$50.4M aEthUSDT
Swap Incident
A user swapped $50.4M of aEthUSDT for 327 AAVE (~$36K) through the Aave interface via CoW Swap, suffering 99.93% slippage. This report traces the transaction, its routing, MEV extraction, and the full wallet network.
Executive Summary
A user executed an Aave collateral rotation (aEthUSDT → aEthAAVE) through CoW Protocol's flashloan adapter. The signed order specified a minimum buy of only 324.95 aEthAAVE — the catastrophic outcome was baked into the quote before execution. The route terminated in a SushiSwap V2 pool holding only 331.63 AAVE and 17.65 WETH, pushing 1,017x the pool's WETH reserve into it.
A backrunner at tx index 2 immediately arbitraged the wrecked pool, extracting 17,929.77 WETH and paying 13,087.73 ETH (~$27.1M) to the Titan block builder. The builder paid only 568.43 ETH (~$1.18M) to the Lido proposer, retaining an estimated ~$25.9M in builder profit from this single block.
Play-by-Play
The incident unfolded in four phases over approximately three hours.
Phase 1 — Funding (Feb 20, ~20 days prior)
Two fresh EOA wallets funded with ~$103M USDT from separate source addresses. Wallets sat dormant for 20 days.
Phase 2 — Aave Supply (18:14 – 18:17 UTC)
Wallet 0x651b...415b approved & supplied 52,364,293 USDT to Aave V3.
Wallet 0x98b9...7Ac8 approved & supplied 50,432,684 USDT to Aave V3.
Phase 3 — The Swap (18:23:23 UTC)
CoW Swap solver 0x3980...a54d ("tsolver") executed a GPv2Settlement on behalf of user 0x98b9...7Ac8. Signed minimum buy: 324.95 aEthAAVE. Received 327.24 aEthAAVE. 99.93% slippage. Pre-trade Sushi pool: 331.63 AAVE / 17.65 WETH.
Phase 4 — Post-Swap Consolidation (19:58 – 21:20 UTC)
Wallet 0x651b...415b withdrew 52.4M USDT from Aave. All related wallets sent a combined $414M USDT to a single accumulator address 0x2e42...acbf.
Swap Routing
The settlement routed through only two pools, each far too shallow to absorb a $50M market order.
User Position
Burned from 0x98b9...7Ac8 via Aave V3 Pool
Step 1 — Aave Withdraw
aEthUSDT burned → USDT withdrawn from Aave lending pool to CoW vault 0x699c...35c8
Step 2 — Uniswap V3: USDT → WETH
Pool: 0x4e68...fa36
Step 3 — SushiSwap V2: WETH → AAVE
Pair: 0xd75e...57b4 (constant product x*y=k)
Step 4 — Aave Supply & Fee Split
327.24 aEthAAVE minted to user • 4.06 aEthAAVE fee to CoW Settlement
Why the routing was catastrophic
The AAVE token has thin on-chain liquidity relative to this order size. The SushiSwap V2 WETH/AAVE pair uses a constant-product AMM (x*y=k), where price impact grows quadratically with order size. Pushing $37M of WETH through a single V2 pair resulted in extreme price distortion. A $50M order should have been split across multiple DEXs, executed over hours via TWAP, or partially filled via OTC desks.
Financial Breakdown
Where the $50.4M in slippage losses went.
| Destination | Amount | % of Total |
|---|---|---|
| MEV Titan Builder (retained from backrun bribe) | ~$25,927,469 | 51.4% |
| LP Impact Uniswap V3 USDT/WETH LPs | ~$13,277,080 | 26.3% |
| MEV Backrunner (tx index 2, kept) | ~$9,987,422 | 19.8% |
| MEV Lido Proposer (from builder) | ~$1,176,107 | 2.3% |
| Fee CoW Protocol (4.06 AAVE) | ~$447 | ~0.001% |
| Gas Transaction cost | $2.28 | ~0% |
| Received User (327.24 aEthAAVE) | ~$36,000 | 0.07% |
MEV & Block Builder
Block 24,643,151
MEV| Field | Value |
|---|---|
| Block Builder | Titan Builder 0x4838...5f97 |
| Proposer Fee Recipient | Lido Execution Layer Rewards Vault 0x388C...9297 |
| Backrun Tx (index 2) | 0x45388b0f...7fd4ab |
| Backrun Action | 128.57 AAVE → 17,929.77 WETH (SushiSwap V2) |
| Builder Bribe (from backrunner) | 13,087.73 ETH (~$27.1M) |
| Builder Retained Profit | ~12,519.30 ETH (~$25.9M) |
| Proposer Payout | 568.43 ETH (~$1.18M) |
| Backrunner Kept | 4,824.32 ETH (~$9.99M) |
| Follow-up Arb (index 3) | 0x8bd9cd3e...a6cd6 — 45.69 WETH extracted |
| CoW Solver | 0x3980...a54d ("tsolver", nonce 98,315) |
| MEV Payout Tx | 0xbe68ff01...72238bea (tx index 58, last in block) |
The swap sat at tx index 1. The backrunner at tx index 2 extracted 17,929.77 WETH from the wrecked Sushi pool, paying 73% to the builder as a bribe. The builder retained ~$25.9M and forwarded only ~$1.18M to the Lido proposer. A follow-up arb at tx index 3 continued pool normalization.
Wallet Network
The entity behind this incident controls $414M+ in USDT across 7+ EOA wallets, all feeding into a single accumulator that has zero outgoing transactions.
Central Accumulator
Receive-only0x2e42e686c6444781e110775f2623e895e900acbf
Type: EOA • Outgoing Txns: 0 • Balance: $414,044,152 USDT + 1.31 ETH
| Wallet | Txns | Current Holdings | Role |
|---|---|---|---|
| 0x651b...415b | 7 | 1.02 USDT | Supply/Withdraw |
| 0x98b9...7Ac8 | 2 | 327.24 aEthAAVE | Swap Executor |
| 0xAB6e...0548 | 1 | 0.01 USDT | 166.6M → Accum |
| 0x7017...42E0 | 2 | dust | 53.8M → Accum |
| 0xE197...7bf4 | 3 | 2.61 USDT | 52.4M → Accum |
| 0xd753...3e5B | 3 | 0.01 USDT | 49.4M → Accum |
| 0x8794...EEac | 2 | 0.01 USDT | 39.5M → Accum |
| Wallet | Funded By | Amount |
|---|---|---|
| 0x651b...415b | 0x21a3...5549 | 52,364,284.20 USDT |
| 0x98b9...7Ac8 | 0xdfd5...963d | 50,432,585.20 USDT |
Both wallets were funded approximately 20 days before the incident and sat dormant until March 12.
| Wallet | USDT Sent | Time (UTC) |
|---|---|---|
| 0x651b...415b | 52,364,358 | 20:29 |
| 0xd753...3e5B | 49,352,848 | 20:39 |
| 0xE197...7bf4 | 52,364,900 | 20:42 |
| 0x8794...EEac | 39,523,264 | 20:43 |
| 0x7017...42E0 | 53,805,261 | 20:44 |
| 0xAB6e...0548 | 166,633,297 | 20:49 |
| Total | ~$414,043,929 |
All wallets also drained remaining ETH (0.2–0.5 ETH each) to the same accumulator between 21:16–21:20 UTC.
Address Poisoning Detected
Wallet 0x651b...415b is being actively targeted by address poisoning attacks. Multiple attacker-controlled addresses send zero-value or dust USDT transfers designed to mimic the legitimate accumulator.
Poisoning Pattern
Active AttackAll poison addresses share the prefix 0x2e4 and suffix acbf to appear similar in truncated wallet UIs. The user has interacted with some of these (sending 0 USDT), suggesting they may have been confused by poisoned transaction history. The user also sent small test transactions (100 USDT, 10 USDT) before large transfers — a pattern consistent with someone who has been targeted by poisoning before.
Full Transaction Timeline
| Time (UTC) | Block | Tx | Action |
|---|---|---|---|
| 18:14:59 | 24,643,109 | 0xfbb2...d383 | Approve 0x651b approves USDT for Aave |
| 18:15:35 | 24,643,112 | 0xa9b5...7138 | Supply 0x651b supplies 52.4M USDT to Aave |
| 18:17:11 | 24,643,120 | 0xb59e...0e83 | Approve 0x98b9 approves USDT for Aave |
| 18:17:47 | 24,643,123 | 0xa71c...35dc5 | Supply 0x98b9 supplies 50.4M USDT to Aave |
| 18:23:23 | 24,643,151 | 0x9fa9...0801f | SWAP tx1 50.4M aEthUSDT → 327.24 aEthAAVE |
| 18:23:23 | 24,643,151 | 0x4538...d4ab | BACKRUN tx2 128.57 AAVE → 17,929.77 WETH • 13,087 ETH bribe to builder |
| 18:23:23 | 24,643,151 | 0x8bd9...6cd6 | ARB tx3 Follow-up pool normalization • 45.69 WETH extracted |
| 19:58:11 | 24,643,624 | 0x9309...c9ad | Withdraw 0x651b withdraws 52.4M USDT from Aave |
| 20:17:47 | 24,643,722 | 0x9ddb...b7b7 | Test 0x651b sends 100 USDT to accumulator |
| 20:19:47 | 24,643,732 | 0x24af...8595 | Test 0x651b sends 10 USDT to accumulator |
| 20:29:11 | 24,643,779 | 0xdedc...8718 | Transfer 0x651b sends 52.4M USDT to accumulator |
| 20:39:47 | 24,643,826 | 0x4360...f53a | Transfer 0xd753 sends 49.4M USDT to accumulator |
| 20:42:23 | 24,643,838 | 0xa850...0b1e | Transfer 0xE197 sends 52.4M USDT to accumulator |
| 20:43:35 | 24,643,844 | 0xeb90...79f0 | Transfer 0x8794 sends 39.5M USDT to accumulator |
| 20:44:23 | 24,643,848 | 0x2109...b1cf | Transfer 0x7017 sends 53.8M USDT to accumulator |
| 20:49:23 | 24,643,873 | 0x99fe...da8f | Transfer 0xAB6e sends 166.6M USDT to accumulator |
Key Findings
-
1Route was born bad
The signed order specified a minimum buy of only 324.95 aEthAAVE for 50.4M aEthUSDT. The catastrophic outcome was computed into the quote before the user signed it. CoW's "smart slippage" of 121 bps was applied to an already-insane quote. -
2Catastrophic slippage
99.93% of value lost. The route pushed 17,957 WETH into a SushiSwap V2 pool holding only 331 AAVE and 17.65 WETH — 1,017x the pool's WETH reserve. -
3Poor routing
Only 2 pools used (Uniswap V3 + SushiSwap V2). No order splitting, TWAP execution, or OTC desk usage. -
4~$37M MEV extraction
Backrunner at tx index 2 extracted 17,929.77 WETH from the wrecked pool. Titan Builder kept ~$25.9M, backrunner kept ~$9.99M, Lido proposer received ~$1.18M. Builder retained 96% of the backrun bribe. -
5Active address poisoning
The user's wallets are targeted by address poisoning attacks with spoofed addresses sharing prefix0x2e4and suffixacbf. -
6Large, coordinated entity
The wallet network controls $414M+ in USDT across 7+ wallets, all feeding into a single accumulator with zero outgoing transactions. -
7CoW fees minimal
CoW Protocol collected only $447 (4.06 AAVE). CoW's batch auction prevented direct sandwich attacks but could not protect against the fundamental routing failure. -
8Aave's response
Aave will return $600K in fees collected from the transaction. The team is investigating improved guardrails for large orders.