CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

CoinDesk 2025-06-02 07:08:47

Post Pectra 'Malicious' Ethereum Contracts Are Trying to Drain Wallets, But to No Avail: Wintermute

Malicious Ethereum contracts designed to drain wallets with weak security aren't profiting from the operation, crypto market maker Wintermute said Friday, identifying these contracts as "CrimeEnjoyors." The whole issue is tied to the Ethereum Improvement Proposal (EIP)-7702 , part of the Pectra upgrade that went live early last month. It allows regular Ethereum addresses, secured by private keys, to temporarily operate as smart contracts, facilitating batched transactions, password authentication and spending limits. The regular Ethereum addresses delegate control of their wallets to smart contracts, granting them permission to manage or move their funds. While it has simplified the user experience, it has also created a risk of malicious contracts draining funds. As of Friday, more than 80% of delegations made through EIP-7702 involved reused, copy-and-paste contracts designed to automatically scan and identify weak wallets for potential theft. "Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code . These are sweepers , used to automatically drain incoming ETH from compromised addresses," Wintermute said on X . "The CrimeEnjoyor contract is short, simple, and widely reused. This copy-pasted bytecode now represents the majority of all EIP-7702 delegations. It’s funny, dark, and fascinating all at once," the market maker added. Notable cases include a wallet that lost nearly $150,000 through malicious batched transactions in a fishing attack, as anti-scam tracker Scam Sniffer noted . Still, the large-scale money drain has not been profitable for the attackers. The CrimeEnjoyors spent approximately 2.88 ETH to authorize around 79,000 addresses. One particular address –0x89383882fc2d0cd4d7952a3267a3b6dae967e704 – handled more than half of these authorizations, with 52,000 permissions granted to it. Per Wintermute's researcher , the stolen ether can be traced by analyzing the code of these contracts. For the above example, the ETH is destined to flow the address –0x6f6Bd3907428ae93BC58Aca9Ec25AE3a80110428. However, as of Friday, it had no inbound ETH transfers. The researcher added that this pattern appears consistent across other CrimeEnjoyors as well.

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.