{"id":1732,"date":"2025-06-02T14:23:10","date_gmt":"2025-06-02T14:23:10","guid":{"rendered":"https:\/\/bitunikey.com\/news\/ethereums-pectra-upgrade-facing-mounting-exploit-concerns\/"},"modified":"2025-06-02T14:23:10","modified_gmt":"2025-06-02T14:23:10","slug":"ethereums-pectra-upgrade-facing-mounting-exploit-concerns","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/ethereums-pectra-upgrade-facing-mounting-exploit-concerns\/","title":{"rendered":"Ethereum\u2019s Pectra upgrade facing mounting exploit concerns"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">Concerns continue to mount over Ethereum\u2019s latest protocol upgrade as security risks attract malicious actors aiming to drain user wallets.<\/p>\n<p>The Ethereum Improvement Proposal EIP-7702, part of the Pectra upgrade introduced earlier this year, is drawing scrutiny across the crypto industry after numerous exploits have been observed on chain. <\/p>\n<p>Proposed by co-founder Vitalik Buterin, the upgrade was originally designed to enhance wallet functionality by allowing standard Ethereum wallets to temporarily behave like smart contracts.<\/p>\n<p>However, the feature has attracted significant attention from malicious actors exploiting its capabilities.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Ethereum EIP-7702 Exploits on the Rise<\/h2>\n<p>Security researchers have identified that multiple EIP-7702 delegations are linked to malicious wallet-draining bots began on May 30, 2025, after crypto market maker Wintermute flagged a surge in malicious smart contracts abusing the new delegation feature.\u00a0<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">While EIP-7702 brings new convenience, it also introduces new risks<\/p>\n<p>Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code. These are sweepers, used to automatically drain incoming ETH from compromised\u2026 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/t.co\/xHp7zr4hC9\" target=\"_blank\">pic.twitter.com\/xHp7zr4hC9<\/a><\/p>\n<p>\u2014 Wintermute (@wintermute_t) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/wintermute_t\/status\/1928501765865091400?ref_src=twsrc%5Etfw\" target=\"_blank\">May 30, 2025<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>Nicknamed \u201cCrimeEnjoyors,\u201d the contracts are short, reusable snippets of code that automatically scan delegated wallets for vulnerabilities and attempt to sweep funds to attacker-controlled addresses. These malicious scripts automate fund theft from compromised wallets by silently batching fraudulent token approvals in undetectable patterns.\u00a0<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>While Wintermute added that many of the malicious contracts have yet to successfully extract funds, some users have already fallen victim. On May 24, 2025, crypto anti-scam platform Scam Sniffer revealed that one user lost approximately $150,000 in ETH to a phishing attack that leveraged a malicious contract using EIP-7702 delegation.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 ALERT: An address upgraded to EIP-7702 lost $146,551 through malicious batched transactions in phishing attack. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/t.co\/7GbamqOZVI\" target=\"_blank\">pic.twitter.com\/7GbamqOZVI<\/a><\/p>\n<p>\u2014 Scam Sniffer | Web3 Anti-Scam (@realScamSniffer) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1926296681198326254?ref_src=twsrc%5Etfw\" target=\"_blank\">May 24, 2025<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>The root issue often stems from compromised private keys, which EIP-7702\u2019s functionality exacerbates by enabling rapid, automated theft. Blockchain security firm SlowMist founder Yu <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/evilcos\/status\/1926479267078037607\" target=\"_blank\">stressed<\/a> the potential impact of the vulnerability, echoing broader calls for users to exercise vigilance.<\/p>\n<h2 class=\"wp-block-heading\">How to Stay Safe<\/h2>\n<p>According to a March 2025 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/slowmist.medium.com\/in-depth-discussion-on-eip-7702-and-best-practices-968b6f57c0d5\" target=\"_blank\">analysis<\/a> by SlowMist, cautious signing, verified contracts, and smart development practices are key to staying safe with EIP-7702. Users are advised to verify target contracts before delegating access, and avoid interacting with suspicious DApps.<\/p>\n<p>Wallet providers are also urged to display clear warnings during the delegation process, which could serve as an extra layer of protection for users against phishing attempts.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Concerns continue to mount over Ethereum\u2019s latest protocol upgrade as security risks attract malicious actors aiming to drain user wallets. The Ethereum Improvement Proposal EIP-7702, part of the Pectra upgrade&hellip;<\/p>\n","protected":false},"author":1,"featured_media":675,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":1733,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1732\/revisions\/1733"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/675"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}