The Signal
The on-chain celebration is premature. While Ethereum (ETH) data providers flagged a record 170% surge in new address creation this week, the catalyst isn’t retail adoption. It’s a sophisticated “address poisoning” campaign. Security researcher Andrey Sergeenkov identified the anomaly Tuesday, revealing that the network’s spike in activity is largely artificial, driven by attackers exploiting the recent Fusaka upgrade’s lower fee structure.
ETH struggled to hold $3,200 (-2.9%) as the market digested the data: the network is busier than ever, but the volume is toxic.
The Receipt
The attack vector is purely economic. The Fusaka upgrade (deployed Dec. 2025) successfully reduced standard transaction fees to under $0.01. Attackers immediately capitalized on this efficiency to industrialize spam. Sergeenkov’s analysis highlights the scale:
67% of all new addresses created this week received “dust” (tiny token amounts) as their very first transaction. The campaign has already targeted 1.5 million wallets.
The Mechanism
This is not a protocol exploit; it is a UI trap. Attackers generate “vanity addresses” that mimic the first and last characters of a user’s frequently used contacts. They then broadcast zero-value or dust transactions to the victim’s wallet.
The goal? Pollute the user’s transaction history. When a user later attempts to copy-paste an address for a legitimate transfer, they inadvertently select the scammer’s look-alike address. The method relies entirely on user negligence, not cryptographic failure.
The Impact
The campaign is profitable. On-chain data confirms 116 verified victims have lost a combined $740,000 to date. One single entity lost $510,000 in a misdirected transfer.
The discrepancy between “record growth” and reality is stark. While the address count looks bullish on a dashboard, the underlying capital flow is predatory. Market makers and analytics firms are now scrambling to filter this “dust noise” from legitimate adoption metrics to prevent distorted valuation models.