Home >web3.0 >MEV Bot Returns $10M Drained from Ronin Network Bridge

MEV Bot Returns $10M Drained from Ronin Network Bridge

PHPz
PHPzOriginal
2024-08-07 06:20:24551browse

The maximum extractable value (MEV) bot that drained nearly 3,996 Ether (ETH) from the Ronin network bridge on Aug. 6 has returned nearly all of the funds

MEV Bot Returns M Drained from Ronin Network Bridge

A bot that drained nearly 3,996 Ether (ETH) from the Ronin network bridge on August 6 has returned nearly all of the funds, according to data from block explorer Etherscan. This suggests that the bot may have accidentally front-run the attack.

At the time the ETH was returned, it was valued at over $10 million. The bot returned the funds at 3:04 pm UTC. A total of 3,991 ETH was sent to the Ronin team, while the remaining 5 ETH has not yet been returned.

The Ronin team announced the return of the funds on social media platform X and stated that the bot's owner was being rewarded $500,000 for discovering the exploit. The team also announced that it will only allow the bridge to be reopened after the vulnerability is patched and an audit is performed.

MEV bots are programmed to copy transactions and pay a higher gas fee to execute them first if doing so is profitable. For this reason, they sometimes accidentally exploit protocols. If an attacker attempts to exploit a protocol but fails to pay a high enough gas fee, for example, an MEV bot may automatically copy the attack and drain a protocol of funds. In these cases, the bot's owner will usually return the funds to the victim, as has happened in this case.

The drained funds were initially reported to be worth over $10 million.

The above is the detailed content of MEV Bot Returns $10M Drained from Ronin Network Bridge. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn