CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

CoinDesk 2025-06-02 07:08:47

Post Pectra 'Malicious' Ethereum Contracts Are Trying to Drain Wallets, But to No Avail: Wintermute

Malicious Ethereum contracts designed to drain wallets with weak security aren't profiting from the operation, crypto market maker Wintermute said Friday, identifying these contracts as "CrimeEnjoyors." The whole issue is tied to the Ethereum Improvement Proposal (EIP)-7702 , part of the Pectra upgrade that went live early last month. It allows regular Ethereum addresses, secured by private keys, to temporarily operate as smart contracts, facilitating batched transactions, password authentication and spending limits. The regular Ethereum addresses delegate control of their wallets to smart contracts, granting them permission to manage or move their funds. While it has simplified the user experience, it has also created a risk of malicious contracts draining funds. As of Friday, more than 80% of delegations made through EIP-7702 involved reused, copy-and-paste contracts designed to automatically scan and identify weak wallets for potential theft. "Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code . These are sweepers , used to automatically drain incoming ETH from compromised addresses," Wintermute said on X . "The CrimeEnjoyor contract is short, simple, and widely reused. This copy-pasted bytecode now represents the majority of all EIP-7702 delegations. It’s funny, dark, and fascinating all at once," the market maker added. Notable cases include a wallet that lost nearly $150,000 through malicious batched transactions in a fishing attack, as anti-scam tracker Scam Sniffer noted . Still, the large-scale money drain has not been profitable for the attackers. The CrimeEnjoyors spent approximately 2.88 ETH to authorize around 79,000 addresses. One particular address –0x89383882fc2d0cd4d7952a3267a3b6dae967e704 – handled more than half of these authorizations, with 52,000 permissions granted to it. Per Wintermute's researcher , the stolen ether can be traced by analyzing the code of these contracts. For the above example, the ETH is destined to flow the address –0x6f6Bd3907428ae93BC58Aca9Ec25AE3a80110428. However, as of Friday, it had no inbound ETH transfers. The researcher added that this pattern appears consistent across other CrimeEnjoyors as well.

Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.