News Report Technology
March 13, 2026

Etherscan: Ethereum Address Poisoning ‘Industrialized’ With 612% Surge In USDT Dust Transfers

In Brief

Etherscan reports that Ethereum address poisoning has become industrialized, with automated, high-volume dust transfers exploiting lower post-Fusaka fees, resulting in millions of attempts and substantial losses.

Etherscan Warns Of ‘Industrialization’ Of Ethereum Address Poisoning As USDT Dust Transfers Surge 612% Post-Fusaka Upgrade

Etherscan, the web-based blockchain explorer for the Ethereum network, has reported an industrialization of Ethereum address poisoning, a type of scam where attackers insert misleading addresses into a user’s transaction history to trick them into sending funds to fraudulent accounts. 

According to the platform’s latest report, this activity has surged following the Fusaka upgrade on December 3, 2025, which lowered transaction costs across the Ethereum network. In particular, USDT dust transfers increased by 612%, contributing to a historical total of approximately 17 million address poisoning attempts and estimated losses exceeding $79.3 million between July 2022 and June 2024.

A recent example cited in the report involved an Etherscan user Nima, who received over 89 Address Watch Alert notifications after making only two stablecoin transfers. These alerts were triggered by address poisoning transactions designed to place lookalike addresses into the wallet’s transaction history, thereby increasing the likelihood that users would copy the wrong address in subsequent transfers. While address poisoning has existed on Ethereum for several years, the report emphasizes that these campaigns have become automated and high-volume, capable of inserting poison transfers within minutes of legitimate transactions.

Competition between attackers is another notable aspect of modern address poisoning. Research shows that multiple attack groups often send poison transfers to the same target address simultaneously, racing to have their spoofed address appear first in the user’s transaction history. This competitive approach increases the likelihood that a user will copy a malicious address in a subsequent transaction. In one documented instance, thirteen poison transfers were recorded within a few minutes of a legitimate USDT transfer. Common methods of address poisoning include low-value dust transfers, spoofed token transfers, and zero-value token transfers, which are cheap to execute at scale but can cause significant disruption if users are misled.

Low-Cost Transfers Fuel Profitable Poisoning Campaigns Despite Minimal Individual Success Rates

The economics of these attacks make them particularly effective despite their low success rate. Researchers have found that only about one in every 10,000 poisoning transfers results in a user mistakenly sending funds to an attacker, a success rate of roughly 0.01%. However, when thousands or millions of attempts are executed, even a single successful transaction can generate significant profits, easily offsetting the cost of failed attempts. The Fusaka upgrade amplified this effect by reducing transaction fees, allowing attackers to send far more poison transfers without incurring prohibitive costs. Network activity increased following the upgrade, with Ethereum processing an average of 30% more daily transactions in the 90 days afterward compared with the 90 days prior. Additionally, the creation of new addresses surged by approximately 78%, while dust transfer activity, particularly for stablecoins such as USDT, USDC, and DAI, increased dramatically.

Dust transfers, which involve very small amounts of tokens, are commonly used in these campaigns to populate transaction histories without requiring significant expenditure from attackers. While not all dust transfers indicate fraudulent activity, Etherscan’s analysis suggests that a large portion of these small-value transactions are likely part of address poisoning schemes. Attackers often mass-send tokens and ETH to newly generated spoofed addresses, which subsequently forward these dust transfers to the target individually. This process ensures that the lookalike addresses appear in the victim’s transaction history and increases the probability of successful deception.

In order to avoid becoming a victim of such a tactic, Etherscan advises users to exercise caution by verifying destination addresses before sending funds. Tools such as private address name tags, wallet address books, ENS domains, and the Address Highlight feature can help distinguish legitimate addresses from lookalikes. Additionally, Etherscan as a platform provides alerts for suspicious activities, including low-value and spoofed token transfers, to reduce the risk of error.

The report concludes that while address poisoning attacks are becoming very prevalent and automated, user awareness combined with enhanced interface design can mitigate risks. The company continues to refine its platform by labeling poisoning addresses, flagging zero-value transfers, and surfacing suspicious activity to help users identify potential scams more effectively.

Disclaimer

In line with the Trust Project guidelines, please note that the information provided on this page is not intended to be and should not be interpreted as legal, tax, investment, financial, or any other form of advice. It is important to only invest what you can afford to lose and to seek independent financial advice if you have any doubts. For further information, we suggest referring to the terms and conditions as well as the help and support pages provided by the issuer or advertiser. MetaversePost is committed to accurate, unbiased reporting, but market conditions are subject to change without notice.

About The Author

Alisa, a dedicated journalist at the MPost, specializes in cryptocurrency, zero-knowledge proofs, investments, and the expansive realm of Web3. With a keen eye for emerging trends and technologies, she delivers comprehensive coverage to inform and engage readers in the ever-evolving landscape of digital finance.

More articles
Alisa Davidson
Alisa Davidson

Alisa, a dedicated journalist at the MPost, specializes in cryptocurrency, zero-knowledge proofs, investments, and the expansive realm of Web3. With a keen eye for emerging trends and technologies, she delivers comprehensive coverage to inform and engage readers in the ever-evolving landscape of digital finance.

Hot Stories
Join Our Newsletter.
Latest News

The Calm Before The Solana Storm: What Charts, Whales, And On-Chain Signals Are Saying Now

Solana has demonstrated strong performance, driven by increasing adoption, institutional interest, and key partnerships, while facing potential ...

Know More

Crypto In April 2025: Key Trends, Shifts, And What Comes Next

In April 2025, the crypto space focused on strengthening core infrastructure, with Ethereum preparing for the Pectra ...

Know More
Read More
Read more
Oxford’s AI Researcher Samuele Marro On Decentralized AI And Blockchain: When Integration Adds Value—But Limits Innovation
Interview Technology
Oxford’s AI Researcher Samuele Marro On Decentralized AI And Blockchain: When Integration Adds Value—But Limits Innovation
March 13, 2026
7 Tokenization Tools Making Illiquid Assets Tradable In 2026
Top Lists News Report Technology
7 Tokenization Tools Making Illiquid Assets Tradable In 2026
March 13, 2026
Microsoft’s New Copilot Health Integrates Advanced AI, Secure Data, And Trusted Medical Sources To Support Better Healthcare Decisions
Lifestyle News Report Technology
Microsoft’s New Copilot Health Integrates Advanced AI, Secure Data, And Trusted Medical Sources To Support Better Healthcare Decisions
March 13, 2026
X Layer Introduces Global Developer Challenge With 200,000 USDT Pool 
News Report Technology
X Layer Introduces Global Developer Challenge With 200,000 USDT Pool 
March 13, 2026