Ethereum sandwich bot targets Vitalik Buterin’s small swap
An Ethereum sandwich attack was reportedly executed against Vitalik Buterin on Apr 30 in block 24993038. After Buterin attempted to swap about $3.86 of XDB for roughly $4.56 in ETH, the MEV trader “jaredfromSubway” (jaredfromsubway.eth) front-ran and back-ran the trade.
Reports claim the bot deployed around $1.14m WETH across SushiSwap and Uniswap V2 to move XDB prices around Buterin’s transaction. Buterin’s apparent direct execution loss was only cents, though the attacker likely paid about $5.14 in gas—showing that sandwich attack mechanics can still work on very small swaps.
The incident revives focus on Ethereum’s roadmap to reduce toxic MEV. Buterin has backed encrypted mempools to make front-running and sandwich attack strategies harder, aiming for fairer execution for regular users and traders.
Neutral
This news is unlikely to move ETH’s spot price in a clear direction because the reported victim trade was small and the attacker’s net economics may have been limited after gas costs. Still, the case underscores that MEV actors can target even low-value swaps via sandwich attack techniques, which can affect trader behavior and short-term sentiment around execution quality.
In the short term, traders may become more cautious about public mempool execution on ETH mainnet, especially around thin liquidity pairs or predictable routes through DEXes. In the long term, renewed emphasis on encrypted mempools aligns with Ethereum’s effort to reduce toxic MEV, which is broadly constructive for market fairness but is not an immediate catalyst for ETH price. Overall, the impact on ETH itself is best described as neutral: higher execution-risk awareness without a direct fundamental supply/demand shift.