Telegram (AI) YouTube Facebook X
Ру
MEV bot operators lose $25m in exploit

MEV bot operators lose $25m in exploit

A group of blockchain bots that use MEV to extract additional income lost more than $25 million in an attack by a rogue validator.

Eight bots were targeted at carrying out ‘sandwich transactions’, CertiK researchers noted. In this strategy the software detects an attempt to buy a large amount of an asset and front-runs it; as a result the price rises. Executing the user’s order moves quotes higher, and the bot sells the coins for profit (a combination of front-running and back-running). All transactions are batched in a single block.

According to the experts, the rogue validator credited to his own addresses wrapped Bitcoin (WBTC) and Ethereum (WETH), as well as USD Coin (USDC), Tether (USDT) and Dai (DAI) worth about $25.4 million.

CertiK specialists noted that, in the MEV framework, checks on nodes for potential malfeasance are performed by Flashbots’ flash bots. In this incident the exploit-actor validator had been active for about three weeks.

In the view of experts, the vulnerability stems from centralisation of power among the network’s block-producing node operators.

Developers of Flashbots’ MEV-Boost solution, popular in the Ethereum network, responded to the incident with code changes to prevent similar attacks. The patch introduces a previously missing function for relays, which act as intermediaries between block builders and validators.

Under the proposal, the relay will publish a signed block before it is forwarded to the consensus layer. This should prevent a scenario where an attacker could revert executed data.

In February, Flashbots introduced the MEV-Share protocol, which expanded the possibilities for users in distributing MEV.

Подписывайтесь на ForkLog в социальных сетях

Telegram (основной канал) Facebook X
Нашли ошибку в тексте? Выделите ее и нажмите CTRL+ENTER

Рассылки ForkLog: держите руку на пульсе биткоин-индустрии!

We use cookies to improve the quality of our service.

By using this website, you agree to the Privacy policy.

OK