This is an in-depth 🧵thread🧵 of the Euler Attack. We not only cover what happened during the attack, but also give our analysis on the beneficiaries and losers, whales affected, and addressed with net large flows👇
Ethereum-based noncustodial lending protocol Euler Finance faced a flash loan attack on March 13. The attacker stole millions in $DAI, $USDC, $WETH, $stETH, and $wstETH.
The exploiters' addresses transferred $740.28 million to the Euler contract, while the Euler contract transferred $944.75 million to the exploiters' addresses. As a result, the exploiters gained $204.46 million from Euler Finance, aligning closely with third-party data.
While the exploiter is the biggest winner, who drained $200 million out of the protocol. Many crypto whales and several third-party protocols suffered from this event. Only a few individual addresses are left safely with a profit.
We found that many addresses interacting with Euler belong to wealthy crypto investors or experienced DeFi users. Most of these addresses suffered losses, with some losing more than 20%.
Individuals lost their investments on Euler, including the whale 0xf703. They deposited assets in November and received rewards, but after the attack, they could only withdraw a few remaining assets that did not cover their $2.3 million principal.
Similarly, As for winners, our dataset below shows that a few winners gained over $1 million from Euler. Most of these are exploiters' contracts, and we should exclude some of DEX's router addresses. However, one remarkable EOA address, 0x4ce6, achieved a 30%+ return.
We also noticed addresses displaying either pure transfer-in or pure transfer-out behavior during their interactions with Euler. For example, we found 126 addresses that exclusively transferred funds out of Euler, while 1,196 addresses solely transferred funds into Euler.
2022 is a memorable year for DeFi. Terra Luna, 3AC, Celsius, FTX... Despite all these downfalls, MEV still contributed $328B, half the total DEX volume of $666B on Ethereum. This wonderful Twitter Space reflects on the past year and looks to the future. eigenphi.substack.com/p/highlights-f…
👉Metrics @christine_dkim: it may vary and rely more on analyzing smart contract activity and understanding how markets are moving. It's crucial to note that MEV is multifaceted, and one's interest may heavily depend on their focus.
We were excited to work with @DefiLlama to protect traders with timely notifications and alerts to probable MEV attacks. Find out more in our "Weekly Highlights" eigenphi.substack.com/p/weekly-highl…
Arbitrum $ARB Airdrop went LIVE on March 23rd with price volatility in the market. EigenPhi can make TX tracking easy by visualizing $ARB transactions with our EigenTX Chrome Extension(bit.ly/3RnUOUp).
On March 23rd, EigenPhi joined by MEV experts, had fruitful discussions on the topic of MEV in 2022. Questions were asked. Opinions were shared. Discover more and stay tuned for for the highlights
🧵Analysis & Thoughts: User's $2M Loss in USDC De-Pegging Crisis Raises Questions About KyberNetwork's Responsibility.
1/6 In the wake of the recent #USDC de-pegging crisis, a user named CHIA reportedly lost $2 million while converting 3Crv to USDT through @KyberSwap. While @KyberNetwork issued a lengthy statement on Twitter absolving themselves of any blame, an analysis of the situation suggests… twitter.com/i/web/status/1…
2/6 The root of the issue seems to lie in Kyber Network's inability to enforce the user's 0.5% slippage limit and revert the trade accordingly. CHIA has stated in the Kyber Network Telegram group that they had set the slippage to 0.5%, and the input data of the transaction… twitter.com/i/web/status/1…
If you want to track the footprint of the exploiter of a risk event, browsing Etherscan can be exhausting sometimes. Now, our Related Transaction feature can be a lifesaver.
Has the exploiter done something else fishy in the same block? 👇
What other txs the same "from" EOA involves himself with? 👇
$403 million in 41 separate attacks; according to Chainalysis, this is the loss due to oracle manipulation in 2022.
Days ago, EigenPhi organized a Twitter Space discussing how to prevent Oracle attacks with industry experts.
Here are some of the highlights of this invaluable discourse, focusing on 3 topics:
1️⃣Which oracle-related exploit has daunted you the most?
2️⃣How many types of oracle attacks would you like to categorize?
3️⃣How to mitigate oracle-related risks?
1/9 Riding the Wave of MEV Opportunities: In 2022, Arbitrage Dominates the Market, Promising Explosive Growth for Savvy Searchers! Let's See How It Happened!
2/9 Our results show that arbitrage opportunities were the most frequent, accounting for 68.3% of the market. Sandwich opportunities are around 30.6%.
3/9 Opportunities for liquidation are far smaller than the other 2 MEVs, for it was more likely to depend on intense market fluctuation rather than conventional arbitrage ones. But the liquidation, the 1% of total MEVs, gained 11% of the total revenue.