$25 Million Lost in Attack on MEV Bots

Photo - $25 Million Lost in Attack on MEV Bots
The MEV bots function as high-frequency traders that capture arbitrage opportunities by leveraging the speed and intricacies of blockchain operations. However, these bots put large sums of money at risk to manipulate prices to sufficient levels, making them vulnerable to exploits.
The attacker compromised several MEV bots on April 3 by replacing their regular transactions with malicious ones, leading to the theft of funds and significant losses for the MEV bots. Joseph Plaza, a decentralized finance trader at Wintermute, explained that the attacker likely used "bait" transactions to lure the MEV bots, replacing them with malicious transactions to siphon off funds. The attacker even deposited 32 ETH to become a validator 18 days before the incident to prepare for the attack.

Plaza suggested that the attacker waited until it was their turn to propose a block as a validator, allowing them to reorganize the contents of the block and create a new one that included their malicious transactions to drain assets. The stolen assets were later traced to three Ethereum addresses by PeckShield, which consolidated funds from eight other addresses.

Flashbots, the developer of the primary MEV software, MEV-Boost, responded to the incident by introducing a feature that instructs relayers to publish a signed block before transmitting its contents to a proposer. This additional step aims to decrease the likelihood of a malicious proposer within MEV-Boost, proposing a block that deviates from what they received from a relay, and prevent similar incidents from happening in the future. This recent exploit highlights the need for more effective security measures to safeguard blockchain transactions from malicious actors.

GN
GNcrypto
Author