1. Home
  2. Bot
  3. MEVbots backdoor drains users’ Ethereum funds via arbitrage trading bot
MEVbots backdoor drains users’ Ethereum funds via arbitrage trading bot

MEVbots backdoor drains users’ Ethereum funds via arbitrage trading bot

0

Source: Coin Telegraph

An investigation of MEVbots’ contract revealed a backdoor that allows the creators to drain Ether from its users’ wallets.

MEV gain, an Ethereum (ETH) arbitrage trading bot built by MEVbots, which claims to provide stress-free passive income, has been actively draining its users’ funds via a fund-stealing backdoor. 

Arbitrage bots are programs that automate trading for profits based on historical market information. An investigation of MEVbots’ contract revealed a backdoor that allows the creators to drain Ether from its users’ wallets.

The scam was first pointed out by Crypto Twitter’s @monkwithchaos and later confirmed by blockchain investigator Peckshield. 

Suspect account @chemzyeth promoting MEV services. Source: Google cache

Following the revelation, primary promoter of MEV @chemzyeth disappeared from the internet.

@chemzyeth’s Twitter account deleted after community callout. Source: Twitter

Peckshield further confirmed that at least six users had fallen victim to the backdoor attack.

Transaction of stolen funds from MEV gain’s fund-stealing backdoor. Source: Peckshield

However, considering that the contract is still active, at least 13,000 unwary followers of MEVbots on Twitter remain at risk of losing their funds.

Related: ETHW confirms contract vulnerability exploit, dismisses replay attack claims

Carrying forward the success of scalability-focused layer-2 solutions, Ethereum co-founder Vitalik Buterin shared his vision for layer-3 protocols. He stated:

“A three-layer scaling architecture that consists of stacking the same scaling scheme on top of itself generally does not work well. Rollups on top of rollups, where the two layers of rollups use the same technology, certainly do not.”

One of the use cases for layer-3 protocols, according to Buterin, is “customized functionality” — aimed at privacy-based applications which would utilize zk proofs to submit privacy-preserving transactions to layer 2.

Go to Source
Author: Arijit Sarkar