Saturday, June 14, 2025
HomeCryptocurrency hackHackers Stealing More Than $280 Million Per Month From Crypto Transactions

Hackers Stealing More Than $280 Million Per Month From Crypto Transactions

Published on

SIEM as a Service

Follow Us on Google News

Due to new traders and an unbelievable increase in value, recently, the decentralized crypto market witnessed extensive penetration. Here the main reason behind this huge influx is the recent unexpected price hikes of bitcoin and Ether.

Moreover, the report of May 2021 has shown that in total more than $58 billion of cryptocurrencies were exchanged across decentralized exchanges (DEXes).

Unlike Coinbase or Binance, the DEXes are fully decentralized, in short, the decentralized exchanges are not operated by any individual entity, here, you can get full control of your funds, transactions, and account.

- Advertisement - Google News

Front-runners

In decentralized exchanges (DEXes) all the cryptocurrency transactions that are made, remain open to all, since the decentralized exchanges (DEXes) are not operated by any individual entity, and this is known as “mempools.”

Now here comes the role of front-runners; to loot others’ profit, the front-runners lure or target the naive traders and make them pay extra for their transactions.

Before the completion of others’ transactions on the blockchain, the front-runners can exploit the pending transactions data to jump in with their own; and to do so, they use several techniques since they have access to the mempools.

In general, all the incoming transactions remain locked into a smart contract in decentralized exchanges, but, due to public blockchain technologies the front-runners get access to the mempools and as a result, they can see all the incoming transactions that are locked into a smart contract.

Front-runners or Hackers Steal More than $280 million

The front-runners borrow a higher transaction fee from the innocent traders for placing the order as soon as they see an opening, by skipping the queue with the help of their bots.

In short, here the normal trader becomes the victim of these front-runners, and ultimately they bear hefty losses, as reported by CyberNews.

By utilizing the MEV Explore and MEV Inspect tools of Flashbots the security researchers at CyberNews have claimed that they have managed to discovered the magnitude of the losses induced by the front-runners.

They selected the time frame of 30 days, which is from April 24 to May 24, between this time frame, they have extracted drained value and all the key details.

In their investigation, they found that each day from the overall transactions the front-runners have hacked illicit profit of $12 million. In short, the hackers have hacked $280 million, a hefty amount of monthly revenue from traders, resulting in billions of dollars on a yearly basis. 

Most affected decentralized exchanges

The researchers have listed the most affected decentralized exchanges from where the hackers have extracted millions:-

  • Uniswap: Hackers drained 43%
  • SushiSwap: Hackers drained 23%
  • Balancer: Hackers drained 11%
  • Curve: Hackers drained 8.8%
  • dYdX: Hackers drained 7.7%
  • Other exchanges: Hackers drained 6.5%

Front-running – A big threat to DEXes

Since there’s a lack of mitigating tools or mechanisms, the front-running could be a big unaddressed threat to the DEXes. Eventually, this situation is steadily slow posing the entire ecosystem of decentralized finance.

However, for now, the security experts at CyberNews have strongly recommended the traders to avoid placing the high-value trades on any decentralized exchanges to avoid big losses.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...