{"id":16108,"date":"2026-03-07T10:31:21","date_gmt":"2026-03-07T17:31:21","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=16108"},"modified":"2026-03-07T16:11:04","modified_gmt":"2026-03-07T23:11:04","slug":"what-is-a-crypto-dusting-attack","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/03\/07\/what-is-a-crypto-dusting-attack\/","title":{"rendered":"What Is a Crypto Dusting Attack?"},"content":{"rendered":"\n<p>Since I was hit by a dusting attack today on a cold <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/09\/12\/the-case-for-the-only-cryptocurrency-of-value-bitcoin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin<\/a> wallet, it would be fun to cover the topic with a good write up below. Looking at mine, they picked a lot of addresses with a similar amount of Bitcoin to dust from the same address. They&#8217;re looking for you to include the dust UTXO in transactions with your main amount UTXO they targeted, related to the address they reused, to try and identify you and your wallet by following later transactions to one they can link to your identity. A good wallet will flag it for the address being reused, with the ability to freeze it, generally the recommended option. Though, I&#8217;m having more fun with mine by combining it with funds from another hot wallet and then converting it to Liquid Bitcoin where blockchain tracking related to me will be lost. You could also convert it to another cryptocurrency and back later as well. I suspect one of the chain analysis firms trying to identify people and their wallets, but it could be hackers or researchers. They&#8217;re paying $0.10 per transaction, and there were a lot from the address that sent the dust to me, over 14,000 costing over $1,400 in fees plus the dust. And if I&#8217;m right, that&#8217;s our tax dollars, probably the same for research too. I once had one of these attacks hit a hot wallet with only a couple hundred dollars, so it doesn&#8217;t have to be related to a specific amount. Of course I spent more than they sent me, but I enjoy sending them on a wild goose chase and getting rid of the UTXO. Consequently, it&#8217;s disrespectful behavior by whoever is behind it, but what else would you expect from our government. Also, a nice feature of the <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/11\/08\/bull-bitcoin-wallet\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bull Bitcoin Wallet<\/a> is the <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/02\/18\/you-can-now-make-tax-deductible-donations-to-fund-bitcoin-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Payjoin<\/a> feature that masks transactions cheaply, hopefully to see more adoption by all wallets.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gemini.com\/cryptopedia\/crypto-dusting-attack-bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gemini.com\/cryptopedia\/crypto-dusting-attack-bitcoin<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_fa1d5ca9-ad96-4bb8-8359-d25332f62c02\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<h5 class=\"wp-block-heading\">Sometimes, a crypto dusting attack is not an attack at all. This technique that traces wallet addresses can be deployed for a number of reasons.<\/h5>\n\n\n\n<p>By Cryptopedia Staff<\/p>\n\n\n\n<p>Updated February 26, 2025<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.ctfassets.net\/0idwgenf7ije\/4LLzAFBeyZkJcEKpRUILu9\/6a55824f18e6523554ca26549edb91ee\/Gemini-What_Is_a_Crypto_Dusting_Attack_.png?fm=webp&amp;w=1024&amp;q=100\" alt=\"Gemini-What Is a Crypto Dusting Attack\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Summary<\/h4>\n\n\n\n<p>A dusting attack is an attack in which a trace amount of crypto, called dust, is sent to thousands \u2014 sometimes even hundreds of thousands \u2014 of wallet addresses. This attack is deployed in order to track these addresses with the hope of \u201cun-masking\u201d or de-anonymizing them. Dust is found on most public blockchains, including Bitcoin, Litecoin, Bitcoin Cash, and Dogecoin, among others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section-who-would-perform-a-dusting-attack\">Who Would Perform a Dusting Attack?<\/h2>\n\n\n\n<p>There are a number of groups that perform <a href=\"https:\/\/www.gemini.com\/cryptopedia\/glossary#dusting-attack\">dusting attacks<\/a>. Criminals have used dusting attacks to de-anonymize those with large cryptocurrency holdings. Those with large holdings can be targeted in a number of ways, including through <a href=\"https:\/\/www.gemini.com\/cryptopedia\/what-is-phishing-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\">phishing scams<\/a> and cyber-extortion. Users with large crypto holdings in high-risk areas could also be physically targeted, or even have a family member kidnapped for a cryptocurrency ransom.<\/p>\n\n\n\n<p>A branch of the government such as a tax or law enforcement agency may also perform a dusting attack in order to connect a person or group to an address. Specifically, they may target gangs that deal in contraband, large criminal networks, money launderers, or tax evaders. <strong>Mass dusting is also used by blockchain analytics firms, who study <a href=\"https:\/\/www.gemini.com\/cryptopedia\/basics-of-crypto-dusting\" target=\"_blank\" rel=\"noreferrer noopener\">crypto dust<\/a> for academic purposes or have contracts with government agencies.<\/strong><\/p>\n\n\n\n<p>Importantly, the person or group that executes the dusting attack and the party that analyzes the results don\u2019t need to be the same. Because it\u2019s on the blockchain, anyone with the skills, tools, and time can analyze the crypto dust after an attack. A criminal organization could study a government\u2019s dusting, or a blockchain analytics firm could study a malicious actor&#8217;s dusting.<\/p>\n\n\n\n<p>For this reason, not all dust attacks are considered \u201cattacks.\u201d The mass spreading of dust has also been used to advertise to cryptocurrency users, primarily by sending out messages included in the crypto dust, comparable to an email blast. You may know that the <a href=\"https:\/\/www.gemini.com\/cryptopedia\/glossary#genesis-block\">genesis block<\/a> of <a href=\"https:\/\/www.gemini.com\/cryptopedia\/bitcoin-satoshi-nakamoto-genesis\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin<\/a> (the first block of bitcoin ever mined) included a message.<\/p>\n\n\n\n<p>These mass dustings may also be used as stress tests, where a large amount of crypto dust is sent in a short amount of time to test the throughput, or bandwidth, of a network. Dustings are also sometimes used as a way to spam a network, by sending huge batches of worthless transactions that clog and slow it down considerably. Whatever the intended purpose, mass dustings can be analyzed for various purposes, both good or bad.<\/p>\n\n\n\n<p>Dusting can also be used as a defensive tool. Let\u2019s say that a large criminal enterprise receives a tip that the authorities are closing in on them. The cyber criminals could dust numerous random wallets to spread the dirty money around in an attempt to throw the authorities off their trail.<\/p>\n\n\n\n<p>There is some debate about how traceable addresses are in dusting attacks. As blockchain analytics improve, better countermeasures emerge. Many governments and firms consider their technology as proprietary and keep it closely guarded. Can you still be traced through dusting despite the various precautions available? We really don\u2019t know yet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section-costs-associated-with-dusting\">Costs Associated With Dusting<\/h2>\n\n\n\n<p>The fees associated with dust attacks are often more than the amount of dust spent. Even though the crypto dust of thousands of wallets may not be significant, attackers still have to pay network fees to deploy a dusting attack. As fees have gone up on the Bitcoin blockchain, bitcoin dust attacks seem to have waned in popularity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section-how-can-you-avoid-dusting-attacks\">How Can You Avoid Dusting Attacks?<\/h2>\n\n\n\n<p>Using a <a href=\"https:\/\/www.gemini.com\/cryptopedia\/hd-crypto-wallets-hierachichal-deterministic\" target=\"_blank\" rel=\"noreferrer noopener\">hierarchical-deterministic (HD) wallet<\/a>, which creates new addresses each time you transact, makes it harder to trace you. Some wallets also show dust <a href=\"https:\/\/www.gemini.com\/cryptopedia\/glossary#unspent-transaction-output-utxo\">UTXOs (unspent transaction outputs)<\/a>, which you can mark \u201cdo not spend.\u201d These small amounts are then left in your wallet, and if you never use them, no one can track where they go. Others wallets only go online using the <a href=\"https:\/\/www.gemini.com\/cryptopedia\/glossary#tor-browser\">Tor Network<\/a> or a <a href=\"https:\/\/www.gemini.com\/cryptopedia\/glossary#virtual-private-network-vpn\">VPN<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"section-should-you-be-worried-about-getting-dusted\">Should You Be Worried About Getting Dusted?<\/h2>\n\n\n\n<p>Unless you\u2019re a whale (a person with large holdings) or live in an area where personal safety, security or political instability is a common problem, dust attacks are more of an annoyance than a real concern. Crypto dust in your wallet doesn\u2019t give anyone control of your funds. The privacy measures new wallets and exchanges have implemented have greatly reduced common concerns around dusting. If you see tiny random transactions in your wallet, you\u2019re not imagining things \u2014 it\u2019s just a little \u201cdust.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since I was hit by a dusting attack today on a cold Bitcoin wallet, it would be fun to cover the topic with a good write up below. Looking at mine, they picked a lot of addresses with a similar amount of Bitcoin to dust from the same address. They&#8217;re looking for you to include [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-16108","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=16108"}],"version-history":[{"count":4,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16108\/revisions"}],"predecessor-version":[{"id":16119,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16108\/revisions\/16119"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=16108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=16108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=16108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}