Ethereum MEV bots lose over $25 million in sophisticated attack

Quick Take

  • A group of MEV bots lost over $25 million in a sophisticated attack on the Ethereum blockchain.
  • The attacker replaced the normal MEV transactions of the bots with malicious ones, causing them to lose money.

A sophisticated exploit led to a loss of over $25 million for a group of blockchain bots working to generate revenue through a process called maximal extractable value (MEV).

MEV bots operate like blockchain-based high frequency traders. They focus on using speed and the technicalities of how blockchains work to capture arbitrage opportunities. But to do so, they often have to put large amounts of money at risk (in order to manipulate prices to sufficient levels).

An attacker compromised some of these MEV bots on April 3, by substituting their regular transactions with malicious ones, resulting in the theft of their funds. In doing so, the attacker inflicted substantial losses on the MEV bots.

Joseph Plaza, decentralized finance trader at Wintermute, explained that the exploiter likely set "bait" transactions to lure the MEV bots. The attacker then replaced the initial baiting transactions with new, malicious ones, allowing them to steal the funds. To prepare for the attack, the perpetrator deposited 32 ETH to become a validator 18 days before the incident.

Plaza added that the attacker probably waited until it was their turn to propose a block as a validator, which coincided with the attack. They subsequently reorganized the contents of the block and created a new one containing their malicious transactions in order to drain assets.

THE SCOOP

Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

Smart contract developer "3155.eth" initially revealed the incident on Twitter, and PeckShield subsequently traced the stolen assets to three Ethereum addresses, consolidated from eight other addresses.

Flashbots, the developer of the primary MEV software used on Ethereum, known as MEV-Boost, has responded with a fix to prevent such incidents from occurring in the future.

The team has introduced a feature that instructs relayers, a trusted mediator party between block builders and validators, to publish a signed block before transmitting its contents to a proposer, a step that was previously absent. This action aims to decrease the likelihood of a malicious proposer within MEV-Boost proposing a block that deviates from what they received from a relay.

Disclaimer: Evgeny Gaevoy, the founder and CEO of Wintermute, sits on The Block's board of directors.


© 2023 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Vishal Chawla is The Block’s crypto ecosystems editor and has spent over six years covering tech protocols, cybersecurity, artificial intelligence and cloud computing. Vishal likes to delve deep into blockchain intricacies to ensure readers are well-informed about the continuously evolving crypto landscape. He is also a staunch advocate for rigorous security practices in the space. Before joining The Block, Vishal held positions at IDG ComputerWorld, CIO, and Crypto Briefing. He can be reached on Twitter at @vishal4c and via email at [email protected]

Editor

To contact the editor of this story:
Tim Copeland at
[email protected]