Rogue Validator udnytter MEV-bots på Ethereum, Resulterer i $25,3 mio. i kryptotab

Den april 3, 2023, at Ethereum block height 16,964,664, a group of MEV (Maximal Extractable Value) bots were exploited for $25.3 million. An analysis of the exploit revealed that a renegade validator switched the MEV bots’ transactions and seized various crypto tokens, such as 7,460 wrapped ether and 64 wrapped bitcoin.

Indhold

While the Mechanisms Behind MEV Bots Boost Profit, They Also Have Vulnerability to Exploits

For nylig, crypto proponents and security experts have been discussing how a group of MEV bots lost $25.3 million in a sophisticated exploit. The attacker used a transaction manipulation tactic that enabled the rogue validator to replace several MEV transactions, resulting in the loss of a significant amount of WBTC, USDC, USDT, DAI, and WETH.

MEV, also known as “Maximal Extractable Value” bots or flashbots, are automated software programs that use Ethereum’s blockchain to profit from transaction execution. MEV bots have various uses, such as executing trades ahead of other traders, known as front-running, and discovering arbitrage and liquidation opportunities.

I dette tilfælde, the rogue validator employed a “sandwich attack,” which is a type of transaction manipulation tactic utilized by MEV bots on Ethereum. Interessant nok, the renegade validator became an Ethereum validator on March 16, 2023, a little over two weeks before the exploit took place.

“In this incident, a rogue validator appears to have broken the “gentleman’s agreement” whereby Flashbot validators ignored the fact that penalties for malicious behavior were in many cases inadequate to economically disincentivize it,” Certik, a Web3 and blockchain auditing and security firm told Bitcoin-Tidings.com News in a note on Monday.

“In total, the rogue validator was able to replace MEV transactions worth $25.3 million,” Certik added. “The irony of MEV bots falling victim to a scheme like this is unlikely to earn them much sympathy from the general public, who tends to be the victim of their value extraction. Stadig, this incident highlights the dangers of centralized systems, where an agreement to play by the rules can be just as easily revoked as it was given.”

Certik further reports that $1.82 million in WBTC, $5.29 million in USDC, $3 million in USDT, $1.7 million in DAI, og $13.52 million worth of wrapped bitcoin (WBTC) was taken in the exploit. MEV bots or Flashbots can generate significant profits for their operators, but they have also raised concerns within the Ethereum ecosystem over fairness and censorship.

Tags i denne historie
Arbitrage, Auditing, Bitcoin-Tidings.com Nyheder, Blockchain, centralized systems, certik, crypto tokens, Kryptovaluta, DAI, Ethereum, Udbytte, Flashbots, front-running, gentleman’s agreement, Liquidation, Maximal Extractable Value, MEV bots, Profit, public opinion, risici, rogue validator, Sikkerhed, transaction manipulation, USDC, USDT, value extraction, Sårbarhed, WBTC, Fonden vil søge indledende investeringer i virksomheder og protokoller i tidlige stadier, der starter ved 500.000 USD og op til, WETH

What do you think the future holds for MEV bots in light of this exploit, and how can their risks be mitigated? Del dine tanker om dette emne i kommentarfeltet nedenfor.

Jamie Redman

Jamie Redman er nyhedschef hos Bitcoin-Tidings.com News og en finansteknologisk journalist, der bor i Florida. Redman har været et aktivt medlem af cryptocurrency-fællesskabet siden 2011. Han har en passion for Bitcoin, åben kildekode, og decentrale applikationer. Siden september 2015, Redman har skrevet mere end 6,000 artikler til Bitcoin-Tidings.com Nyheder om de forstyrrende protokoller, der dukker op i dag.




Billedkreditter: Shutterstock, Pixabay, Wiki Commons

Ansvarsfraskrivelse: Denne artikel er kun til informationsformål. Det er ikke et direkte tilbud eller opfordring til et tilbud om at købe eller sælge, eller en anbefaling eller godkendelse af produkter, tjenester, eller virksomheder. Bitcoin-Tidings.com giver ikke investeringer, skat, gyldige, eller regnskabsrådgivning. Hverken virksomheden eller forfatteren er ansvarlig, direkte eller indirekte, for enhver skade eller tab forårsaget eller påstået at være forårsaget af eller i forbindelse med brugen af ​​eller tilliden til noget indhold, varer eller tjenesteydelser nævnt i denne artikel.

Læs ansvarsfraskrivelse