Sandwich Attacks: Stealing or Just Playing the DeFi Game?

Sandwich attacks are eating up hapless traders’ lunch money


FotosDo/Shutterstock modified by Blockworks


DeFi trading is fraught with monetary dangers, borne from its freewheeling and volatile environment. And as if the wild west of crypto trading wasn’t already risky enough, highly effective bots have emerged to gobble up value from unwary traders in recent weeks.

These predatory robots are constantly on the lookout for new victims in Ethereum’s public mempool, hunting for opportunities to seize upon vulnerable orders. 

Technically, one could argue they’re not “stealing” anything, per se. The bots are really just extracting the maximum value, or MEV, in the most effective way possible under the given conditions.

Ostensibly, they’re just playing by the rules — and finding loopholes — better than everybody else. Their actions just happen to also be at the expense of everybody else. In the traditional finance world, this activity would likely be a clear-cut case of illegal behavior, but legalities are not as well-defined in decentralized finance. Not yet, anyway.

On a recent Bell Curve podcast, host Mike Ippolito spoke to Blockworks about the tweeted observations of a recent MEV exploit from steward and product lead at Flashbots, Robert Miller. This particular bot, going by the dubious moniker, jaredfromsubway.eth, has been highly successful with a technique referred to as a “sandwich attack.”

A sandwich attack consists of two rapid swaps surrounding a victim’s trade. It begins with an innocent trader sending their order to the public mempool, at which point the bot — always searching — spots its opportunity. 

The attack begins with a frontrun, followed up by an attack on the backend of the selected trade, hence the term “sandwich.” In an example posted by Miller, the bot exploits pepe (PEPE) trades with ether (ETH). 

The frontrun, Miller explains, sells the attacker’s pepe for ether. This causes the price of ether to climb immediately before the targeted trade is initiated. The victim then swaps their pepe for ether, receiving less than they should expect due to the price hike caused by the bot. 

Following this, the bot promptly sells ether back for the memecoin, which is now cheaper because of the victim’s sell order. 

In this particular example of a brief moment of exploitation, the bot gains 0.04 ETH and 300 memecoins, unbeknownst to the hapless victim. It might not sound like much, but it’s happening constantly, netting the bot millions of dollars over the past few weeks.

Extremely good at sniping

Ippolito says this particular bot is highly effective because it “takes a very different approach.” It starts with a large supply of a token — in this case, pepe — so “there’s just much less competition.” 

“The reason why more bots don’t do that is just because warehousing becomes very difficult,” he says.

“You don’t really want to hold a whole bunch of your assets in something that’s as volatile as something like pepe, because any profits that you get from the sandwiching could be offset by declines from the memecoin basically failing.”

“But I guess jaredfromsubway is extremely good at sniping.”

Indeed, the bot is especially effective at “sniping,” suspiciously snapping up a large supply of pepe within ten minutes of it being deployed. This lucrative acquisition allowed it to have the required inventory for its MEV strategy.

One way to avoid becoming a victim of attacks of this nature is to change a wallet’s RPC (remote procedure call) to Flashbots’ Protect RPC solution. The tool diverts transaction orders from the public to a protected mempool. From there, it privately transmits transactions, rendering them invisible to bots, thus eliminating the possibility of such attacks.

On a positive note, co-founder of Framework Ventures, Vance Spencer, suggests the recent ramp-up in MEV activity is a good sign for the market, noting that “MEV is turning back on.”

Michael Anderson of Framework Ventures agrees, noting that the level of engagement on pepe indicates “green shoots” out of the bear market and the possibility of finally “moving past it.”

For good or bad, “MEV is gonna be a benefactor for all of that.”

Start your day with top crypto insights from David Canellis and Katherine Ross. Subscribe to the Empire newsletter.

Explore the growing intersection between crypto, macroeconomics, policy and finance with Ben Strack, Casey Wagner and Felix Jauvin. Subscribe to the On the Margin newsletter.

The Lightspeed newsletter is all things Solana, in your inbox, every day. Subscribe to daily Solana news from Jack Kubinec and Jeff Albus.


Upcoming Events

Salt Lake City, UT

MON - TUES, OCT. 7 - 8, 2024

Blockworks and Bankless in collaboration with buidlbox are excited to announce the second installment of the Permissionless Hackathon – taking place October 7-8 in Salt Lake City, Utah. We’ve partnered with buidlbox to bring together the brightest minds in crypto for […]

Salt Lake City, UT

WED - FRI, OCTOBER 9 - 11, 2024

Pack your bags, anon — we’re heading west! Join us in the beautiful Salt Lake City for the third installment of Permissionless. Come for the alpha, stay for the fresh air. Permissionless III promises unforgettable panels, killer networking opportunities, and mountains […]

recent research

Research Report Templates.png


ZKPs enable efficient offchain transaction processing and validation, resulting in increased throughput and reduced fees. Solana's ZK Compression leverages ZKPs to minimize onchain storage costs, while Sui's zkLogin streamlines user onboarding by replacing complex key management with familiar OAuth credentials.


North Korea suspected in breach of Indian exchange’s multisig wallet


Plus, Sanctum’s CLOUD token has officially launched — but not without problems


It’s not yet clear whether Donald Trump is pumping bitcoin. But an unofficial memecoin is still seeing benefit.


StarkWare takes a step towards making StarkNet for Bitcoin


The numbers point to one conclusion: Risk is back, or at least it was during the first half of the year