A dusting attack is a privacy-compromising tactic used by malicious actors, analytics firms, or law enforcement to de-anonymise blockchain users. The attacker sends tiny, near-worthless amounts of cryptocurrency ("dust") to many wallet addresses, then monitors how those dust amounts are subsequently used to link wallets to real identities.
HOW DUSTING ATTACKS WORK
The attacker sends small amounts of cryptocurrency (often just a few hundred satoshis or equivalent) to thousands of targeted wallet addresses. This dust sits in the wallets. When recipients later make transactions buying, selling, or transferring crypto wallet software often consolidates all available UTXOs (including the dust) into a single transaction. This consolidation reveals that all the input addresses in that transaction are controlled by the same person or entity, allowing the attacker to cluster multiple addresses together as belonging to one wallet owner. By cross-referencing this cluster with KYC data from exchanges, IP address tracking, or social media, attackers can link blockchain addresses to real-world identities.
WHO CONDUCTS DUSTING ATTACKS
Blockchain analytics companies (Chainalysis, Elliptic) use similar techniques for legitimate regulatory compliance and law enforcement assistance. Malicious actors use dusting to identify high-value targets for phishing, extortion, or theft. Ransomware operators and scammers use dusting to verify wallet activity before targeted attacks.
HOW TO PROTECT YOURSELF FROM DUSTING ATTACKS
Do not spend unexpected tiny deposits: If you receive small, unsolicited amounts of crypto, do not consolidate them with your existing UTXOs. Reputable wallets like Wasabi Wallet (Bitcoin) allow you to mark UTXOs as "Do Not Spend" freezing the dust so it is never included in future transactions.
Use privacy-enhanced wallets: Wallets with built-in CoinJoin (Wasabi) or coin selection controls prevent automatic dust consolidation.
Monitor incoming transactions: Unexpected tiny deposits to multiple addresses you control warrant investigation before any transactions from those addresses.
Use separate wallets: Maintain separate wallets for different purposes so even successful dusting reveals only a limited picture of your total holdings.