
Ethereum's Pectra Upgrade: A New Frontier for Wallet-Draining Exploits
Jun 2
2 min read
Wintermute, a prominent crypto trading firm, has issued a stark warning regarding the security implications of Ethereum's recent Pectra upgrade, specifically concerning the EIP-7702 feature. This upgrade, intended to enhance user experience, has inadvertently become a vector for automated wallet-draining attacks, with a significant majority of its delegations being exploited by malicious scripts. Security firms are urging vigilance and immediate safeguards.
Ethereum's Pectra Upgrade: A Double-Edged Sword
Ethereum's Pectra hard fork introduced EIP-7702, an account-abstraction upgrade championed by Vitalik Buterin. Its purpose was to streamline user experience by allowing wallets to temporarily function as smart contracts, enabling features like batched transactions, gas fee sponsorship, and spending limits. However, this flexibility has been widely abused by malicious actors.
The Rise of "CrimeEnjoyor"
Wintermute's analysis revealed that over 80% of EIP-7702 delegations are being directed to duplicated contracts employing the same basic code. This code, dubbed "CrimeEnjoyor" by Wintermute, automatically sweeps wallets with compromised keys, transferring their contents to the attacker. This highlights a critical vulnerability where a feature designed for convenience is being predominantly used for illicit activities.
Key Takeaways
Widespread Exploitation: More than 80% of EIP-7702 delegations are linked to malicious "CrimeEnjoyor" contracts.
Significant Losses: One user reportedly lost nearly $150,000 due to a phishing attack leveraging this vulnerability.
Underlying Issue: While EIP-7702 facilitates these attacks, the core problem remains the compromise of users' private keys.
Security Firm Warnings: Scam Sniffer and SlowMist have issued alerts, advising users to be cautious and wallet providers to implement safeguards.
Wintermute's Countermeasure: Wintermute has developed a system to flag these malicious contracts, injecting warnings into their verified code to alert users.
Industry Response and User Vigilance
Blockchain security firms like Scam Sniffer and SlowMist have emphasized the urgent need for wallet service providers to support EIP-7702 transactions securely. They recommend prominently displaying target contracts when users sign delegations to mitigate phishing risks. Despite the new attack vector, experts like Taylor Monahan note that the fundamental issue lies with users' ability to secure their private keys. EIP-7702 merely makes wallet sweeping more efficient for attackers. Wintermute's proactive measure of flagging malicious contracts with a "CrimeEnjoyor" warning aims to protect users by making the threat visible within the contract itself. This ongoing battle underscores the critical importance of user education and robust security practices in the evolving cryptocurrency landscape.
Sources
Wintermute warns Pectra upgrade leaves Ethereum users at risk of automated attacks, The Block.
Ethereum’s EIP-7702 Upgrade Exploited by “CrimeEnjoyor” Wallet-Sweeping Scam, Crypto News Australia.
Wintermute’s ‘CrimeEnjoyor’ to flag Ethereum’s wallet-draining contracts — TradingView News, TradingView.
Wintermute’s ‘CrimeEnjoyor’ to flag Ethereum’s wallet-draining contracts, Cointelegraph.