JaredfromSubway Targets Vitalik Buterin in $1M Sandwich Trade - Blockonomi
by Maxwell Mutuma · BlockonomiTLDR
Table of Contents
- TLDR
- Vitalik Buterin Trade Triggered Automated MEV Activity
- JaredfromSubway Continues Expanding Ethereum MEV OperationsGet 3 Free Stock Ebooks
- Vitalik Buterin’s XDB token swap triggered a sandwich attack from the JaredfromSubway MEV bot on Ethereum.
- The bot executed more than $1 million in trades before and after Buterin’s transaction confirmed.
- Blockchain data showed the sandwich attack happened in Ethereum block 24993038 on April 30.
- JaredfromSubway used SushiSwap and Uniswap V2 pools to manipulate XDB prices during the trade.
- Reports showed the bot likely lost money after paying more than $5 in gas fees.
Ethereum mempool activity exposed another sandwich attack involving Vitalik Buterin earlier this week. Blockchain data showed the JaredfromSubway bot targeted Buterin’s small XDB token trade on April 30. The transaction triggered more than $1 million in temporary trading volume across decentralized exchanges.
Vitalik Buterin Trade Triggered Automated MEV Activity
Etherscan data showed Buterin swapped 26,544 XDB tokens for 0.00197 ETH during block 24993038. The transaction carried an estimated value between $3.86 and $4.56. However, the JaredfromSubway bot detected the pending trade before block confirmation.
The bot then executed about $1.14 million in wrapped Ether transactions through SushiSwap and Uniswap V2. Those trades temporarily changed XDB liquidity prices before Buterin’s transaction completed. Afterward, the bot reversed the positions and captured a small spread from the movement.
CoinDesk analysis showed the bot likely earned only a few cents from the sequence. Gas costs reportedly reached $5.14 during the operation. Therefore, the bot appeared to lose money on the isolated transaction.
Blockchain records still showed the bot completed the full sandwich sequence despite the limited profit opportunity. Analysts said the behavior reflected automated scanning across Ethereum’s public mempool. The system searched continuously for transactions that matched preset trading conditions.
A sandwich attack places trades before and after another user’s pending transaction. The strategy raises the asset price before execution and sells immediately afterward. As a result, victims receive weaker execution prices during swaps.
JaredfromSubway Continues Expanding Ethereum MEV Operations
JaredfromSubway gained attention during the 2023 meme coin trading surge on Ethereum. The bot targeted traders dealing with tokens including PEPE and WOJAK. During April 2023, the bot briefly generated 7% of Ethereum gas usage.
Reports estimated the operation extracted more than $7 million from trading activity over hundreds of thousands of transactions. Developers and researchers tracked the wallet through several blockchain monitoring tools. The bot also survived contract upgrades and filtering attempts from builders.
Ethereum developers continue discussing methods to reduce toxic maximal extractable value activity. Buterin recently promoted encrypted mempools within Ethereum’s developing 2026 roadmap. He argued public mempools expose regular traders to hidden trading costs.
MEV refers to profits earned through transaction ordering on blockchain networks. Bots monitor pending transactions and insert trades before confirmation. Sandwich attacks currently represent about 51% of Ethereum MEV activity.
Current estimates placed cumulative Ethereum MEV extraction above $1.2 billion. Meanwhile, developers continued testing systems designed to limit front-running opportunities. Blockchain records from April 30 still showed JaredfromSubway executing the sandwich around Buterin’s transaction.
✨ Limited Time Offer
Get 3 Free Stock Ebooks
Discover top-performing stocks in AI, Crypto, and Technology with expert analysis.
- Top 10 AI Stocks - Leading AI companies
- Top 10 Crypto Stocks - Blockchain leaders
- Top 10 Tech Stocks - Tech giants