Vitalik Buterin, one of the co-founders of Ethereum, recently found himself on the receiving end of a “sandwich” attack on the Ethereum blockchain, despite his ongoing efforts to curb toxic maximum extractable value (MEV) practices. According to on-chain data, a transaction initiated by Buterin on April 30 was subject to such an attack in block 24993038. Etherscan records confirm that a bot detected Buterin’s trade and intervened, ultimately causing his transaction to execute at a less favorable price than intended.
How the sandwich attack unfolded
A sandwich attack works by identifying a pending transaction, then having a bot place its own order ahead of it, artificially inflating the price. Once the victim’s transaction goes through at the higher price, the bot reverses its position to profit from the spread. Most users only notice a slightly worse rate, barely registering the hidden cost.
An analysis by CoinDesk revealed that Buterin attempted to swap roughly 26,544 DigitalBits (XDB) tokens—worth about $3.86—for 0.00197 ETH, valued at $4.56. Simultaneously, a bot executed a hefty $1.14 million WETH trade across SushiSwap and Uniswap V2, artificially boosting the XDB price in both pools just before Buterin’s transaction. The swap cost Buterin $5.14 in gas fees, but the attacking bot actually ended up losing money, with Buterin’s loss kept to mere cents.
The rise of MEV on Ethereum
This incident highlights how far MEV—now a full-fledged industry—has come, with bots routinely scanning the mempool for any possible opportunities. Some of these bots jump on virtually every pending transaction, regardless of profitability.
Buterin has recently advocated for encrypted mempools as part of Ethereum’s 2026 roadmap, aiming to fight off toxic MEV. MEV refers to the extra profit that can be gained by those who control transaction ordering on the blockchain, often by strategically inserting their own trades ahead of others.
Buterin and fellow developers maintain that MEV acts as a hidden tax on ordinary users and gives an edge to major, specialized operators in the network.
Bot evolution and scale of attacks
The scale of sandwich attacks is growing rapidly; such attacks now account for 51% of all MEV on Ethereum, with the total MEV extracted estimated to have surpassed $1.2 billion.
One of the most notorious automatic sandwich attack bots, Jaredfromsubway.eth, showed remarkable activity during last year’s meme token frenzy, once accounting for 7% of all network gas fees in April 2023. Analysis of tens of thousands of transactions indicates this single bot has pocketed more than $7 million to date.
These bots quickly adapt to new security measures. Jared, for example, has persisted despite protocol changes, mempool filtering, and even direct countermeasures aimed at draining its funds.
Despite continuous upgrades and the introduction of new protective tools by developers, the arms race between blockchain security and automated bots remains fierce. Experts caution that as bots refine their strategies, regular users remain at risk of similar predatory tactics.
In light of these developments, discussions within the Ethereum community about the urgency for stronger transaction privacy and enhanced defenses against MEV are intensifying. Increased cooperation between developers, validators, and end users may be crucial to limiting the negative impacts of automated attack bots on the growing Ethereum ecosystem.




