Post Pectra 'Malicious' Ethereum Contracts Are Trying to Drain Wallets, But to No Avail: Wintermute

CN
coindesk
Follow
3 days ago


Malicious Ethereum contracts designed to drain wallets with weak security aren't profiting from the operation, crypto market maker Wintermute said Friday, identifying these contracts as "CrimeEnjoyors."

The whole issue is tied to the Ethereum Improvement Proposal (EIP)-7702, part of the Pectra upgrade that went live early last month. It allows regular Ethereum addresses, secured by private keys, to temporarily operate as smart contracts, facilitating batched transactions, password authentication and spending limits.

The regular Ethereum addresses delegate control of their wallets to smart contracts, granting them permission to manage or move their funds. While it has simplified the user experience, it has also created a risk of malicious contracts draining funds.

As of Friday, more than 80% of delegations made through EIP-7702 involved reused, copy-and-paste contracts designed to automatically scan and identify weak wallets for potential theft.

"Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code. These are sweepers, used to automatically drain incoming ETH from compromised addresses," Wintermute said on X.

"The CrimeEnjoyor contract is short, simple, and widely reused. This copy-pasted bytecode now represents the majority of all EIP-7702 delegations. It’s funny, dark, and fascinating all at once," the market maker added.

Notable cases include a wallet that lost nearly $150,000 through malicious batched transactions in a fishing attack, as anti-scam tracker Scam Sniffer noted.

Still, the large-scale money drain has not been profitable for the attackers. The CrimeEnjoyors spent approximately 2.88 ETH to authorize around 79,000 addresses. One particular address –0x89383882fc2d0cd4d7952a3267a3b6dae967e704 – handled more than half of these authorizations, with 52,000 permissions granted to it.

Per Wintermute's researcher, the stolen ether can be traced by analyzing the code of these contracts. For the above example, the ETH is destined to flow the address –0x6f6Bd3907428ae93BC58Aca9Ec25AE3a80110428.

However, as of Friday, it had no inbound ETH transfers. The researcher added that this pattern appears consistent across other CrimeEnjoyors as well.


免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

HTX:注册并领取8400元新人礼
Ad
Share To
APP

X

Telegram

Facebook

Reddit

CopyLink