Wintermute warns: EIP-7702 in Pectra upgrade is being abused maliciously, which may cause users to be attacked by automation

This article is machine translated
Show original

On June 2, according to TheBlock, Wintermute recently issued a warning that the EIP-7702 feature in the Ethereum Pectra upgrade (account abstraction improvement) is being maliciously abused, with over 80% of authorizations used for automated attacks. The blockchain security company Scam Sniffer recently monitored a user losing nearly $150,000 due to a phishing attack, with attackers deploying a copy-paste contract named "CrimeEnjoyor" that can automatically empty wallets with leaked private keys. EIP-7702, proposed by Ethereum founder Vitalik Buterin, aims to enhance user experience by temporarily giving wallets smart contract functionality, including batch processing of multiple transactions, Gas fee sponsorship, using biometric/social verification, and setting single transaction limits.

According to Wintermute's Dune dashboard, the vast majority of EIP-7702 authorizations flow to malicious contracts with similar functions. Security expert Taylor Monahan pointed out that EIP-7702 makes emptying addresses "cheaper and easier". Wintermute commented, "It's both funny and cruel that the same copied bytecode occupies most of the EIP-7702 authorizations."

BlockBeats previously reported that Slow Mist founder Yu Xin stated that the largest users of Ethereum's new mechanism EIP-7702 are theft gangs (rather than phishing organizations). EIP-7702 allows automatic transfer of funds from wallets with leaked private keys or seed phrases, with over 97% of EIP-7702 delegations pointing to theft contracts.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments