It appears that someone launched a limited form of this attack using the address
3G83ox5zw7D6eySoSMCervh9cbhMXdA5t9. The address corresponds to the script:
OP_IF
0x451e75af
OP_15
OP_CHECKMULTISIG
OP_ENDIF
OP_1
The script is spent by push 0 in the sigScript.
The attacker only generated 960 such outputs, which corresponds to 14400 sigOps, which is not enough even to fill a block. Furthermore the fee rate for the transactions was not very high (37sat/byte), meaning that most normal traffic would be unaffected anyway. So overall this attack had no affect. Maybe this was a test?