#Satoshi Net Worth Tops Bill Gates#
Arkham announced on social media that Satoshi Nakamoto is now wealthier than Bill Gates, with a net worth reaching $116.7 billion compared to Gates' $116.2 billion.
💬 What does this mean for the crypto market? How will Satoshi's wealth impact Bitcoin's future and interest from mainstream investors?
#Trump BTC ETF Application#
Truth Social, operated by Trump Media & Technology Group, has applied for a Bitcoin spot ETF through a partner. The fund aims to track Bitcoin's spot price performance. If approved, Truth Social would be the first social media platfor
Ethereum’s Pectra Upgrade Exploited by Bots Draining Wallets: Report | BSCN (fka BSC News)
Ethereum’s recent “Pectra” upgrade introduced several features to improve how users interact with the network. One of the most talked-about changes was EIP-7702, a proposal backed by Ethereum co-founder Vitalik Buterin
This feature allows wallets to behave temporarily like smart contracts, enabling batch transactions, gas sponsorships, social authentication, and spending limits.
However, according to Wintermute, a leading crypto trading firm, this new upgrade has opened the door to a dangerous wave of automated sweeper attacks, draining unsuspecting users' wallets. And these attacks are spreading rapidly.
A Feature with Good Intentions
EIP-7702 was meant to make Ethereum more user-friendly.
Users could sign just one transaction to handle several actions at once—something previously only possible through smart contracts. For instance, a user could approve a token, swap it, and send the output to another wallet in one go.
It also offered quality-of-life improvements like sponsoring gas for someone else, or using social login systems to authenticate wallets, making it easier for mainstream users to interact with Ethereum without wrestling with seed phrases.
But what was designed to help users has quickly been turned into a weapon by bad actors.
The Rise of CrimeEnjoyor: A Copy-Paste Attack Vector
Wintermute recently published an analysis showing how EIP-7702 is being used by bots in what are called sweeper attacks.
The tool of choice? A widely duplicated contract Wintermute nicknamed “CrimeEnjoyor.”
Here’s how it works:
Criminals deploy malicious contracts with simple bytecode, copy-pasted across thousands of instances. These contracts are designed to automatically sweep funds from wallets whose private keys have been compromised. Once these wallets receive ETH, the contracts instantly forward the funds to the attacker’s address.
Wintermute’s research, made available via a Dune dashboard, shows that over 97% of EIP-7702 delegations have been linked to these identical contracts.
It’s Not Just a Smart Contract Problem
While EIP-7702 is the vehicle, the root cause remains compromised private keys.
Wintermute and other security experts emphasize that EIP-7702 isn’t inherently dangerous. Rather, it makes it easier and faster to steal funds once a wallet is compromised.
As security expert Taylor Monahan noted:
EIP-7702 reportedly made it more efficient for attackers to clean out vulnerable wallets.
Real Losses: A $146,550 Example
On May 23, a user unknowingly signed several malicious batch transactions using EIP-7702. The result? A loss of $146,550, according to blockchain security firm Scam Sniffer.
These malicious transactions were linked to Inferno Drainer, a well-known scam-as-a-service provider that has been active in the crypto space for years.
An Inconvenient Truth for Ethereum’s Future
Wintermute took things a step further by reverse-engineering the malicious bytecode into human-readable Solidity code. This made it easier to identify and tag malicious contracts. They even verified the code publicly to raise awareness.
The code itself contains a warning in plaintext:
But despite the warning, the contract remains effective. Users who don’t understand what they’re signing are at serious risk, especially when using unfamiliar dApps or tools that prompt them to delegate control under EIP-7702.
Pectra’s Other Features Now Overshadowed
The Pectra upgrade, which went live on May 7 at epoch 364032, also included two other major changes:
But due to the abuses of EIP-7702, these other upgrades have been largely overshadowed.
To date, more than 12,329 EIP-7702 transactions have been executed, most linked to delegations abused by sweeper bots.
So, What’s the Fix?
While EIP-7702 itself is opt-in, and not mandatory for basic transactions, the need for education, transparency, and wallet-level security improvements is more pressing than ever.
Users should:
For developers, Wintermute suggests verifying contracts publicly and making dangerous patterns easier to detect. The firm believes that tagging malicious activity more aggressively can protect new users and reduce phishing risks.