Sunday, February 23, 2025
HomeCryptocurrency hackHackers Stealing More Than $280 Million Per Month From Crypto Transactions

Hackers Stealing More Than $280 Million Per Month From Crypto Transactions

Published on

SIEM as a Service

Follow Us on Google News

Due to new traders and an unbelievable increase in value, recently, the decentralized crypto market witnessed extensive penetration. Here the main reason behind this huge influx is the recent unexpected price hikes of bitcoin and Ether.

Moreover, the report of May 2021 has shown that in total more than $58 billion of cryptocurrencies were exchanged across decentralized exchanges (DEXes).

Unlike Coinbase or Binance, the DEXes are fully decentralized, in short, the decentralized exchanges are not operated by any individual entity, here, you can get full control of your funds, transactions, and account.

Front-runners

In decentralized exchanges (DEXes) all the cryptocurrency transactions that are made, remain open to all, since the decentralized exchanges (DEXes) are not operated by any individual entity, and this is known as “mempools.”

Now here comes the role of front-runners; to loot others’ profit, the front-runners lure or target the naive traders and make them pay extra for their transactions.

Before the completion of others’ transactions on the blockchain, the front-runners can exploit the pending transactions data to jump in with their own; and to do so, they use several techniques since they have access to the mempools.

In general, all the incoming transactions remain locked into a smart contract in decentralized exchanges, but, due to public blockchain technologies the front-runners get access to the mempools and as a result, they can see all the incoming transactions that are locked into a smart contract.

Front-runners or Hackers Steal More than $280 million

The front-runners borrow a higher transaction fee from the innocent traders for placing the order as soon as they see an opening, by skipping the queue with the help of their bots.

In short, here the normal trader becomes the victim of these front-runners, and ultimately they bear hefty losses, as reported by CyberNews.

By utilizing the MEV Explore and MEV Inspect tools of Flashbots the security researchers at CyberNews have claimed that they have managed to discovered the magnitude of the losses induced by the front-runners.

They selected the time frame of 30 days, which is from April 24 to May 24, between this time frame, they have extracted drained value and all the key details.

In their investigation, they found that each day from the overall transactions the front-runners have hacked illicit profit of $12 million. In short, the hackers have hacked $280 million, a hefty amount of monthly revenue from traders, resulting in billions of dollars on a yearly basis. 

Most affected decentralized exchanges

The researchers have listed the most affected decentralized exchanges from where the hackers have extracted millions:-

  • Uniswap: Hackers drained 43%
  • SushiSwap: Hackers drained 23%
  • Balancer: Hackers drained 11%
  • Curve: Hackers drained 8.8%
  • dYdX: Hackers drained 7.7%
  • Other exchanges: Hackers drained 6.5%

Front-running – A big threat to DEXes

Since there’s a lack of mitigating tools or mechanisms, the front-running could be a big unaddressed threat to the DEXes. Eventually, this situation is steadily slow posing the entire ecosystem of decentralized finance.

However, for now, the security experts at CyberNews have strongly recommended the traders to avoid placing the high-value trades on any decentralized exchanges to avoid big losses.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...