Uniswap [UNI] has become the latest casualty of exploits in the cryptocurrency industry. The attack was on the protocol’s Liquidity Pool (LP) and ended in the perpetrators carting away $25.2 million. A smart contract developer, who pseudonymously goes by Punk3155 on Twitter, alerted the community about the issue.
<p lang=«en» dir=«ltr» xml:lang=«en»>Dusk for sandwich bots? A few top mev bots were targetted in blockhttps://t.co/tnlx5tAX1G@peckshield @BlockSecTeam @bertcmiller @samczsun @bbbb— 3155.eth (@punk3155) April 3, 2023
Realistic or not, here’s UNI’s market cap in BTC’s terms
The developer who monitored every step of the activity noted that it was likely the handwork of crook validators who joined the protocol 18 days back. He pointed out,
“Looks like a well-planned attack. becoming a validator 18 days ago, prepared the tokens 16 days ago.”
Blockchain security platform PeckShield Alert also chimed in on the cause and perpetrators. Through the investigation, the firm was able to locate where the stolen funds were transferred, with PeckShield noting that eight addresses that emerged from the KuCoin exchange were involved, and the funds were stored in three of them.
<p lang=«en» dir=«ltr» xml:lang=«en»>#PeckShieldAlert The stolen funds (~25M) are mainly located in 3 addresses, 0x3c98…8eb (~20M), 0x5b04…5b6 (~2.3M) and 0x27bf…f69 (~3M) 0x84cB…8D1, 0x88Fd…7EE, 0x94e0…87C, 0x0429…46C, 0xEafc…D1B, 0xCaCE…975, 0x5b04…5b6 and 0x27bf…f69 these 8 addresses were… https://t.co/7g60VX8ica pic.twitter.com/7oFwYSVoyn— PeckShieldAlert (@PeckShieldAlert) April 3, 2023
Further scrutiny of the event revealed that it was a sandwich attack. Sandwich attacks occur when atrocious traders look for a pending transaction within a network
Read more on ambcrypto.com