On October 22nd, it was reported that there has been a substitution loop attack on the Lightning Network, which is similar to the sandwich attack in MEV, using front and back attacks to obtain the target's funds. This attack is not easy to implement and requires the following conditions to be met: · Open two channels on the victim. · Route payment through one of these two channels. · Successfully replace the victim's HTLC-timeouts in Δ blocks within the two channels. · At the same time, ensure that the victim does not discover the HTLC pre-image transaction. Until this risk is fixed, projects using the Lightning Network should be cautious when establishing channels with upstream and downstream partners, preferably with reputable partners, to reduce the risk of being sandwiched. Further testing and verification are required for specific situations.
All Comments