{"id":1045,"date":"2026-04-03T18:00:36","date_gmt":"2026-04-03T21:00:36","guid":{"rendered":"https:\/\/numeralblock.com.ar\/?p=1045"},"modified":"2026-03-16T18:04:27","modified_gmt":"2026-03-16T21:04:27","slug":"como-opera-la-estafa-que-facilita-fusaka","status":"publish","type":"post","link":"https:\/\/numeralblock.com.ar\/?p=1045","title":{"rendered":"\u00bfC\u00f3mo opera la estafa que facilita Fusaka?"},"content":{"rendered":"<p>Detr\u00e1s del aumento de las estafas se\u00f1aladas por el equipo de Etherscan se encuentran las llamadas \u00abtransferencias de polvo\u00bb (dust transfers, en ingl\u00e9s), que son el principal vector que usan los hackers para ejecutar el envenenamiento de direcciones y hackear wallets.<\/p>\n<p>Una direcci\u00f3n envenenada es una direcci\u00f3n de wallet falsa, dise\u00f1ada para imitar a una leg\u00edtima, que los atacantes insertan en el historial de transacciones de un usuario para que la copie por error y les env\u00ede fondos sin saberlo.<\/p>\n<p>El mecanismo funciona as\u00ed: los atacantes monitorean la red Ethereum usando sistemas automatizados para detectar operaciones leg\u00edtimas de los usuarios. Luego, generan una direcci\u00f3n falsa que imita exclusivamente los primeros y \u00faltimos caracteres de la direcci\u00f3n con la que ese usuario acaba de operar.<\/p>\n<p>Desde esa direcci\u00f3n falsa, el atacante efect\u00faa una \u00abtransferencia de polvo\u00bb que consta de un env\u00edo m\u00ednimo (por debajo de USD 0,01) a la wallet de la v\u00edctima. El \u00fanico prop\u00f3sito de ese env\u00edo es que la direcci\u00f3n falsa quede registrada en el historial de transacciones.<\/p>\n<p>La pr\u00f3xima vez que la v\u00edctima necesite enviar fondos, si copia la direcci\u00f3n desde ese historial sin verificar cada car\u00e1cter, terminar\u00e1 enviando el dinero al atacante.<\/p>\n<p>La imagen a continuaci\u00f3n, registrada por Etherscan, ilustra la escala y velocidad de estos ataques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Detr\u00e1s del aumento de las estafas se\u00f1aladas por el equipo de Etherscan se encuentran las llamadas \u00abtransferencias de polvo\u00bb (dust transfers, en ingl\u00e9s), que son el principal vector que usan los hackers para ejecutar el envenenamiento de direcciones y hackear wallets. Una direcci\u00f3n envenenada es una direcci\u00f3n de wallet falsa, dise\u00f1ada para imitar a una&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[148],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/numeralblock.com.ar\/?p=1045\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block\" \/>\n<meta property=\"og:description\" content=\"Detr\u00e1s del aumento de las estafas se\u00f1aladas por el equipo de Etherscan se encuentran las llamadas \u00abtransferencias de polvo\u00bb (dust transfers, en ingl\u00e9s), que son el principal vector que usan los hackers para ejecutar el envenenamiento de direcciones y hackear wallets. Una direcci\u00f3n envenenada es una direcci\u00f3n de wallet falsa, dise\u00f1ada para imitar a una...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/numeralblock.com.ar\/?p=1045\" \/>\n<meta property=\"og:site_name\" content=\"Numeral Block\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-03T21:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T21:04:27+00:00\" \/>\n<meta name=\"author\" content=\"Webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/numeralblock.com.ar\/?p=1045\",\"url\":\"https:\/\/numeralblock.com.ar\/?p=1045\",\"name\":\"\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block\",\"isPartOf\":{\"@id\":\"https:\/\/numeralblock.com.ar\/#website\"},\"datePublished\":\"2026-04-03T21:00:36+00:00\",\"dateModified\":\"2026-03-16T21:04:27+00:00\",\"author\":{\"@id\":\"https:\/\/numeralblock.com.ar\/#\/schema\/person\/28abd36c058ca073399ac35410027dd1\"},\"breadcrumb\":{\"@id\":\"https:\/\/numeralblock.com.ar\/?p=1045#breadcrumb\"},\"inLanguage\":\"es-AR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/numeralblock.com.ar\/?p=1045\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/numeralblock.com.ar\/?p=1045#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/numeralblock.com.ar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo opera la estafa que facilita Fusaka?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/numeralblock.com.ar\/#website\",\"url\":\"https:\/\/numeralblock.com.ar\/\",\"name\":\"Numeral Block\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/numeralblock.com.ar\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-AR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/numeralblock.com.ar\/#\/schema\/person\/28abd36c058ca073399ac35410027dd1\",\"name\":\"Webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\/\/numeralblock.com.ar\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dae3ca5a32f4f1c16ddfda39e9a653e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dae3ca5a32f4f1c16ddfda39e9a653e5?s=96&d=mm&r=g\",\"caption\":\"Webmaster\"},\"sameAs\":[\"https:\/\/numeralblock.com.ar\"],\"url\":\"https:\/\/numeralblock.com.ar\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/numeralblock.com.ar\/?p=1045","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block","og_description":"Detr\u00e1s del aumento de las estafas se\u00f1aladas por el equipo de Etherscan se encuentran las llamadas \u00abtransferencias de polvo\u00bb (dust transfers, en ingl\u00e9s), que son el principal vector que usan los hackers para ejecutar el envenenamiento de direcciones y hackear wallets. Una direcci\u00f3n envenenada es una direcci\u00f3n de wallet falsa, dise\u00f1ada para imitar a una...","og_url":"https:\/\/numeralblock.com.ar\/?p=1045","og_site_name":"Numeral Block","article_published_time":"2026-04-03T21:00:36+00:00","article_modified_time":"2026-03-16T21:04:27+00:00","author":"Webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Webmaster","Est. reading time":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/numeralblock.com.ar\/?p=1045","url":"https:\/\/numeralblock.com.ar\/?p=1045","name":"\u00bfC\u00f3mo opera la estafa que facilita Fusaka? - Numeral Block","isPartOf":{"@id":"https:\/\/numeralblock.com.ar\/#website"},"datePublished":"2026-04-03T21:00:36+00:00","dateModified":"2026-03-16T21:04:27+00:00","author":{"@id":"https:\/\/numeralblock.com.ar\/#\/schema\/person\/28abd36c058ca073399ac35410027dd1"},"breadcrumb":{"@id":"https:\/\/numeralblock.com.ar\/?p=1045#breadcrumb"},"inLanguage":"es-AR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/numeralblock.com.ar\/?p=1045"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/numeralblock.com.ar\/?p=1045#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/numeralblock.com.ar\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo opera la estafa que facilita Fusaka?"}]},{"@type":"WebSite","@id":"https:\/\/numeralblock.com.ar\/#website","url":"https:\/\/numeralblock.com.ar\/","name":"Numeral Block","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/numeralblock.com.ar\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-AR"},{"@type":"Person","@id":"https:\/\/numeralblock.com.ar\/#\/schema\/person\/28abd36c058ca073399ac35410027dd1","name":"Webmaster","image":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/numeralblock.com.ar\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dae3ca5a32f4f1c16ddfda39e9a653e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dae3ca5a32f4f1c16ddfda39e9a653e5?s=96&d=mm&r=g","caption":"Webmaster"},"sameAs":["https:\/\/numeralblock.com.ar"],"url":"https:\/\/numeralblock.com.ar\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/posts\/1045"}],"collection":[{"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1045"}],"version-history":[{"count":1,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/posts\/1045\/revisions"}],"predecessor-version":[{"id":1046,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=\/wp\/v2\/posts\/1045\/revisions\/1046"}],"wp:attachment":[{"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/numeralblock.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}