Tell your friend to not use transaction histories for information about destination addresses. He may never run into problems, but it could also happen the next time he does it. I see no reason to gamble like that.
There is no reason why poisoning scams couldn't be used in Bitcoin and against Bitcoin users. But there a few reasons why they are less effective:
1. They cost more. Compared to Ethereum, Polygon or BSC, you have to pay more in fees to transfer Bitcoin. It might be enough to pay a few cents on alternative networks, but you may need $1 or $2 for bitcoin and maybe much more.
2. Bitcoin has a dust threshold. There is a minimum amount of satoshis that you have to send, which is known as the dust limit. I think 0-value outputs were possible on the Bitcoin network in the past but not anymore. Or, if they are, they are non-standard. Many alternative chains allow 0-value transactions.
3. Bitcoin isn't account-based. With Ethereum, Tron, etc., you have one account for the native coins and you use the same account for all your tokens. With Bitcoin, you have outputs spread across multiple addresses. Address reuse isn't popular for privacy reasons. Also, it doesn't save you any money to use the same address over and over again. You can't target a Bitcoin address as easy in an attempt to fool the user like you would for those alternative chains. If you and me did some trades, I would give you a new BTC address every time. But if we used ETH, all transactions would probably go into the same address even if its tokens and not the native coin.
4. It's harder to generate similar-looking Bitcoin addresses. I am not an expert in this topic, but I think it takes more computational power to generate a similar-looking Bitcoin address compared to an Ethereum one, for example. And it gets exponentially harder the more unique custom characters you want. It's also close to impossible to make the last characters identical (like in the example of the person who lost +$70 million) because there is a checksum.