Bitcoin's security fundamentally relies on the cryptographic strength of its address generation mechanisms. Vanity addresses-Bitcoin addresses containing customized patterns-have traditionally been considered a benign personalization feature within the cryptocurrency community. However, this paper introduces and explores the Dual Vanity Address Attack, a novel security vulnerability that leverages the ability to generate addresses matching both specified prefixes and suffixes in the Pay-to-Pubkey-Hash (P2PKH) address format. By exploiting advanced computational techniques, including multiprocessing and asynchronous programming, attackers can feasibly generate Bitcoin addresses that collide with target addresses in both the prefix and suffix regions. This capability undermines the assumed randomness of address generation, potentially enabling malicious actors to impersonate legitimate users, redirect funds, or facilitate phishing attacks. Our implementation demonstrates that while the generation of such dual-pattern addresses is computationally intensive, it is achievable with sufficient resources and optimization strategies. We provide a detailed analysis of the computational feasibility of this attack, discuss its implications for Bitcoin's security, and highlight the risks it poses to the broader cryptocurrency ecosystem. Furthermore, we examine the limitations of current cryptographic practices in preventing such vulnerabilities and suggest potential countermeasures. This work serves as a critical warning to the blockchain community about the emerging threats posed by advanced address manipulation techniques and emphasizes the urgent need for enhanced security protocols to safeguard users against the Dual Vanity Address Attack.