Dust Attack
What is Dust Attack?
Dust AttackA dust attack sends tiny amounts of cryptocurrency to many wallets so that, when the recipients later spend the dust, on-chain analysts can cluster and de-anonymize the addresses.
In a dust attack, an actor floods many wallet addresses with economically negligible 'dust' (fractions of a satoshi or wei). The dust itself is harmless, but if a wallet aggregates inputs across UTXOs or addresses, the dust co-spends reveal common ownership and let analysts merge clusters in the address graph. Dust attacks are used by chain-analysis firms, law enforcement, advertisers, and adversaries to map exchange customers, identify high-value targets, or unmask privacy-coin users. Modern wallets defend with coin-control, automatic dust filtering, separate accounts per purpose, and integration with privacy tools that avoid combining tainted UTXOs.
● Examples
- 01
An attacker dusts thousands of BTC addresses; later spending links a victim's hot wallet to a known exchange deposit.
- 02
Tagging service-affiliated wallets with dust to monitor flows for compliance research.
● Frequently asked questions
What is Dust Attack?
A dust attack sends tiny amounts of cryptocurrency to many wallets so that, when the recipients later spend the dust, on-chain analysts can cluster and de-anonymize the addresses. It belongs to the Web3 & Blockchain category of cybersecurity.
What does Dust Attack mean?
A dust attack sends tiny amounts of cryptocurrency to many wallets so that, when the recipients later spend the dust, on-chain analysts can cluster and de-anonymize the addresses.
How does Dust Attack work?
In a dust attack, an actor floods many wallet addresses with economically negligible 'dust' (fractions of a satoshi or wei). The dust itself is harmless, but if a wallet aggregates inputs across UTXOs or addresses, the dust co-spends reveal common ownership and let analysts merge clusters in the address graph. Dust attacks are used by chain-analysis firms, law enforcement, advertisers, and adversaries to map exchange customers, identify high-value targets, or unmask privacy-coin users. Modern wallets defend with coin-control, automatic dust filtering, separate accounts per purpose, and integration with privacy tools that avoid combining tainted UTXOs.
How do you defend against Dust Attack?
Defences for Dust Attack typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Dust Attack?
Common alternative names include: Crypto dusting, Dusting attack.
● Related terms
- web3№ 243
Cryptocurrency Mixer / Tumbler
A cryptocurrency mixer (or tumbler) pools and shuffles deposits from many users so that on-chain links between source and destination addresses are obscured.
- web3№ 016
Address Poisoning
Address poisoning seeds a victim's transaction history with attacker-controlled lookalike addresses so they later copy-paste the wrong one and send funds to the attacker.
- web3№ 181
Clipboard Hijacker
A clipboard hijacker (crypto clipper) is malware that watches the OS clipboard and silently substitutes a victim's copied cryptocurrency address with one controlled by the attacker.