On September 2022, MEVBOT was exploited in a arbitrary call, resulting in approximately $1.47M in losses. That makes the MEVBOT exploit the 79th largest DeFi incident out of 690 documented in our archive.
Attack Mechanics: How the MEVBOT Arbitrary Call Played Out
Exploit Class Applied to MEVBOT
The MEVBOT incident on September 28, 2022 is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract. In the full archive, MEVBOT is 1 of 21 documented arbitrary call incidents.
MEVBOT in Context
At $1.47M, the MEVBOT exploit is a significant ($1M–$10M) event compared to the largest same-class incident in our archive — Seneca (2024) at $6M.
Prior Arbitrary Call Before MEVBOT
The nearest arbitrary call incident before MEVBOT was Auctus, 186 days earlier on March 26, 2022 ($726K lost). The same exploit class surfaced again within the arbitrary call attack surface.
Impact & Recovery for MEVBOT
MEVBOT Loss Figure
The MEVBOT exploit caused $1,469,700 in losses — a significant ($1M–$10M) incident and the 8th largest of 129 documented in 2022. This single incident represents 0.7% of all tracked losses that year.
Where MEVBOT Sits Among Arbitrary Call Attacks
Ranked by loss size, MEVBOT is the 4th largest of 21 arbitrary call incidents documented. That puts the MEVBOT loss above the class average of $783.5K.
Timeline Since the MEVBOT Incident
The MEVBOT exploit occurred 3.5 years ago (1,294 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for MEVBOT
Public post-mortem / on-chain analysis for the MEVBOT incident: view source.
FAQ
How much did MEVBOT lose?
The MEVBOT exploit in September 2022 resulted in $1,469,700 in losses — the 8th largest of 129 DeFi incidents that year.
When did the MEVBOT hack happen?
The MEVBOT exploit was recorded on September 28, 2022 — 1,294 days ago.
What type of exploit hit MEVBOT?
The MEVBOT incident is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract.
How common is the Arbitrary Call pattern seen at MEVBOT?
Our archive contains 21 documented arbitrary call incidents. The MEVBOT incident is one of them.
How does MEVBOT compare to the largest Arbitrary Call attack?
The largest arbitrary call incident in our archive is Seneca (2024) at $6M. The MEVBOT loss is $1.47M.
What is the purpose of the post-processing-based defense method?
To flip the trend of the margin loss periodically while preserving the global trend.
What potential does blockchain technology offer beyond cryptocurrencies?
It offers prospects to improve financial transactions, increase transparency, and broaden investment market participation.