Wintermute: After the Pectra upgrade, a malicious contract named "CrimeEnjoyor" has appeared, suspected of phishing and has not made a profit.

robot
Abstract generation in progress

PANews, June 2 - According to CoinDesk, Wintermute pointed out that after the Ethereum Pectra upgrade went live with EIP-7702, a large number of malicious contracts named "CrimeEnjoyor" appeared, exploiting the mechanism that allows users to authorize wallet permissions to smart contracts, attempting to scan and transfer funds. However, the attackers have not made any profits so far. More than 97% of EIP-7702 authorizations point to the same replicated code, suspected to be an automated coin theft tool. The attackers invested about 2.88 ETH for 79,000 address authorizations, with the largest address handling over 52,000 authorizations, yet there have been no actual gains to date. Although this attack method has not been effective, it exposes security vulnerabilities in EIP-7702.

ETH1.25%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)