According to Scam Sniffer, two victims recently lost 62 million dollars through address poisoning attacks, a technique that impersonates legitimate transaction addresses. This criminal method, which exploits user distraction when copying wallets, has gained momentum following the implementation of the Fusaka upgrade on the Ethereum network during this past December.
When analyzing specific events occurring during the month of January, it is observed that a single investor lost 12.2 million dollars by erroneously copying an address. This alarming figure adds to the 50 million stolen in December, evidencing a growing trend where malicious actors send dust transactions to contaminate the victims’ transaction history.
The technical impact of the Fusaka upgrade on network security
On the other hand, various security analysts suggest that the technical efficiency achieved by Fusaka has significantly lowered the execution costs of these scams. As gas fees are reduced, attackers can automate the sending of micro-transactions to millions of wallets, facilitating the spread of these visually identical addresses that only differ in central characters.
Likewise, the analysis firm Coin Metrics reported that activities linked to stablecoin dust now represent eleven percent of daily transactions across the network. After meticulously examining 227 million balance updates, researchers found that a large proportion of movements are less than one cent, which confirms the massive scale of the operation.
In addition to this phenomenon, digital signature phishing has experienced an increase of two hundred and seven percent compared to last December. This dangerous modality deceives users into granting unlimited token approvals, resulting in the theft of over six million dollars distributed among thousands of wallets within the currently operational blockchain technology.
Nevertheless, Web3 Antivirus reported on Thursday that this address poisoning method is one of the most consistent ways to lose large amounts of capital. By generating addresses that match in the first and last characters, scammers manage to deceive the human eye, which tends to verify only the ends of complex alphanumeric strings.
Why does the use of the DAI stablecoin facilitate these illicit operations?
On the other hand, the role of the DAI stablecoin has sparked concern as it has become a haven for illegal funds according to Whitestream. Due to the decentralized nature of its governance, which does not collaborate with authorities to freeze assets, criminals find in this protocol a safe place to park capital stolen through fraudulent maneuvers.
However, this situation poses severe challenges for retail investor confidence, as they must meticulously verify every character of the addresses before operating. While the Ethereum ecosystem evolves, the risk of total loss of funds due to human error increases exponentially, which could lead to a higher demand for secure user interfaces.
It is also relevant to consider that the increase in dust activity reflects an unprecedented sophistication in the tactics of modern attackers today. By integrating these small sums into millions of portfolios, perpetrators ensure their malicious addresses appear as the most recent in the history, increasing the odds of being selected by oversight.
Finally, the current landscape suggests that the sophistication of attacks will continue to evolve as long as gaps in digital transaction verification exist. Developers and wallets are expected to implement more robust alerts against dust, seeking to mitigate the impact of these scams that, despite technical advances, continue to successfully exploit human psychology.

