Web Analytics
Finbold
2024-12-11 15:13:02

Solana validator extracts $60M with MEV Sandwich Attacks in a month – Should you be worried?

More controversy looms over Solana’s ( SOL ) decentralized finance ( DeFi ) as the crypto community discusses Maximum Extractable Value (MEV) tactics. According to sources, a single Solana validator has extracted over $60 million from “Sandwich Attacks” in a month. This was done using Solana’s blockchain architecture – which facilitates MEV activities like sandwich attacks – to its benefit and users’ harm. The onchain and DeFi analyst, core developer of DefiLlama, 0xngmi, commented on the matter, highlighting the $60 million profit. “And that’s only profits,” he added. “Total user losses are higher because you need to include validator bribes,” the transaction priority fees users have to pay. Arsc: The Solana validator profiting from MEV sandwich attacks Essentially, the discussion gained traction once Ben, the core developer of Temporal (@temporal_xyz), posted about the matter on December 10. Ben revealed three accounts linked to Arsc that are actively used to carry out the attacks and stake the profits. DKLvbSugkGMf4PBMakfHW9BdvcYj7Y7FRbsiL6v5DRy2 – Sandwich attack bot account. Source: SolScan / Ben / Finbold According to the post, Arsc is a Solana validator that uses its block-producing privileges to front-run users with a sandwich attack bot, aiming to increase its revenue from Maximum Extractable Value tactics. MILLIONS of dollars in MEV are siphoned away DAILY by vpe (aka arsc), the top sandwich bot. But the worst part? This isn’t just about MEV—it’s about centralization of MEV. And it’s the greatest threat to Solana’s decentralization I’ve seen. Solana’s volume is skyrocketing, and… pic.twitter.com/v6mlSQhtg1 — Ben ⌛ (@HypoNyms) December 10, 2024 As a solution to the problem, Ben proposes either whitelisting/blacklisting “good/bad” validators or using a Public mempool. Both solutions, however, involve some sort of centralized coordination and received criticism from other experts and commentators. “Whitelist/blacklist just leads to censorship, centralization, and backroom deals,” said Viktor Bunin, Protocol specialist at Coinbase. “The way to decrease sandwiching is through better slippage parameterization, intents/solvers, better dex design, or a rebate solution like Flashbots Protect.” What is an MEV sandwich attack, and why Solana? An MEV Sandwich Attack in Solana involves malicious actors exploiting transaction ordering to profit at the expense of regular users. This manipulation ensures the user always gets the worst price while the attacker reaps the benefits. These actors, typically validators or those with access to private mempools, place two transactions around a target user’s transaction: one before buying the asset at a low price and another after selling it at a higher price, thus “sandwiching” the user’s trade. Essentially, this practice harms users by increasing their transaction costs and reducing the fairness of the trading environment. Only a few validators benefit, as they control the transaction order in Solana’s leader-based block production system. Interestingly, Solana’s architecture makes it particularly conducive for such attacks due to its high-speed transaction processing and absence of an in-protocol mempool. Instead, some validators use private mempools which allow them to see and manipulate transactions before they are finalized. This scenario has led to significant MEV revenue for these validators, often at the direct cost of user experience and network integrity. Moreover, Solana’s architecture makes it difficult for external observers to spot MEV tactics like sandwich attacks, raising concerns about data obscurity and questions on how much of Solana’s Real Economic Value (REV) is actually coming from predatory value extraction. This is especially relevant as SOL supporters often mention REV as a leading metric that puts Solana ahead of competitors like Ethereum ( ETH ). However, Mert—CEO of Helius Labs, Solana’s largest RPC provider—explained that Sandwich Attacks only amount to a small share of the chain’s REV. “The last piece of data on this [sandwich attacks] is that it’s a single digit of total rev, this is what im referencing — the vast majority of revenue is via prioritizing [transactions] to land faster,” Mert said in a thread. As things develop, traders, investors, users, and enthusiasts discuss the MEV sandwiching attacks and potential solutions. For now, users who do not want to fall victim to such attacks could use Helius tools or opt for chains with built-in MEV protection like MultiversX ( EGLD ). Featured image from Shutterstock. The post Solana validator extracts $60M with MEV Sandwich Attacks in a month – Should you be worried? appeared first on Finbold .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.