A wallet associated with Ethereum co-founder Vitalik Buterin has fallen victim to a type of on-chain attack called a MEV (Maximum Extractable Value) sandwich, carried out by a bot operating under the name “jaredfromsubway.eth.” According to etherscan explorer data, the attack was carried out against block 24993038 and processed on April 30th.
A sandwich attack occurs when a bot detects a large transaction pending confirmation in its memory pool. this Place two of your transactions around the victim: One before and after. The first operation is to buy the token that the user wants to sell and push its price up. I’ll sell the second one soon.
As a result, the user (in this case Vitalik) is caught in the middle, receiving less money than he would have received without the intervention.
A wallet associated with Buterin was selling 751,644 XDB tokens (digital bits) for a value of just $110 on Uniswap V2, a decentralized exchange protocol on Ethereum.
To thwart this manipulation, the bot deployed approximately $1.14 million in capital, the amount needed to float the price of the token in an illiquid pool. The difference between $5 and $15 will be extracted.
According to an analyst and researcher known for
Ethereum co-founder has suggestions but no solutions
At the beginning of March last year, Vitalik himself announced an idea to stop this type of attack. Among the solutions he proposed are encrypted memory pools. it is, Transactions are sent encrypted until they are included in a block.which prevents bots from detecting and intercepting them before they are verified.
He also noted that the network layer has been improved to ensure that transactions do not move publicly between users and blocks, reducing the scope for hostile attackers to see and act on transactions.
However, none of these solutions have been implemented on Ethereum, while bots like jaredfromsubway.eth continue to operate in public memory pools regardless of their victims.
(Tag translation) Destacard

