CCT - Crypto Currency Tracker logo CCT - Crypto Currency Tracker logo
CoinDesk 2025-06-02 07:08:47

Post Pectra 'Malicious' Ethereum Contracts Are Trying to Drain Wallets, But to No Avail: Wintermute

Malicious Ethereum contracts designed to drain wallets with weak security aren't profiting from the operation, crypto market maker Wintermute said Friday, identifying these contracts as "CrimeEnjoyors." The whole issue is tied to the Ethereum Improvement Proposal (EIP)-7702 , part of the Pectra upgrade that went live early last month. It allows regular Ethereum addresses, secured by private keys, to temporarily operate as smart contracts, facilitating batched transactions, password authentication and spending limits. The regular Ethereum addresses delegate control of their wallets to smart contracts, granting them permission to manage or move their funds. While it has simplified the user experience, it has also created a risk of malicious contracts draining funds. As of Friday, more than 80% of delegations made through EIP-7702 involved reused, copy-and-paste contracts designed to automatically scan and identify weak wallets for potential theft. "Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code . These are sweepers , used to automatically drain incoming ETH from compromised addresses," Wintermute said on X . "The CrimeEnjoyor contract is short, simple, and widely reused. This copy-pasted bytecode now represents the majority of all EIP-7702 delegations. It’s funny, dark, and fascinating all at once," the market maker added. Notable cases include a wallet that lost nearly $150,000 through malicious batched transactions in a fishing attack, as anti-scam tracker Scam Sniffer noted . Still, the large-scale money drain has not been profitable for the attackers. The CrimeEnjoyors spent approximately 2.88 ETH to authorize around 79,000 addresses. One particular address –0x89383882fc2d0cd4d7952a3267a3b6dae967e704 – handled more than half of these authorizations, with 52,000 permissions granted to it. Per Wintermute's researcher , the stolen ether can be traced by analyzing the code of these contracts. For the above example, the ETH is destined to flow the address –0x6f6Bd3907428ae93BC58Aca9Ec25AE3a80110428. However, as of Friday, it had no inbound ETH transfers. The researcher added that this pattern appears consistent across other CrimeEnjoyors as well.

Leggi la dichiarazione di non responsabilità : Tutti i contenuti forniti nel nostro sito Web, i siti con collegamento ipertestuale, le applicazioni associate, i forum, i blog, gli account dei social media e altre piattaforme ("Sito") sono solo per le vostre informazioni generali, procurati da fonti di terze parti. Non rilasciamo alcuna garanzia di alcun tipo in relazione al nostro contenuto, incluso ma non limitato a accuratezza e aggiornamento. Nessuna parte del contenuto che forniamo costituisce consulenza finanziaria, consulenza legale o qualsiasi altra forma di consulenza intesa per la vostra specifica dipendenza per qualsiasi scopo. Qualsiasi uso o affidamento sui nostri contenuti è esclusivamente a proprio rischio e discrezione. Devi condurre la tua ricerca, rivedere, analizzare e verificare i nostri contenuti prima di fare affidamento su di essi. Il trading è un'attività altamente rischiosa che può portare a perdite importanti, pertanto si prega di consultare il proprio consulente finanziario prima di prendere qualsiasi decisione. Nessun contenuto sul nostro sito è pensato per essere una sollecitazione o un'offerta