Coinspeaker
What Are Sandwich Attacks in DeFi and How to Avoid Them?
One of the setbacks coming with popularity is exposure to the risk of attracting the interest of manipulators seeking personal gains. In the same vein, the evolving DeFi space has become vulnerable to various attacks as it continues to grow and gain widespread adoption.
Among the common attacks faced by the industry are sandwich attacks. These attacks pose great risks to crypto investors and their assets. Let’s delve deep into the details of this type of manipulation to understand its basics, how it works, and how to protect against it.
The Concept of Sandwich Attack
Sandwich attack is a kind of digital exploitation that involves manipulating the price of a targeted asset. While decentralized protocols and services are the major target of sandwich attacks, they are simply malicious activities where the exploiter places two transactions before and after the transaction of the victim.
Let’s take an example to get a clearer picture. When someone tries to trade one type of cryptocurrency (let’s call it X) for another (Y) to make a big purchase, a trader with a greedy goal uses a sneaky bot to spot the trade and buys up the Y cryptocurrency before the large trade is confirmed.
This activity will cause the price of Y to go up for the original trader, resulting in higher costs. The bot profits by selling the Y cryptocurrency at an increased price. Notably, such attacks are common because blockchains are public, which means they allow anyone to see transactions in the pool unless they have a direct link to a mining pool.
Additionally, smart contracts may have unrestricted functions that execute trades, like claiming LP reward tokens and instantly swapping them for another token using a decentralized exchange (DEX).
Sandwich Attacks: Scenarios
So far, it has been observed that the exploiters who adopt sandwich attacks for their malicious schemes do this via certain strategic ways. Hence, let’s observe the scenarios where sandwich attacks can happen.
The Case of a Liquidity Taker vs Taker
In this scenario, different liquidity takers might target each other. Imagine a regular market taker with a pending transaction on the blockchain. The attacker seizes the opportunity by sending extra transactions – front-running and back-running – to make a profit.
Afterward, the miners decide which transaction to approve first. If the attacker pays a higher transaction cost, their malicious transaction stands a better chance of being prioritized. While success isn’t guaranteed, it shows how a sandwich attack can be attempted quite easily.
The Case of Liquidity Provider vs Taker
In this scenario, a liquidity provider can target a liquidity taker using a similar strategy. The initial steps are the same, but the malicious actor must perform three actions:
- They remove liquidity to increase the victim’s slippage.
- They re-add liquidity to restore the original pool balance.
- They swap asset Y for X to reset the asset balance to its pre-attack state.
Withdrawing liquidity before the victim’s transaction prevents the commission fee for that transaction. Although this harms the taker financially, as liquidity providers usually earn a small fee for pool activities, the attacker sacrifices their commission in the process.
Examples of Sandwich Attacks
In previous times, the industry had recorded a sneaky Ethereum (ETH) validator making off with more than $25 million in cryptocurrencies by swindling an Ethereum MEV bot engaged in sandwich trades. The stolen funds were dispersed among three primary addresses:
- A major share of over $20 million in 0x3c98;
- A smaller portion of around $2.3 million in 0x5b04;
- Another sum of about $3 million in 0x27bf.
Furthermore, the PEPE token, known for its meme-inspired origins, is also another example of sandwich attacks and front-running issues. Earlier, when the PEPE network had low liquidity and limited awareness, it gained sudden fame after a tweet suggested a PEPE bag bought at $250 had skyrocketed to $1.5 million.
This tweet fueled excitement and interest in the PEPE token, leading to a surge in its value. However, an address leveraged a sandwich attack bot to front-run PEPE buy transactions, raising PEPE token prices. The attacker also manipulated CHAD token prices using bots, incurring over $1.28 million in transaction fees within 24 hours. The attacker profited over $1.4 million at the expense of traders who purchased tokens at inflated prices.
Identifying a Sandwich Attack
To be able to identify a sandwich attack, it is important to put the following in mind:
- Watch out for sudden changes in the price of your target asset. Sandwich attacks will cause abrupt shifts in asset prices during your trade. If the price of the asset you want to buy seems to change more than expected, it might be a signal.
- Take note of insulation slippage rates, as they can be a signal for sandwich attacks. A spike between the executed and expected prices could indicate a sandwich attack.
- Usually, unexplained transaction delays can also be a way to identify sandwich attacks. If your trades face unexplained delays, it might be a sign of interference, as Sandwich attacks can disrupt smooth transactions.
Nonetheless, potential traders should take note of the following to help protect them against sandwich attacks.
- Time your moves wisely, avoiding busy hours and crazy market swings.
- Use tools that keep an eye out for unexpected twists, even if your trade doesn’t go as planned.
- Check every detail before making a move – know your fees, rates, and amounts.
- Stay safe on the crypto protocols, and don’t use insecure networks or channels.
- Use liquidity pools that block tricky moves that involve paying higher fees.
Bottom Line
There is no doubt that the increasing rate of sandwich attacks reveals the rapid expansion of security challenges in the realm of decentralized finance (DeFi). This calls for the implementation of necessary measures to curtail the spread of strategic exploitations.
While this is yet to be reviewed, defi users are encouraged to acquaint themselves with these attacks, watch closely, and employ the stated protection measures to avoid falling prey.