WLFI holders targeted by hackers in phishing exploitation

Falling prices are not the only financial losses in freedom in the world (Wlfi) Holders face just one day after the token to live for trading.
Hackers seem to take advantage of a loophole tied to recently -only Ethereum PECTRA UPGRADE.
WLFI, Donald Trump’s Management token of Management Management which began trading on Monday with a 24.6 billion supply, with an ecosystem of branded cards and payment services. After rising as high as 33.13 cents after its trading debut, the WLFI price dropped to 24.27 cents, out of coingecko data.
The vector attack can be traced back to EIP-7702, a feature introduced in May that allows regular wallets to operate such as smart contract wallets for batch transactions.
While meant to improve the user’s experience, it became a double blade because the attacks could plant a malicious delegate contract within a compromised purse. When the victim is then deposited the ETH or tokens, the funds will automatically the funds to the hacker -controlled addresses.
Slowmist founder Yu Xian filed an issue on Monday, saying that many WLFI wallets were drained using the procedure.
“Once you try to move away the remaining tokens … The gas input you will automatically move away,” he warned, noting that private keys leak, often through phishing sites, are the usual point of entry.
I met a player with a lot of addresses $ Wlfi Everything was stolen. After reviewing the robbery method, it was also a malignant use of a 7702 delegate contract, and the premise was that the private key was scattered. The hacker gambled at the malicious 7702 delegate address in advance of the purse’s target address, and then moved all ETH tokens and target address value (such as $ WLFI here), without any slag. If the user transferred to ETH, he would … https://t.co/YYVVMPWAGM
– COS (Cosine) 😶🌫️ (@evilcos) September 1, 2025
Users at WLFI Forum Describe the attempts to save their allocations. An investor said they managed to move only 20% of their tokens to a new purse, with the rest still trapped in a compromised address.
Exploitation adds to a rash of scams surrounding the start of the trade. Analytics bubblemaps firm are that -flag “Bundle clones“The imitation of WLFI contracts, while phishing links spread to Telegram and X.