Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Ethereum’s EIP-7702 Feature Abused in Wallet-Draining Attacks

Ethereum’s EIP-7702 Feature Abused in Wallet-Draining Attacks

CryptotaleCryptotale2025/06/02 03:45
By:Chris Murithi
Ethereum’s EIP-7702 Feature Abused in Wallet-Draining Attacks image 0
  • Attackers exploit Ethereum’s EIP-7702 feature using bots and malicious “sweeper” contracts.
  • Over 97% of EIP-7702 delegations link to identical scams copying the “CrimeEnjoyor” contract.
  • Wallets with leaked private keys are being drained instantly through automated batch transactions.

Cybercriminals have found a way to exploit Ethereum’s latest upgrade, Pectra, rolled out on May 7, with new features aimed at improving wallet usability. According to Wintermute, bots are abusing EIP-7702 to launch wallet-draining attacks. These attacks use automated “sweeper” contracts to steal funds from compromised wallets. Wintermute identified a key malicious contract called “CrimeEnjoyor.”

This contract uses simple, copy-pasted bytecode. Criminals deploy many identical versions of it. When a wallet with leaked keys receives ETH, the contract instantly transfers the funds to an attacker. Over 80% of all EIP-7702 delegations have ties to these sweeper contracts.

The EIP-7702 feature enables wallets to act like smart contracts temporarily. Users can now perform batch transactions, sponsor gas fees, and set spending limits more easily. It was introduced to simplify the Ethereum experience for mainstream users. It supports signing one transaction to complete several actions. This was previously possible only through smart contracts. Now, users can approve tokens, swap assets, and transfer funds in a single step.

While EIP-7702 brings new convenience, it also introduces new risks

Our Research team found that over 97% of all EIP-7702 delegations were authorized to multiple contracts using the same exact code. These are sweepers, used to automatically drain incoming ETH from compromised… pic.twitter.com/xHp7zr4hC9

— Wintermute (@wintermute_t) May 30, 2025

Wintermute shared its findings through a Dune dashboard. It revealed that more than 97% of EIP-7702 delegations used nearly identical malicious code. The code enables faster and cheaper automated attacks, making it easier for scammers to act.

Security firm Scam Sniffer found that a hacker tricked one person into losing over $150,000 on a single EIP-7702 transaction. The malware campaign Inferno Drainer was connected to the theft. Experts predict that criminals are quickly taking advantage of EIP-7702 for fraudulent schemes.

Related: Ethereum Pectra Upgrade Adds Smart Accounts, Boosts L2 Speed

The upgrade remains optional and is not required for basic Ethereum use. But its delegation feature, when combined with stolen private keys, creates a serious risk. Security researcher Taylor Monahan said the real issue lies in protecting private keys.

Wintermute is urging the Ethereum community to remain alert and recommends that wallet providers display clearer delegation information to users. The firm has made public the decoded bytecode to help detect these sweeper contracts. Other researchers, including SlowMist, have echoed these warnings.

Ethereum’s goal was to make wallets smarter and safer. However, scammers have exploited EIP-7702 as a tool for rapid-fire attacks. Experts continue to call for stronger user protections and monitoring.

The post Ethereum’s EIP-7702 Feature Abused in Wallet-Draining Attacks appeared first on Cryptotale.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like