Target WLFI holders where infiltrators use EIP-7702 from ETAREUM star-news.press/wp

“The founder
Pectra upgrade from Ethereum in May foot EIP-7702, which allows external accounts to act temporarily such as smart contract portfolios, delegate implementation rights and allow payment transactions, which aim to simplify the user experience.
Xian He said In the X Publication on Monday, infiltrators use the upgrade to prior controlled address in the wallets of the victims, then, when a deposit is deposited, they “move” quickly the symbols, which in this case affect the holders of the WLFI icon.
Xian said: “Another player has been stolen all his multiple titles,” Xian said.
The global financial code for treatment in Donald Trump (WLFI) began trading on Monday morning, with a total of 24.66 billion symbols.
How to work
In the period before the official launch, X user I mentioned On August 31, a friend drained the distinctive symbols of WLFI after moving the ether (ETH) to his wallet.
In a response, Xian He said It was clear that he was an example of “the exploitation of the classic hunting EIP-7702”, where the private key was leaked, then the bad actor then submits the smart contract a delegate in the address of the victim’s portfolio connected to the key.
In a former publication, Xian He said Special keys are usually stolen by hunting.
He said: “Once you try to transfer the remaining codes in it, like this WLFI that was thrown into Lockbox, the gas you enter will be transported automatically.”
Xian suggested “canceling or replacing the EIP-7702 ambush,” and transferring the distinctive symbols from the penetrated wallet as a possible solution.
The encryption users discuss thefts on WLFI forums
It was some Reporting Similar issues in WLFI Forums. One post under the Hakaneemiratlas handle He said His wallet was hacked last October and now worries his WLFI codes in danger.
They said: “I managed to move only 20 % of WLFI codes to a new wallet, but it was a tired race against the infiltrator. Even sending ETH to gas fees was dangerous, because it could have immediately accelerated.”
“At the present time, 80 % of the WLFI codes are still stuck in the risk wallet. I am very concerned that once the lock is canceled, the infiltrator may immediately transfer it.”
Another user under Anton handle He said Many other people face a similar case due to the implementation of a distinctive icon drop. The wallet used to join the WLFI white menu should be used to participate in the pre -acting period.
Related to: Beware of fake conference programs targeting encryption origins, warns the slow founder
He said: “The moment when the distinctive symbols reach, they will be stolen by vertical land robots before we have the opportunity to transfer them to a safe portfolio.”
Anton also asks the WLFI team to consider implementing the direct transmission option for symbols.
Budgets aimed at launching the distinctive symbol
Many WLFI frauds appeared in launching the distinctive code for the operating program. Bubblemaps Analysis has identified many “combined” smart contracts that imitate the applicable encryption projects.
At the same time, the WLFI team to caution It does not contact a message directly on any platform, with the only official support channels via email.
“If you receive DM, he claims to be from us, this is fraudulent and should be ignored. If you receive an email, always check that it comes from one of these official areas before responding,” said WLFI.
magazine: XRP ‘Cycle Target’ is $ 20, Bitcoin: Hodler’s Digest, 24-30 August has been rejected
https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1200/https://s3.cointelegraph.com/uploads/2024-11/019372fd-544f-790a-98b5-7cacf63ebeb7
2025-09-02 04:22:00



