Summary: Ethereum phishing scams – $12M lost in August as EIP-7702 exploits surge!

Published: 4 days and 6 hours ago
Based on article from AMBCrypto

The digital currency landscape witnessed a stark increase in sophisticated phishing attacks during August 2025, with scammers devising new methods to exploit advanced blockchain features. A significant portion of these exploits targeted Ethereum's EIP-7702 standard, highlighting how innovation can become a vulnerability in the wrong hands.

Escalating Crypto Phishing Scams

August 2025 saw an alarming surge in crypto phishing activities, resulting in over $12 million being pilfered from more than 15,000 wallets. This represents a substantial 72% increase in financial losses and a 67% rise in victim numbers compared to the previous month. Notably, a handful of "whale" wallets alone accounted for nearly half of the total losses, demonstrating the high-value targets these advanced scams are reaching. Security experts warn that even prominent projects are falling prey to these highly adaptive and organized criminal groups.

EIP-7702: Innovation Turned Vulnerability

Ethereum's EIP-7702, introduced to enhance wallet functionality by allowing externally owned accounts (EOAs) to temporarily mimic smart contract capabilities, was intended to offer convenient features like batch transactions, spending caps, and improved wallet recovery. However, attackers quickly weaponized these very advancements. They are exploiting the standard to accelerate thefts and trick users into signing malicious approvals, turning a beneficial upgrade into a potent attack vector. Disturbingly, analyses reveal that over 80% of delegate contracts linked to EIP-7702 have exhibited malicious behavior, compromising more than 450,000 wallet addresses since its rollout.

Crucial Steps for Investor Vigilance

With sophisticated attacks spreading across Ethereum Virtual Machine (EVM) ecosystems, user awareness remains critically low. To counter these evolving threats, it is imperative for investors to exercise extreme caution. Recommendations include meticulously verifying domain names, resisting pressure for rushed approvals, and unequivocally rejecting any signature requests that grant unlimited or overly broad permissions over assets. Staying vigilant against suspicious prompts and mismatched transaction simulations is paramount, as even breakthrough features can be manipulated by malicious actors.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.