A sandwich attack refers to the traps we encounter when brushing Alpha points, but it's not just a case of being caught by one or two USDT, rather it's a deliberate and significant loss.

Currently, it is understood that two people in the square have encountered this type of attack, with the affected group concentrated in $ZJK, where the maximum single loss has reached over a thousand USDT.

One of them was caught for over 1000, while the other was over 600.

This situation is not caused by the pinning; occasionally, when brushing points, we can see ZJK pinning, but the ZJK pin looks very long, while the actual amplitude is very small.

Victims have indicated that they were caught while having slippage set and MEV enabled; Binance customer service's response is: it's a supplier issue, and Binance is not responsible.

I compared his abnormal data with my normal data; his transactions are spread out into multiple data points, while normal transactions are much more concise.

Abnormal Hash
Normal Hash

Additionally, one of his screenshots shows a default slippage of 0.15 and the MEV in a closed state.

A few days ago, when I was brushing points and encountered the BSC card chain, I traded for a long time without the money arriving. While waiting, I realized that my MEV had been turned off without me knowing, which scared me into a cold sweat, while the current trading order showed that MEV was on. So, I suspect that it wasn’t turned on and I didn’t notice.

Regardless of how it happened, the lost money is real. I express my sympathy.

What we need to do is to try our best to avoid, set the slippage correctly, enable MEV, and finally confirm the amount, paying attention to every detail and closely monitoring each step, especially the reminder information in the pop-up window.

With slippage and MEV all set, if it really happens to be your turn to be unlucky, you can argue more confidently when dealing with Binance.