PANews reported on June 2 that according to Cointelegraph, crypto market maker Wintermute said it had created code to inject warnings into the verified "CrimeEnjoyor" malicious contract, and Ethereum users would receive warnings if they encountered potential attacks that could drain wallet funds. It is reported that the warning statement said: "Criminals are using malicious contracts to automatically execute ETH transactions, please do not send any ETH." Wintermute added that the Ethereum virtual machine bytecode has been reversed into human-readable Solidity code and publicly verified.
According to previous news , Wintermute pointed out that since the Ethereum Pectra upgrade launched EIP-7702, a large number of malicious contracts named "CrimeEnjoyor" have appeared, taking advantage of the mechanism by which users authorize wallet permissions to smart contracts, attempting to scan and transfer funds, but the attackers have not made any profit so far. More than 97% of EIP-7702 authorizations point to the same copy code, suspected to be an automatic coin theft tool. The attacker invested about 2.88 ETH for 79,000 address authorizations, and the largest address processed more than 52,000 authorizations, but there has been no actual profit so far. Although this attack method did not work, it exposed the security risks of EIP-7702.
