trigger your on-chain activity via micro-deposits, then use behavioral analysis to link addresses. Warning signs include unidentified sources, minuscule amounts, and sudden appearances of unknown tokens or NFTs. The best defense is not interacting or approving these assets and managing them in isolation; use manual coin control for Bitcoin and regularly revoke authorizations on EVM chains. In custodial environments like Gate, enable withdrawal whitelists and anti-phishing codes and minimize interaction with unknown addresses. For any operation involving asset safety, proceed slowly—every extra verification adds another layer of protection.
Not necessarily. A dust attack involves an attacker sending tiny tokens to your wallet specifically to track your funds or provoke privacy-leaking interactions. Routine airdrops or test transactions are not dust attacks. Key signs include suspicious sources, abnormal follow-up transactions, and newly created junk tokens. It’s best not to interact with these funds immediately; observe for a few days before deciding.
No. The dust itself doesn’t directly steal assets; rather, attackers use it to analyze your transaction patterns and gather private information for targeted scams. Direct financial loss only occurs if you mistakenly interact with malicious smart contracts—for example, approving transfers or signing harmful transactions. The real risk lies in being tricked into unsafe actions, not from simply receiving dust tokens.
Gate is a centralized exchange where user funds are held in platform wallets rather than exposed directly on public blockchains, significantly reducing dust attack risk. Dust attacks mainly threaten users of on-chain wallets like MetaMask or hardware wallets. However, after withdrawing from Gate to a non-custodial wallet, remain vigilant and avoid interacting with suspicious addresses or contracts.
Dust tokens typically share these traits: sent from unknown or newly created wallets; very small amounts (often less than $1); vague information or no practical use; no project details found online. Legitimate airdrops usually come from reputable projects with clear backgrounds and verifiable contract details in block explorers. Develop good habits: always research token contracts on Etherscan or similar before deciding whether to interact.
Immediately check your wallet permissions using tools like Revoke.cash for unauthorized contract approvals and revoke them if necessary. Boost account security monitoring and check your assets regularly; avoid high-value transactions from affected wallets. If sensitive identity information is linked (e.g., wallet tied to personal data), consider switching wallets or handling operations via trusted platforms like Gate. Most importantly, refresh your security awareness—remain vigilant about unfamiliar deposits in the future.


