{"id":24373,"date":"2025-05-29T17:30:00","date_gmt":"2025-05-29T14:30:00","guid":{"rendered":"https:\/\/forklog.com\/en\/account-abstraction-angst-how-the-pectra-upgrade-made-life-easier-for-hackers\/"},"modified":"2025-05-29T17:30:00","modified_gmt":"2025-05-29T14:30:00","slug":"account-abstraction-angst-how-the-pectra-upgrade-made-life-easier-for-hackers","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/account-abstraction-angst-how-the-pectra-upgrade-made-life-easier-for-hackers\/","title":{"rendered":"Account abstraction angst: how the Pectra upgrade made life easier for hackers"},"content":{"rendered":"<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<p><strong>Disclaimer:<\/strong><em> to fully grasp the technical aspects, we recommend reading materials on <\/em><em>account abstraction<\/em><em> and <\/em><a href=\"https:\/\/forklog.com\/en\/news\/pectra-steering-ethereum-toward-scale-and-mass-adoption\"><em>the Pectra upgrade<\/em><\/a><em>.\u00a0<\/em><\/p>\n<\/div>\n<p>Beyond a boost to Ethereum\u2019s price, the May Pectra upgrade brought expanded functionality and improvements to the ecosystem. Among other things, it enhanced account abstraction (AA): a new type of transaction appeared, allowing ordinary addresses to function as smart-contract wallets.\u00a0<\/p>\n<p>On the one hand, the changes broadened AA\u2019s use cases and simplified the user experience; on the other, they gave hackers a way to drain victims\u2019 wallets with a single signature. Here is how criminals are exploiting the new weaknesses\u2014and how to protect your funds.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">The nature of the problem<\/h2>\n<p>Concerns about account abstraction\u2019s risks were <a href=\"https:\/\/forklog.com\/en\/news\/experts-assess-impact-of-eip-3074-on-ethereum-wallets\">raised<\/a> even before Pectra went live on mainnet. The original component was <a href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-3074\">EIP-3074<\/a>, which would \u201cdelegate control over <span data-descr=\"Externally Owned Accounts, external accounts\" class=\"old_tooltip\">EOA<\/span> to a smart contract\u201d. The idea was dropped in favour of what seemed a safer alternative at the time, <a href=\"https:\/\/ethereum-magicians.org\/t\/eip-7702-set-eoa-account-code-for-one-transaction\/19923\">EIP-7702<\/a> from Vitalik Buterin.\u00a0<\/p>\n<p>EIP-3074 was criticised for handing virtually full control over a wallet to the smart contract that received delegation. This would allow attackers to empty a user\u2019s balance with one signature.\u00a0<\/p>\n<p>Traditional EOAs, once a wallet is connected to a protocol, require approval for every subsequent transaction. For example, on a DEX any trading action must be signed manually. EIP-3074 removed that need via the opcodes <span data-descr=\"specifies the address that can send a transaction on behalf of the user\" class=\"old_tooltip\">AUTH<\/span> and <span data-descr=\"invokes smart contracts at the specified address on behalf of the user\" class=\"old_tooltip\">AUTHCALL<\/span>, but accounts became more vulnerable to malicious protocols.\u00a0<\/p>\n<p>The rejected proposal handed control over an external address to a smart contract, whereas its replacement, EIP-7702, added smart-contract code to the EO<span>\u200b<\/span>A. The initiative introduced a new transaction type, user_operation, and provided for permission revocation and compatibility with future AA upgrades.<\/p>\n<p>Even Buterin spoke of critical shortcomings, including trust and centralisation risks:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cIt seems that any proposal that aims to use EIP-3074 via \u2018privilege de-escalation\u2019 (also known as additional keys) will face a similar problem.\u201d<\/em><\/p>\n<\/blockquote>\n<p>He was right: moving code to the account level did not stop phishing attacks; if anything, it made them easier.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Real-world cases\u00a0<\/h2>\n<p>Smart accounts allow complex actions within a single transaction, support spend limits, autopayments and paying gas in a native token instead of ETH. But what if hackers create a protocol that simply sends all your funds to their wallet\u2014and all it takes is one signature?\u00a0<\/p>\n<p>According to a <a href=\"https:\/\/dune.com\/entropy_advisors\/ethereum-pectra-upgrade\">Dune<\/a> dashboard by Wintermute, since Pectra activated on May 7, delegations of EOAs to smart contracts have exceeded 140,000. Among known platforms, WhiteBIT, OKX Wallet and MetaMask lead by authorisations.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXd8BJKZJ3Lg4BX4iciKu5NYQqA-Lh7f7D7svWEMwItTUYiq3C_fgMRZkBIt0vg-nDeSyK3H3-htQgXtvob2j-Ix9uFFeAdO3_ANo-UJXhOlR6dg5bIeNVOzhdABlJhcm1xpW421?key=xD1yo_z_eDmeGaFwAvcu-Q\" alt=\"Account abstraction angst. How the Pectra upgrade made life easier for hackers\"\/><figcaption class=\"wp-element-caption\">Source: Dune.\u00a0<\/figcaption><\/figure>\n<p>The total number of smart contracts with delegation capability is 218.\u00a0<\/p>\n<p>On May 20, analysts at GoPlus Security recorded one of the first AA phishing incidents. They analysed a suspicious smart contract and found that upon signing it instantly executed a function to auto-transfer assets from the victim\u2019s wallet to the attackers\u2019 address.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">1\/<br \/>On-chain data from <a href=\"https:\/\/t.co\/yEVDjpXZOL\">https:\/\/t.co\/yEVDjpXZOL<\/a> shows 10K+ addresses using smart accounts. Below are the top 10 most-authorized 7702 Delegators: <a href=\"https:\/\/t.co\/akUzi7lPLo\">pic.twitter.com\/akUzi7lPLo<\/a><\/p>\n<p>\u2014 GoPlus Security ? (@GoPlusSecurity) <a href=\"https:\/\/twitter.com\/GoPlusSecurity\/status\/1924646924755534091?ref_src=twsrc%5Etfw\">May 20, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>On-chain data show the smart contract received about 300 authorisations.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXclQKaMeWON_5mLIkm1tozWPYO7StIO6vUylCIPybBEVkdEq5HfETTeV3H8ThvdJ9LlwMpRc4Q-Y_Zk3y7YdZVLRZojOWyEciaImqhf3r2CDiDg9p7eHwhKnbfYjiLeod5r472Sag?key=xD1yo_z_eDmeGaFwAvcu-Q\" alt=\"Account abstraction angst. How the Pectra upgrade made life easier for hackers\"\/><figcaption class=\"wp-element-caption\">Malicious EIP-7702 smart-contract code. Source: X.<\/figcaption><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cA sophisticated theft mechanism. This complex attack leverages users\u2019 trust in the new EIP-7702,\u201d GoPlus noted.<\/p>\n<\/blockquote>\n<p>The Wintermute dashboard also categorises delegator contracts. At present, about 72.8% are \u201ccrimes\u201d. The second-largest category (15%) relates to retail wallets, and the third (9%) to \u201cservices\u201d.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXegXOo_I_JzPxPR-U996pTCV5pE7cqPG44xeuEmdE3SWZ3i3NO4bKX5OBtefuPi3HIzbPEbSQrQreQEB9oFWVs8HHyvzgt4bPVHQkYTMNPtl5yf1JM1SfY4TLyMptfVrBOpGtV5?key=xD1yo_z_eDmeGaFwAvcu-Q\" alt=\"Account abstraction angst. How the Pectra upgrade made life easier for hackers\"\/><figcaption class=\"wp-element-caption\">Source: Dune.\u00a0<\/figcaption><\/figure>\n<p>On May 24, ScamSniffer reported an AA-phishing victim who lost about $146,000 in cryptocurrencies due to \u201cmalicious batch transactions\u201d.<\/p>\n<p>Meanwhile, a Web3 researcher found that the AngelFerno hacking group had added EIP-7702 support to a drainer it sells. The malware can simultaneously withdraw up to ten different coins with one signature on Ethereum, BNB Chain and Gnosis.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">AngelFerno keeping up with the latest <a href=\"https:\/\/twitter.com\/hashtag\/EIP7702?src=hash&#038;ref_src=twsrc%5Etfw\">#EIP7702<\/a> developments <\/p>\n<p>Teams like <a href=\"https:\/\/twitter.com\/MetaMask?ref_src=twsrc%5Etfw\">@MetaMask<\/a> have already taken steps to protect you. Great explanations by <a href=\"https:\/\/twitter.com\/Kerberus?ref_src=twsrc%5Etfw\">@Kerberus<\/a> <a href=\"https:\/\/twitter.com\/0xOhm_eth?ref_src=twsrc%5Etfw\">@0xOhm_eth<\/a> and others <\/p>\n<p>What does this mean? <\/p>\n<p>Summary:<\/p>\n<p>A drainer update has been released adding Pectra (EIP-7702)\u2026 <a href=\"https:\/\/t.co\/T6d1mwkqRc\">pic.twitter.com\/T6d1mwkqRc<\/a><\/p>\n<p>\u2014 0xSaiyangod (@saiyangod0x) <a href=\"https:\/\/twitter.com\/saiyangod0x\/status\/1921175471259050217?ref_src=twsrc%5Etfw\">May 10, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2 class=\"wp-block-heading\">Self-defence tips<\/h2>\n<p>There are no universal ways to counter attackers when moving to a smart wallet\u2014just as with traditional blockchain phishing. Still, cybersecurity experts agree on one thing: vigilance helps.\u00a0<\/p>\n<p>Possible recommendations:<\/p>\n<ul class=\"wp-block-list\">\n<li>authorise delegation only via official websites and plug-ins;<\/li>\n<li>do not follow suspicious links and do not trust emails that demand a signature to connect to a smart account;<\/li>\n<li>at the slightest suspicion, analyse the contract code yourself;\u00a0<\/li>\n<li>be vigilant when interacting with closed-source contracts;\u00a0<\/li>\n<li>double-check the authorisation address and do not rush to sign transactions;<\/li>\n<\/ul>\n<p>GoPlus Security also noted that leading wallets such as MetaMask have already added risk warnings for EIP-7702. When interacting with a suspicious protocol, the app will display a corresponding notice.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXc7G9vMkAE6rsVDrENAu8CxYuI6IqOlXfqkGm_z_n1UT71uW1PZh0ZAfJMZGke3keX81rGbUu9sngObGi9K42jP_oA6TYAWmdIydFMHBcnxqKm5OXgeGL2zEKg8IzsTE4tUZhj2?key=xD1yo_z_eDmeGaFwAvcu-Q\" alt=\"Account abstraction angst. How the Pectra upgrade made life easier for hackers\"\/><figcaption class=\"wp-element-caption\">Warning in MetaMask. Source: X.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n<p>As users adopt enhanced wallet functions, attackers have spotted new ways to profit. That does not mean EIP-7702 is a failure\u2014its strengths remain, not least a simplified UX.\u00a0<\/p>\n<p>Interacting with blockchains has always come with personal responsibility for safeguarding assets, but account abstraction demands more vigilance than ever. Keep the risks and basic cybersecurity rules in mind if you plan to turn your wallet into a smart contract.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Disclaimer: to fully grasp the technical aspects, we recommend reading materials on account abstraction and the Pectra upgrade.\u00a0 Beyond a boost to Ethereum\u2019s price, the May Pectra upgrade brought expanded functionality and improvements to the ecosystem. Among other things, it enhanced account abstraction (AA): a new type of transaction appeared, allowing ordinary addresses to function [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24372,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1301,1111,46,57],"class_list":["post-24373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-blockchain-vulnerabilities","tag-cybersecurity","tag-ethereum","tag-wallets"],"aioseo_notices":[],"amp_enabled":true,"views":"114","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=24373"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24373\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/24372"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=24373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=24373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=24373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}