Slow Fog: MEV bot attackers maliciously construct invalid blocks, suggesting relay operators upgrade their relays in a timely manner
ChainCatcher news, Slow Mist analysis shows that the issue with the MEV bots being attacked is due to the relay returning the payload to the proposer even if the beacon block is incorrect, allowing the proposer to access the block content before another block is finalized. Attackers exploited this issue to maliciously construct invalid blocks, making them unverifiable, and the relay could not broadcast (status code 202), thus gaining access to transaction content prematurely. The mev-boost-relay has urgently released a new version to mitigate this issue, and it is recommended that relay operators upgrade their relays in a timely manner.
According to ChainCatcher's previous report, a smart contract developer on Twitter named 3155.eth stated that several top MEV bots were hacked, resulting in losses of up to 20 million dollars. The hackers dismantled the transaction packages of the MEV bots and replaced some transactions to steal the funds from the MEV bots. (source link)