crypto news

The coding fraud was stolen $ 12 million in August star-news.press/wp

The delicious fraud that targeted the cryptocurrency investors in August 2025 intensified, denouncing more than $ 12 million from more than 15,000 portfolios across the sector.

Scam Scam Scam Blockchain said that these losses are a sharp rise in the month, and 72 % climbed compared to July. It is worth noting that the number of victims grew, as it increased by 67 % during the same period.

Ethereum eip 7702 an increase in encrypted hunting attacks

According to the company, about 46 % of hunting losses came from three high -value accounts, often referred to as whales. Together, these accounts lost $ 5.62 million, and one was exploited alone for $ 3.08 million.

Sponsored

Sponsored

Meanwhile, Scam Snifer has set the EIP-7702 from ETAREUM as a basic tool that was used in the August wave of attacks. The company also noticed a rise in fraudsters who deceived encryption users to send money directly to harmful contracts.

Fraud operations in April. source: Fraud process

EIP-7702 ETHEREUM Governor improves by temporarily allowing externally owned accounts (EOAS) to work like the governor of the smart contract.

This provides comfortable features such as weather transactions, setting up spending covers, integrating corridors, and restoring the portfolio without changing addresses.

However, the attackers turned these same tools into a way to accelerate thefts.

Wintermute dune analysis information board shows that more than 80 % of the EIP-7702 delegates are involved in harmful activity. It is worth noting that this has endangered more than 450,000 portfolio addresses since its implementation this year.

Yu Xian, founder of the Slow Security Company, male This awareness of how EIP-7702 is still low. He emphasized that organized criminal groups have adopted enthusiasm for the mechanism, and exploited them through the ecosystems of the ethereum (EVM) virtual machine (EVM).

In light of the mutation, Scam Snifer advised encryption users to be more cautious when interacting with wallet requests.

They suggest verification of fields, avoid hasty approvals, and reject signatures that give unlimited permissions or appear wider than necessary.

In addition, suspicious claims associated with the EIP-7702 nodes or simulating transactions simulating also must be raised.

https://beincrypto.com/wp-content/uploads/2025/04/bic_phishing_data_phone-covers.png

2025-09-06 17:14:00

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button