// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> How This MEV Bot Profited $1.27 Million by Spending Just $4 – CoinsMegaNews

How This MEV Bot Profited $1.27 Million by Spending Just $4

How MEV Bots Stole $1.27 Million From This Crypto Platform

[ad_1]

The maximal extractable value (MEV) bot carried out a flash loan attack and stole around $1.27 million from the BlackHole (BH) token.

MEV bots have attracted a lot of attention this year. Some utilize the bots to conduct sandwich attacks or take advantage of arbitrage opportunities.

MEV Bot Conducts Flash Loan Attack at Cost of Just $4

According to the MEV data website EigenPhi, there was an arbitrage MEV attack through the BH token on the BNB chain. The blockchain security platform Beosin Alert estimates a loss of $1.27 million. It explains:

“The attacker flash loaned a large amount of $USDT, then called 0x33688938() to add $USDT to the contract. The contract adds liquidity to the pair, with normal liquidity ratios of ~1 USDT : 100 BH. 

The attacker then swapped $USDT for $BH via pair, called the 0x4e290832 function to remove liquidity. 

Due to the attacker’s swap, the liquidity removal ratio was about 1 USDT : 2 BH, allowing to withdraw more $USDT.”

Read more: What Is Maximal Extractable Value (MEV)? 

MEV bot, flash loan attack, BH token, Platypus finance
Arbitrage MEV attack on BH token. Source: EigenPhi

After conducting the flash loan attack, the BH token exploiter siphoned off the funds using the crypto mixer Tornado Cash. The screenshot below shows that the wallet sent funds to Tornado Cash in batches of 100 BNB.

Apart from this MEV bot attack on the BH token, there has been a surge in rug pull incidents on the BNB chain lately.

Read more: Top 7 Tornado Cash Alternatives in 2023

MEV bot, flash loan attack, etherscan
Attacker moves funds to Tornado Cash. Source: Etherscan

Platypus Finance Flash Loan Attack

Earlier on Thursday, the blockchain security firm PeckShield reported that the decentralized finance (DeFi) protocol Platypus Finance had been a victim of a $2 million exploit. The project has reacted by suspending all the pools and assuring the community members of timely updates.

While the nature of the transaction is not specified, it is potentially a flash loan attack. Also, in February 2023, the project lost $8.5 million through flash loan attacks.

BeInCrypto explained earlier:

“A flash loan is a crypto loan that is taken out and repaid within the same transaction.

However, this facility attracts bad actors to take huge loans and then use the amount to manipulate the market in their favor. Such malicious activity is referred to as a flash loan attack.”

The $200 million Euler Finance exploit in March 2023 was also a flash loan attack.

Do you have anything to say about the MEV bot’s attack on the BH token or anything else? Write to us or join the discussion on our Telegram channel. You can also catch us on TikTok, Facebook, or X (Twitter).

For BeInCrypto’s latest Bitcoin (BTC) analysis, click here.

Disclaimer

In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content.

[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>