MEV Contract Exploited in AnyswapV4Router for $130,000 Theft

It is reported that, according to the monitoring of the Beosin EagleEye security risk monitoring, warning and blocking platform of Beosin, a blockchain securit…

MEV Contract Exploited in AnyswapV4Router for $130,000 Theft

It is reported that, according to the monitoring of the Beosin EagleEye security risk monitoring, warning and blocking platform of Beosin, a blockchain security audit company, on February 15, 2023, an attacker used the MEV contract (0xd050) to preemptively call the anySwapOutUnderlyingWithPermit function of the AnyswapV4Router contract before the normal transaction execution (the user authorized the WETH but has not yet transferred the account) for signature authorization transfer, Although the function uses the permit signature verification of the token, the stolen WETH has no relevant signature verification function, and only triggers the deposit function in the fallback. In subsequent function calls, attackers can directly use the safeTransferFrom function to_ The underlying address is authorized to the WETH of the attacked contract and transferred to the attack contract. The attacker made a profit of about 87 Ethereum, about $130000. Beosin Trace tracked and found that about 70 Ethereum stolen funds had entered the address 0x690b, and about 17 Ethereum remained in the MEVBOT contract.

Security team: Multichain’s Anyswap V4 Router contract suffered a preemptive attack, and the attacker made about $130000

Interpretation of the news:


According to the Beosin EagleEye security risk monitoring platform, an attacker was able to exploit the MEV contract in the AnyswapV4Router for a $130,000 theft. The attack occurred on February 15, 2023, where the attacker preemptively called the anySwapOutUnderlyingWithPermit function before the user authorized the WETH account transfer. Although the function uses permit signature verification, the stolen WETH had no relevant signature verification function, allowing the attacker to transfer the WETH to the attack contract.

The MEV contract or Maximal Extractable Value contract is a type of smart contract used in Ethereum to capture profits from different exchanges. It enables miners to prioritize transactions to get the highest returns by reordering transactions based on profitability. However, attackers can also use MEV contracts to exploit vulnerabilities and gain unauthorized access to funds.

In this case, the attacker was able to exploit the AnyswapV4Router contract by calling a function before the user authorized the WETH transfer. The attacker was able to trigger the deposit function in the fallback, allowing them to directly use the safeTransferFrom function. They were able to access the WETH of the attacked contract and transfer it to the attack contract, resulting in a profit of about 87 Ethereum or around $130,000.

Beosin Trace, a blockchain security audit company, was able to track and find about 70 Ethereum stolen funds, which had entered the address 0x690b. However, about 17 Ethereum remained in the MEVBOT contract.

This incident highlights the importance of blockchain security and ongoing monitoring of smart contract vulnerabilities. It also emphasizes the need for continuous updates and patches to address any potential issues that could be exploited by attackers. Companies that create smart contracts and blockchain-enabled platforms should prioritize security and implement thorough testing and analysis before launching new products or features.

In conclusion, the MEV contract exploitation in AnyswapV4Router resulted in a significant theft of $130,000 in Ethereum funds. Blockchain security experts must remain vigilant in monitoring any identified vulnerabilities and developing effective safeguards to protect user assets. Companies must also prioritize the security of their platforms and products to prevent such incidents from occurring in the future.

This article and pictures are from the Internet and do not represent qiAiAi's position. If you infringe, please contact us to delete:https://www.qiaiai.com/ai/551.html

It is strongly recommended that you study, review, analyze and verify the content independently, use the relevant data and content carefully, and bear all risks arising therefrom.