HomeNewsRecord Ethereum activity tied to address-poisoning after Fusaka fee cuts; $740,000 stolen.

Record Ethereum activity tied to address-poisoning after Fusaka fee cuts; $740,000 stolen.

-

Andrey Sergeenkov says record activity on the Ethereum network in January links to mass address-poisoning attacks. He tied the surge to lower gas fees after the early-December Fusaka upgrade, stated.

Network activity retention roughly doubled to eight million addresses, while daily transactions neared 2.9 million. The week starting Jan. 12 added about 2.7 million new addresses, 170% above typical values.

Address poisoning sends tiny sums from lookalike wallets to trick users into copying wrong addresses. He traced wallets that first received under one dollar and then sent to 10,000-plus addresses.

Some dust distributors targeted over 400,000 recipients. About $740,000 has been stolen from 116 victims so far, and “These poisoning addresses then distribute dust to millions of potential victims, creating false entries in transaction histories.”

LATEST POSTS

CleanSpark Sells 553 Bitcoin, Expands Capacity as Miners Pivot to AI

In February, US Bitcoin miner CleanSpark sold 553 Bitcoin for approximately $36.6 million while producing 568 BTC. The company continues to expand its infrastructure and...

Binance Ethereum Trading Hits Record High as Volatility Surges

Ethereum trading activity on Binance has surged, with approximately 29.6 million ETH changing hands over the past 30 days, marking the highest turnover since September...

DOGE Shows Signs of Recovery: Eyes Breakout Above $0.10 After 15% Surge

Dogecoin (DOGE) shows signs of stabilization following a prolonged downtrend from highs near $0.26 in October toward the $0.09 region. Buyers defended the $0.087–$0.090 demand...

Ripple’s 1994 Smart Contract Pivot Inspired Ethereum, iPhone Hacks Target Crypto Wallets

A former Ripple engineer has revealed that a strategic decision by the company in its early days may have directly led to the creation of...

Most Popular

spot_img