市值: $2.6914T -2.040%
體積(24小時): $70.0278B -6.130%
  • 市值: $2.6914T -2.040%
  • 體積(24小時): $70.0278B -6.130%
  • 恐懼與貪婪指數:
  • 市值: $2.6914T -2.040%
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
Top News
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
bitcoin
bitcoin

$82992.240739 USD

-0.74%

ethereum
ethereum

$1905.557390 USD

-0.09%

tether
tether

$1.000184 USD

0.02%

xrp
xrp

$2.288240 USD

-2.48%

bnb
bnb

$639.836036 USD

0.18%

solana
solana

$125.371788 USD

-2.70%

usd-coin
usd-coin

$1.000156 USD

0.01%

cardano
cardano

$0.709189 USD

-2.10%

dogecoin
dogecoin

$0.168054 USD

-3.39%

tron
tron

$0.225003 USD

5.02%

chainlink
chainlink

$14.178727 USD

2.78%

unus-sed-leo
unus-sed-leo

$9.821699 USD

-0.06%

toncoin
toncoin

$3.542072 USD

3.56%

stellar
stellar

$0.270845 USD

-0.96%

hedera
hedera

$0.188253 USD

-1.44%

加密貨幣新聞文章

對穩定股份交換的三明治攻擊額定為加密貨幣交易者$ 215,500,突出了該領域的風險。

2025/03/14 02:20

該事件突出了許多重大問題:安全性與透明度:即使區塊鏈透明度確保了無信任度,但它仍將商人暴露於諸如三明治攻擊之類的潛在弱點。

對穩定股份交換的三明治攻擊額定為加密貨幣交易者$ 215,500,突出了該領域的風險。

A cryptocurrency trader suffered significant losses after becoming a victim of a sandwich attack on Uniswap, a popular decentralized exchange (DEX), aiming to swap USD Coin (USDC) for Tether (USDT). The trader, who had expressed gratitude for the event, initially attempted to exchange USDC, valued at $220,764, for USDT on Uniswap.

加密貨幣交易員在成為對uniswap的三明治攻擊的受害者(dex)的受害者,旨在將USD Coin(USDC)換成Tether(USDT)。對這項活動表示感謝的交易者最初試圖兌換USDC,價值220,764美元,在UNISWAP上為USDT提供了220,764美元。

However, the trader ended up with only $5,271 USD from the sandwich assault, resulting in a substantial loss. According to Michael Nadeau, founder of the DeFi Report, data from the Ethereum block reveals that the MEV attack occurred on Uniswap v3’s USDC-USDT liquidity pool.

但是,交易者最終僅獲得了三明治襲擊的5,271美元,造成了巨大的損失。根據DEFI報告的創始人邁克爾·納多(Michael Nadeau)的說法,以太坊塊的數據表明,MEV攻擊發生在Uniswap V3的USDC-USDC-USDT流動性池中。

A sandwich attack, also known as a MEV attack, is a type of front-running where a malicious actor discovers a pending transaction and submits two orders: a purchase order immediately before the target transaction and a sell order immediately after.

三明治攻擊,也稱為MEV攻擊,是一種前進的類型,惡意演員發現了待處理的交易並提交了兩個訂單:立即在目標交易前的採購訂單和後立即提交賣出訂單。

In this case, the attacker's purchase order increased the token's price, while the subsequent sell order, after the victim's transaction was executed, decreased the token's price. This manipulation forced the victim to purchase the token at a higher price and sell it at a lower price.

在這種情況下,攻擊者的採購訂單提高了令牌的價格,而後續的賣出訂單在執行受害者交易後,降低了令牌的價格。這種操縱迫使受害者以較高的價格購買令牌,並以較低的價格出售它。

Furthermore, DeFiac, a renowned DeFi researcher, noted that the same trader, using different wallets, fell victim to a total of six sandwich attacks. Internal tools revealed that all funds traveled from Aave before being deposited on Uniswap.

此外,著名的Defi研究人員Defiac指出,使用不同錢包的同一位交易員總共遭受了六次三明治襲擊的受害者。內部工具顯示,所有資金都從AAVE返回,然後再存入UNISWAP。

The attacker searched for large, unprocessed transactions, typically over $100,000, to maximize their potential gains. Upon locating a target, the attacker would increase the item's price by filing a buy order for the same item.

攻擊者搜索了大型未經處理的交易,通常超過100,000美元,以最大程度地提高其潛在收益。找到目標後,攻擊者將通過向同一商品提交買入訂單來提高項目的價格。

For instance, if the victim planned to exchange 100,000 USDC for USDT at a price of 1.01, the attacker would submit a limit order to buy 50,000 USDC at 1.01. This action would raise the price of USDC, and the best price at which the victim could sell his 100,000 USDC would become 1.01.

例如,如果受害人計劃以1.01的價格將100,000美元的USDT交換為USDT,則攻擊者將提交限額訂單,以1.01的價格購買50,000 USDC。這項行動將提高USDC的價格,受害者可以出售100,000美元的最優惠價格將成為1.01。

As a result, the victim's trade would be executed at this inflated price, and he would receive fewer USDT than anticipated. To capitalize on this discrepancy, the attacker would then place a sell order for 50,000 USDC at the new, higher price, which was 1.01 in this case.

結果,受害者的貿易將以這個高昂的價格執行,他的USDT將比預期的少。為了利用這一差異,攻擊者將以新的價格更高的價格下達50,000美元的賣出訂單,在這種情況下為1.01。

This attack method is applicable to any token on Uniswap v3, and traders can take precautions to mitigate the risk.

這種攻擊方法適用於Unistwap V3上的任何令牌,交易者可以採取預防措施來減輕風險。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年03月19日 其他文章發表於