
ID:
sandwich-ripper---mev-bots-1525
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Ethereum
MEVBots
Infrastructure & Tools
Contract Vulnerabilities
Extended Method:
Rogue validator
Days in Operation:
25
(0.07 Years)





100 pts each
Several MEV Bots were exploited by Sandwich the Ripper. The backrun txs, which are supposed to do the reverse swap and take profits, were reverted by possibly a rogue validator. The attack focuses on 8 sandwich bundles with transactions replaced with the exploiter. The exploiter created a token pair which was used to trigger the attacks. The funding source for token pair came from Ku Coin.
This attack is well-planned as the exploiter became a validator 18 days ago. The initial funds for the setup were sourced from Aztec.
Interestingly, since a validator is randomly chosen, is this just pure luck that the rogue validator was awaiting for this opportunity or it is something more sinister to send a message to MEV Bots as a whole?
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
​
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.