CCT - Crypto Currency Tracker logo CCT - Crypto Currency Tracker logo
cryptonews 2025-06-02 07:40:18

Wintermute’s “CrimeEnjoyor” to Warn Ethereum Users of Wallet-Draining Attacks

Key Takeaways: Wintermute’s new “CrimeEnjoyor” tool injects on-chain warnings into malicious Ethereum contracts. Over 97% of EIP-7702 delegations are being used in wallet-draining attacks. An Ethereum user recently lost $146K by signing malicious EIP-7702 transactions. Crypto market maker Wintermute has developed a tool that injects on-chain warnings into malicious wallet-draining contracts to alert users. The new tool comes as Ethereum users face a new wallet-draining threat that exploits a feature in the network’s latest upgrade. On May 30, Wintermute revealed it had developed “CrimeEnjoyor,” a code that injects visible warnings into verified malicious Ethereum contracts. The move targets contracts designed to auto-drain wallets when private keys are compromised. ‘Do Not Send ETH’ Warning The injected message clearly states that the contract “is used by bad guys to automatically sweep all incoming ETH” and prominently advises users to “NOT SEND ANY ETH.” The malicious contracts exploit Ethereum Improvement Proposal-7702 (EIP-7702), a feature introduced in the recent Pectra upgrade. EIP-7702 allows wallet owners to temporarily delegate control of their wallets to smart contracts—an opt-in feature meant to expand Ethereum’s capabilities. However, Wintermute’s research team found troubling patterns. According to their analysis, over 97% of EIP-7702 delegations were being used in identical sweeping contracts designed to automatically drain ETH from compromised addresses. “These are sweepers, used to automatically drain incoming ETH from compromised addresses,” Wintermute said in a post on X. While EIP-7702 brings new convenience, it also introduces new risks Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code. These are sweepers, used to automatically drain incoming ETH from compromised… pic.twitter.com/xHp7zr4hC9 — Wintermute (@wintermute_t) May 30, 2025 To inject warnings, the team reverse-engineered the contracts’ Ethereum Virtual Machine (EVM) bytecode into readable Solidity code and then publicly verified it. As a result, the modified warning now appears inside most of the malicious contracts. “This one copy-pasted bytecode now accounts for the majority of all EIP-7702 delegations,” Wintermute added. “It’s funny, bleak, and fascinating at the same time.” While EIP-7702 was designed to offer greater wallet flexibility, its lack of verification features has made it difficult for users—especially newcomers—to distinguish between legitimate and malicious contracts. Wintermute hopes that tagging compromised contracts will help surface suspicious activity and better protect the ecosystem. Ethereum User Loses $146K The risks are real. On May 23, one Ethereum user lost $146,550 after unknowingly signing a batch of malicious EIP-7702 transactions, according to blockchain security firm Scam Sniffer. ALERT: An address upgraded to EIP-7702 lost $146,551 through malicious batched transactions in phishing attack. pic.twitter.com/7GbamqOZVI — Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) May 24, 2025 Since Ethereum’s Pectra upgrade went live on May 7, users have executed 12,329 EIP-7702 transactions. Pectra also introduced other significant changes: EIP-725 raised the validator staking limit from 32 ETH to 2,048 ETH, and EIP-7691 increased data blob capacity to improve scalability and lower fees on Ethereum layer-2 networks. Last month, Vitalik Buterin unveiled a new proposal aimed at making it significantly easier for everyday users to run Ethereum nodes, by reducing the hardware and storage requirements currently needed to sync with the network. The Ethereum mastermind suggested a shift in how nodes store and retrieve data, moving from full data replication to a more flexible, user-centric model. Under this approach, nodes would store only the data relevant to the user, rather than Ethereum’s entire global state, which currently exceeds 1.3 terabytes, according to Etherscan. The post Wintermute’s “CrimeEnjoyor” to Warn Ethereum Users of Wallet-Draining Attacks appeared first on Cryptonews .

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.