Market Cap: $3.3286T 0.180%
Volume(24h): $65.8056B -33.100%
  • Market Cap: $3.3286T 0.180%
  • Volume(24h): $65.8056B -33.100%
  • Fear & Greed Index:
  • Market Cap: $3.3286T 0.180%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$108166.236572 USD

0.05%

ethereum
ethereum

$2515.590590 USD

-0.11%

tether
tether

$1.000285 USD

-0.01%

xrp
xrp

$2.216184 USD

-0.32%

bnb
bnb

$655.165841 USD

0.05%

solana
solana

$147.119253 USD

-0.66%

usd-coin
usd-coin

$1.000016 USD

0.00%

tron
tron

$0.283596 USD

0.48%

dogecoin
dogecoin

$0.163766 USD

0.36%

cardano
cardano

$0.572467 USD

-0.10%

hyperliquid
hyperliquid

$39.371467 USD

0.63%

sui
sui

$2.897088 USD

0.28%

bitcoin-cash
bitcoin-cash

$487.010658 USD

0.33%

chainlink
chainlink

$13.191270 USD

-0.04%

unus-sed-leo
unus-sed-leo

$9.039695 USD

-0.03%

Cryptocurrency News Articles

A sandwich attack on a stablecoin swap on Uniswap cost a cryptocurrency trader $215,500, highlighting the risks in this space.

Mar 14, 2025 at 02:20 am

This incident highlights a number of significant issues: Security versus transparency: Even though blockchain transparency ensures trustlessness, it exposes merchants to potential weaknesses like sandwich attacks.

A sandwich attack on a stablecoin swap on Uniswap cost a cryptocurrency trader $215,500, highlighting the risks in this space.

A cryptocurrency trader suffered significant losses after becoming a victim of a sandwich attack on Uniswap, a popular decentralized exchange (DEX), aiming to swap USD Coin (USDC) for Tether (USDT). The trader, who had expressed gratitude for the event, initially attempted to exchange USDC, valued at $220,764, for USDT on Uniswap.

However, the trader ended up with only $5,271 USD from the sandwich assault, resulting in a substantial loss. According to Michael Nadeau, founder of the DeFi Report, data from the Ethereum block reveals that the MEV attack occurred on Uniswap v3’s USDC-USDT liquidity pool.

A sandwich attack, also known as a MEV attack, is a type of front-running where a malicious actor discovers a pending transaction and submits two orders: a purchase order immediately before the target transaction and a sell order immediately after.

In this case, the attacker's purchase order increased the token's price, while the subsequent sell order, after the victim's transaction was executed, decreased the token's price. This manipulation forced the victim to purchase the token at a higher price and sell it at a lower price.

Furthermore, DeFiac, a renowned DeFi researcher, noted that the same trader, using different wallets, fell victim to a total of six sandwich attacks. Internal tools revealed that all funds traveled from Aave before being deposited on Uniswap.

The attacker searched for large, unprocessed transactions, typically over $100,000, to maximize their potential gains. Upon locating a target, the attacker would increase the item's price by filing a buy order for the same item.

For instance, if the victim planned to exchange 100,000 USDC for USDT at a price of 1.01, the attacker would submit a limit order to buy 50,000 USDC at 1.01. This action would raise the price of USDC, and the best price at which the victim could sell his 100,000 USDC would become 1.01.

As a result, the victim's trade would be executed at this inflated price, and he would receive fewer USDT than anticipated. To capitalize on this discrepancy, the attacker would then place a sell order for 50,000 USDC at the new, higher price, which was 1.01 in this case.

This attack method is applicable to any token on Uniswap v3, and traders can take precautions to mitigate the risk.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Jul 07, 2025