top of page
link.png

ID:

sandwich-ripper---mev-bots-1525

blob_404.png

Date:

Status:

Incident Count:

April 3, 2023

Verified

1

info.png
REKT

Contributor:

chain.png

web3rekt.com

KYC By:

KYC:

None

info.png
50 pts

Audit By:

Audits:

None

Loss Amount:

20,067,499

info.png

Recovered:

-

Rewards:

Ticker:

USD, WETH, USDT, WBTC, DAI

info.png
100 pts each

Several MEV Bots were exploited by Sandwich the Ripper. The backrun txs, which are supposed to do the reverse swap and take profits, were reverted by possibly a rogue validator. The attack focuses on 8 sandwich bundles with transactions replaced with the exploiter. The exploiter created a token pair which was used to trigger the attacks. The funding source for token pair came from Ku Coin.

This attack is well-planned as the exploiter became a validator 18 days ago. The initial funds for the setup were sourced from Aztec.

Interestingly, since a validator is randomly chosen, is this just pure luck that the rogue validator was awaiting for this opportunity or it is something more sinister to send a message to MEV Bots as a whole?

info.png

DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. 

​

Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.

bottom of page