Two MIT-educated brothers accused of orchestrating the largest MEV bot exploitation in cryptocurrency history will face trial after a federal judge rejected their attempts to dismiss fraud and money laundering charges. Anton Peraire-Bueno, 24, and James Peraire-Bueno, 28, allegedly stole $25 million in cryptocurrency within 12 seconds by manipulating Ethereum’s MEV-Boost protocol in April 2023. Technical Error or Deliberate Exploit? The brothers meticulously planned their operation over several months, studying trading patterns of Ethereum bots and establishing shell companies. They created 16 Ethereum validators using approximately $880,000 in cryptocurrency, then executed what prosecutors called a “bait, block, search, and propagation” scheme targeting three victim traders operating MEV bots. Their exploit involved proposing “lure transactions” to induce victim traders’ bots to purchase illiquid cryptocurrencies worth $25 million. The brothers then sent a false signature to the relay system, gaining premature access to private transaction data. They replaced the lure transactions with their own trades, selling the illiquid tokens and rendering the victims’ holdings worthless. Following the theft, the brothers laundered the stolen funds through complex transactions across multiple addresses and foreign exchanges with limited KYC requirements. They converted the cryptocurrency to DAI stablecoin, then to USDC , before transferring $20 million to U.S. dollar accounts. Foreign law enforcement froze $3 million of the stolen funds. The case comes amid rising concerns about MEV exploitation across blockchain networks. Recent incidents include a $2 million insider attack on Bedrock’s UniBTC protocol by a former Fuzzland employee and a notorious Solana MEV bot named “arsc” that accumulated $30 million in two months through sandwich attacks. Brothers’ Legal Battle Reaches Critical Juncture Federal prosecutors arrested the Peraire-Bueno brothers on May 15, 2024, with Anton taken into custody in Boston and James in New York. U.S. Attorney Damian Williams described the scheme as meticulously planned, noting how the brothers “ used their specialized skills and education to tamper with and manipulate the protocols relied upon by millions of Ethereum users. “ Two Brothers Arrested for Attacking Ethereum Blockchain and Stealing $25M in Cryptocurrency 🔗: https://t.co/rY4No6YUrm pic.twitter.com/2Mlb3zIdpo — U.S. Department of Justice (@TheJusticeDept) May 15, 2024 The brothers face charges of conspiracy to commit wire fraud, wire fraud, and conspiracy to commit money laundering. Each charge carries a potential 20-year prison sentence. A federal judge scheduled their trial for October 14, 2025 , after denying their motions to dismiss the indictment. The court found the wire fraud charges legally sufficient, determining that the brothers’ lure transactions and false signatures constituted material misrepresentations. The judge ruled that the $25 million in stolen cryptocurrency represented a traditionally recognized property interest, not merely contingent profits. IRS Criminal Investigation’s New York Cyber Unit traced the stolen funds back to the brothers despite their sophisticated laundering efforts. Special Agent Thomas Fattorusso noted that investigators “simply followed the money” using cutting-edge technology and traditional investigative methods. Growing MEV Threat Challenges Blockchain Scalability MEV exploitation has emerged as a dominant threat to blockchain scalability, according to recent research from Flashbots. According to a report covered by Cryptonews in June, MEV bots now consume 40% of all blockspace on Solana and over half of the gas usage on Ethereum rollups, such as Base and OP Mainnet. 🔍 MEV bot spam is now the main barrier to blockchain scalability, consuming most new throughput on Ethereum rollups and Solana. #MEV #BlockchainScalability https://t.co/kNRiwwORsU — Cryptonews.com (@cryptonews) June 17, 2025 The Peraire-Bueno case represents the first criminal prosecution of MEV manipulation; however, similar exploits continue to occur across various networks. A Ronin Network breach in August 2024 initially appeared malicious but was later revealed to be a white-hat operation, with the hacker returning $9.8 million after discovering a vulnerability in the bridge. Recent data from EigenPhi shows more than 81,000 users fell victim to sandwich attacks in the last 30 days alone. Source: EigenPhi These attacks now account for nearly $1 billion in weekly trading volume on Ethereum-based decentralized exchanges. Flashbots has proposed new frameworks to address MEV abuse, including explicit MEV auctions and programmable privacy using Trusted Execution Environments. The organization argues that current spam from MEV bots creates artificial fee floors, undermining the promise of near-zero transaction costs on scaled networks. The brothers’ trial, scheduled for October, is likely to set precedents for future MEV-related prosecutions, as it isn’t technically precise whether it can be attributed to an exploit of a technical oversight.Two MIT-educated brothers accused of orchestrating the largest MEV bot exploitation in cryptocurrency history will face trial after a federal judge rejected their attempts to dismiss fraud and money laundering charges. Anton Peraire-Bueno, 24, and James Peraire-Bueno, 28, allegedly stole $25 million in cryptocurrency within 12 seconds by manipulating Ethereum’s MEV-Boost protocol in April 2023. Technical Error or Deliberate Exploit? The brothers meticulously planned their operation over several months, studying trading patterns of Ethereum bots and establishing shell companies. They created 16 Ethereum validators using approximately $880,000 in cryptocurrency, then executed what prosecutors called a “bait, block, search, and propagation” scheme targeting three victim traders operating MEV bots. Their exploit involved proposing “lure transactions” to induce victim traders’ bots to purchase illiquid cryptocurrencies worth $25 million. The brothers then sent a false signature to the relay system, gaining premature access to private transaction data. They replaced the lure transactions with their own trades, selling the illiquid tokens and rendering the victims’ holdings worthless. Following the theft, the brothers laundered the stolen funds through complex transactions across multiple addresses and foreign exchanges with limited KYC requirements. They converted the cryptocurrency to DAI stablecoin, then to USDC , before transferring $20 million to U.S. dollar accounts. Foreign law enforcement froze $3 million of the stolen funds. The case comes amid rising concerns about MEV exploitation across blockchain networks. Recent incidents include a $2 million insider attack on Bedrock’s UniBTC protocol by a former Fuzzland employee and a notorious Solana MEV bot named “arsc” that accumulated $30 million in two months through sandwich attacks. Brothers’ Legal Battle Reaches Critical Juncture Federal prosecutors arrested the Peraire-Bueno brothers on May 15, 2024, with Anton taken into custody in Boston and James in New York. U.S. Attorney Damian Williams described the scheme as meticulously planned, noting how the brothers “ used their specialized skills and education to tamper with and manipulate the protocols relied upon by millions of Ethereum users. “ Two Brothers Arrested for Attacking Ethereum Blockchain and Stealing $25M in Cryptocurrency 🔗: https://t.co/rY4No6YUrm pic.twitter.com/2Mlb3zIdpo — U.S. Department of Justice (@TheJusticeDept) May 15, 2024 The brothers face charges of conspiracy to commit wire fraud, wire fraud, and conspiracy to commit money laundering. Each charge carries a potential 20-year prison sentence. A federal judge scheduled their trial for October 14, 2025 , after denying their motions to dismiss the indictment. The court found the wire fraud charges legally sufficient, determining that the brothers’ lure transactions and false signatures constituted material misrepresentations. The judge ruled that the $25 million in stolen cryptocurrency represented a traditionally recognized property interest, not merely contingent profits. IRS Criminal Investigation’s New York Cyber Unit traced the stolen funds back to the brothers despite their sophisticated laundering efforts. Special Agent Thomas Fattorusso noted that investigators “simply followed the money” using cutting-edge technology and traditional investigative methods. Growing MEV Threat Challenges Blockchain Scalability MEV exploitation has emerged as a dominant threat to blockchain scalability, according to recent research from Flashbots. According to a report covered by Cryptonews in June, MEV bots now consume 40% of all blockspace on Solana and over half of the gas usage on Ethereum rollups, such as Base and OP Mainnet. 🔍 MEV bot spam is now the main barrier to blockchain scalability, consuming most new throughput on Ethereum rollups and Solana. #MEV #BlockchainScalability https://t.co/kNRiwwORsU — Cryptonews.com (@cryptonews) June 17, 2025 The Peraire-Bueno case represents the first criminal prosecution of MEV manipulation; however, similar exploits continue to occur across various networks. A Ronin Network breach in August 2024 initially appeared malicious but was later revealed to be a white-hat operation, with the hacker returning $9.8 million after discovering a vulnerability in the bridge. Recent data from EigenPhi shows more than 81,000 users fell victim to sandwich attacks in the last 30 days alone. Source: EigenPhi These attacks now account for nearly $1 billion in weekly trading volume on Ethereum-based decentralized exchanges. Flashbots has proposed new frameworks to address MEV abuse, including explicit MEV auctions and programmable privacy using Trusted Execution Environments. The organization argues that current spam from MEV bots creates artificial fee floors, undermining the promise of near-zero transaction costs on scaled networks. The brothers’ trial, scheduled for October, is likely to set precedents for future MEV-related prosecutions, as it isn’t technically precise whether it can be attributed to an exploit of a technical oversight.

MIT Brothers Who Exploited MEV Bots for $25M Must Face Trial, Judge Rules

2025/07/24 17:51

Two MIT-educated brothers accused of orchestrating the largest MEV bot exploitation in cryptocurrency history will face trial after a federal judge rejected their attempts to dismiss fraud and money laundering charges.

Anton Peraire-Bueno, 24, and James Peraire-Bueno, 28, allegedly stole $25 million in cryptocurrency within 12 seconds by manipulating Ethereum’s MEV-Boost protocol in April 2023.

Technical Error or Deliberate Exploit?

The brothers meticulously planned their operation over several months, studying trading patterns of Ethereum bots and establishing shell companies.

They created 16 Ethereum validators using approximately $880,000 in cryptocurrency, then executed what prosecutors called a “bait, block, search, and propagation” scheme targeting three victim traders operating MEV bots.

Their exploit involved proposing “lure transactions” to induce victim traders’ bots to purchase illiquid cryptocurrencies worth $25 million.

The brothers then sent a false signature to the relay system, gaining premature access to private transaction data.

They replaced the lure transactions with their own trades, selling the illiquid tokens and rendering the victims’ holdings worthless.

Following the theft, the brothers laundered the stolen funds through complex transactions across multiple addresses and foreign exchanges with limited KYC requirements.

They converted the cryptocurrency to DAI stablecoin, then to USDC, before transferring $20 million to U.S. dollar accounts. Foreign law enforcement froze $3 million of the stolen funds.

The case comes amid rising concerns about MEV exploitation across blockchain networks.

Recent incidents include a $2 million insider attack on Bedrock’s UniBTC protocol by a former Fuzzland employee and a notorious Solana MEV bot named “arsc” that accumulated $30 million in two months through sandwich attacks.

Brothers’ Legal Battle Reaches Critical Juncture

Federal prosecutors arrested the Peraire-Bueno brothers on May 15, 2024, with Anton taken into custody in Boston and James in New York.

U.S. Attorney Damian Williams described the scheme as meticulously planned, noting how the brothers “used their specialized skills and education to tamper with and manipulate the protocols relied upon by millions of Ethereum users.

The brothers face charges of conspiracy to commit wire fraud, wire fraud, and conspiracy to commit money laundering.

Each charge carries a potential 20-year prison sentence. A federal judge scheduled their trial for October 14, 2025, after denying their motions to dismiss the indictment.

The court found the wire fraud charges legally sufficient, determining that the brothers’ lure transactions and false signatures constituted material misrepresentations.

The judge ruled that the $25 million in stolen cryptocurrency represented a traditionally recognized property interest, not merely contingent profits.

IRS Criminal Investigation’s New York Cyber Unit traced the stolen funds back to the brothers despite their sophisticated laundering efforts.

Special Agent Thomas Fattorusso noted that investigators “simply followed the money” using cutting-edge technology and traditional investigative methods.

Growing MEV Threat Challenges Blockchain Scalability

MEV exploitation has emerged as a dominant threat to blockchain scalability, according to recent research from Flashbots.

According to a report covered by Cryptonews in June, MEV bots now consume 40% of all blockspace on Solana and over half of the gas usage on Ethereum rollups, such as Base and OP Mainnet.

The Peraire-Bueno case represents the first criminal prosecution of MEV manipulation; however, similar exploits continue to occur across various networks.

A Ronin Network breach in August 2024 initially appeared malicious but was later revealed to be a white-hat operation, with the hacker returning $9.8 million after discovering a vulnerability in the bridge.

Recent data from EigenPhi shows more than 81,000 users fell victim to sandwich attacks in the last 30 days alone.

MIT Brothers Who Exploited MEV Bots for $25M Must Face Trial, Judge RulesSource: EigenPhi

These attacks now account for nearly $1 billion in weekly trading volume on Ethereum-based decentralized exchanges.

Flashbots has proposed new frameworks to address MEV abuse, including explicit MEV auctions and programmable privacy using Trusted Execution Environments.

The organization argues that current spam from MEV bots creates artificial fee floors, undermining the promise of near-zero transaction costs on scaled networks.

The brothers’ trial, scheduled for October, is likely to set precedents for future MEV-related prosecutions, as it isn’t technically precise whether it can be attributed to an exploit of a technical oversight.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Mono Protocol Raises $2M in Private Round and Opens Whitelist: Here’s How Its Unified Balances and Universal Accounts Will Reshape Web3

Mono Protocol Raises $2M in Private Round and Opens Whitelist: Here’s How Its Unified Balances and Universal Accounts Will Reshape Web3

The post Mono Protocol Raises $2M in Private Round and Opens Whitelist: Here’s How Its Unified Balances and Universal Accounts Will Reshape Web3 appeared on BitcoinEthereumNews.com. The way people use blockchain today often feels complicated. Balances are scattered across different networks, bridging takes time and money, and users constantly switch wallets and chains to complete simple actions. Mono Protocol is building a new foundation for Web3 that unifies these experiences. With unified balances, instant settlement, and universal accounts, it aims to make blockchain interactions feel seamless.  The project has raised $2M in a Private Round and is now running whitelist registration ahead of the presale. Mono Protocol: Solving Web3’s Biggest Problem With a Unified Design Today’s blockchain space struggles with fragmentation. Users maintain balances across several chains, bridges are slow and expensive, and front-running risks cause value loss. Developers face the added challenge of building infrastructure for multiple networks, making the experience complex on both sides. Mono Protocol addresses these issues with chain abstraction technology. By unifying per-token balances, it allows users to hold and use assets from any supported blockchain in one place. Transactions are protected with MEV-resistant routing, ensuring value is preserved during execution.  Liquidity Lock technology guarantees that transactions cannot fail, which is a major step forward compared to traditional cross-chain systems. This combination creates a new standard for blockchain interaction. Developers gain access to simple APIs to build cross-chain applications without handling infrastructure overhead, while users enjoy one-click transactions across multiple ecosystems. It marks a shift from fragmented networks to a cohesive Web3 environment where complexity is invisible. One Balance, One Account, One Experience Mono Protocol introduces unified balances, instant settlement, and universal accounts that work across blockchains. This approach makes transactions simpler, faster, and free of the friction users often face today. Instead of managing assets on multiple networks, users interact with a single account and one balance. Liquidity Locks ensure transactions are guaranteed and completed instantly, while universal accounts remove…
Share
BitcoinEthereumNews2025/09/19 20:13