Vitalik Buterin was recently targeted by a sandwich attack after making a very small crypto swap on Ethereum.
The transaction happened on April 30, when Buterin swapped about $3.86 worth of DigitalBits (XDB) for around $4.56 in Ethereum.
Even though the trade was tiny, a well-known MEV bot called jaredfromsubway.eth reacted immediately.
The bot reportedly used around $1.14 million in wrapped ETH to manipulate prices around the trade. It placed transactions before and after Buterin’s swap to profit from the price movement — a tactic known as a sandwich attack.
What is a sandwich attack?
A sandwich attack happens when a bot sees a trade waiting in the blockchain mempool before it is confirmed.
The bot then:
- Buys first to push the price up
- Lets the user trade at a worse price
- Sells right after for profit
In simple terms, the user gets a slightly worse deal while the bot tries to capture the difference.
In Buterin’s case, the actual loss was probably only a few cents. Reports even suggest the bot may have lost money itself after paying gas fees.
Still, the event caught attention because it showed how aggressive MEV bots have become. Even a tiny trade from a high-profile wallet was enough to trigger automated activity.
Why this matters
The incident brings attention back to the ongoing MEV debate on Ethereum.
MEV — short for “maximal extractable value” — refers to profits made by reordering transactions inside blocks. Sandwich attacks are one of the most controversial forms because regular users usually don’t realize they are being exploited.
Ironically, Buterin himself has supported changes aimed at reducing these attacks. One idea being discussed is encrypted mempools, which would hide pending transactions before they are confirmed, making front-running much harder.
Bigger picture
This wasn’t really about the money.
It was a reminder of something larger:
Ethereum’s trading system is still heavily watched by automated bots, and even the network’s own co-founder is not invisible to them.







