Citi: Ethereum Record Traffic is ‘Industrial’ Address Poisoning, Not Adoption

The Lead

Global banking giant Citi has moved to debunk Ethereum’s recent on-chain milestones, attributing the network’s record 2.9 million daily transactions to an “industrial-scale” scam vector rather than organic adoption. In a client note reported by CoinDesk, Citi’s Digital Assets team warned that a surge in “address poisoning” attacks is inflating network metrics while draining millions from complacent investors. Ethereum (ETH) hovered near $2,940 (-1.4%) as the market digested the discrepancy.

The Mechanics of the Mirage

The bank’s warning aligns with forensic analysis from researcher Andrey Sergeenkov, who found that nearly 67% of the 12.6 million new Ethereum addresses created in the last 30 days received “dust” (transfers under $1) as their first interaction. The scam works by generating “vanity” addresses that mimic the first and last characters of a user’s legitimate counterparty. Attackers then flood the victim’s history with zero-value token transfers, betting the user will copy-paste the fraudulent address from their transaction log by mistake.

“Address poisoning has become disproportionately attractive for attackers… What developers are doing is reckless experimentation at users’ expense disguised as a revolution.” Andrey Sergeenkov

The Economics of Spam

The campaign’s scale is directly linked to the “Fusaka” network upgrade implemented in late 2025, which reduced average transaction fees to the $0.10–$0.20 range. While beneficial for legitimate users, the lower barrier to entry allowed attackers to automate the creation of 3.86 million “poisoned” wallets in weeks without incurring prohibitive costs. Sergeenkov identified specific smart contracts designed solely to batch-fund these thousands of decoy addresses with stablecoin dust.

Institutional Context

Citi’s intervention highlights a growing anxiety among institutional custodians regarding execution risk. The warning follows a catastrophic incident in December 2025 where a single trader lost $50 million after inadvertently copying a poisoned address. Since mid-December, another 116 victims have been identified with aggregate losses of $740,000, confirming the vector remains highly profitable despite a low conversion rate.

The UI Failure

The persistence of the attack exploits a fundamental weakness in crypto wallet interfaces: the truncation of addresses. By hiding the middle characters of a hexadecimal string, wallets make “0x123…abc” (legitimate) look identical to “0x123…abc” (malicious). Until wallet providers implement default whitelisting or clearer visual differentiators, the burden of verification remains entirely on the user.

> ABOUT_THE_AUTHOR _

Amir Rocha

// Crypto News Reporter

I’m Amir Rocha, a reporter who believes you shouldn't need a computer science degree to understand the future of money. I spend my days translating technical developments from Zero-Knowledge rollups into clear, actionable insights for SEC filings. After 8 years in the blockchain space, I’ve learned that the most important story isn't the price, but the technology underneath. I write to help you spot the difference between genuine innovation and a marketing gimmick

VIEW_PROFILE >>