Back to Course

2. Intermediate Course

0% Complete
0/0 Steps
  1. 1. What is Layer 0 in Blockchain technology?
  2. 2. What is layer 1 in Blockchain?
  3. 3. Second layer (layer 2) - what is it? 
  4. 4. Blockchain and its layers - What is layer three in Blockchain (L3)?
  5. 5. Ethereum 2.0 - What is it? 
  6. 6. Ethereum Proof-of-Stake (PoS) - what should you know?
  7. 7. Ethereum London Hard Fork - what is it ? 
  8. 8. What is the Ethereum Name Service (ENS) and how does it work?
  9. 9. Arbitrum: Ethereum scaling solution - everything you need to know
  10. 10. Polygon 2.0 - the value layer for the Internet
  11. 11. Ethereum ERC-4337 - what is it and how does this standard work?
  12. 12. What is an ERC20 token and how is it created?
  13. 13. The ERC-721X VS ERC-721 Standard – Key Differences!
  14. 14. What is cryptocurrency burning?
  15. 15. Examples of the use of WEB3 on the blockchain
  16. 16. What is Web5? 
  17. 17. Blockchain Oracle - what are oracles? 
  18. 18. Polkadot - Decentralized blockchain and DOT cryptocurrency
  19. 19. Polkadot Parachain - Next-generation blockchain
  20. 20. Interoperability in the world of cryptocurrencies and blockchain
  21. 21. What is Blockchain sharding?
  22. 22. Mainnet versus Testnet on the Blockchain. The complete guide!
  23. 23. MINA Protocol: the lightest blockchain in the world!
  24. 24. Sustainable Blockchain - Proof of Useful Work & Flux
  25. 25. Cosmos SDK: Building the Blockchain Ecosystem
  26. 26. What is cross-chain interoperability in Blockchain technology?
  27. 27. Blockchain trilemma - explanation of the problem. What is the impact on cryptocurrency payments?
  28. 28. Non-fungible tokens and NFT exchanges
  29. 29. How to make money with NFT?
  30. 30. What is the NFT licence fee?
  31. 31. NFT Gas Fee - what is it? How can you reduce your gas fee?
  32. 32. The main differences between static NFT and dynamic NFT
  33. 33. What is minting an NFT?
  34. 34. What are NFT Ordinals? A guide to Bitcoin NFT.
  35. 35. What is KnowOrigin NFT, and how does it work?
  36. 36. ERC-6551 - the new NFT standard. What does it bring to the non-exchangeable token sector?
  37. 37. What is NFT Lending all about? An innovative solution in the world of cryptocurrencies!
  38. 38. The Metaverse – a new virtual world
  39. 39. Metaverse – TOP 15 virtual reality projects
  40. 40. Technical analysis – is it worth using?
  41. 41. Trading order types: stop loss, trailing stop loss, LIMIT
  42. 42. Market Cap versus Fully Diluted Market Cap - the most important differences you should know!
  43. 43. Set up of Stop Loss and Take Profit orders
  44. 44. What are DeFi liquidity pools?
  45. 45. Real Yield in DeFi - what is this trend? What does it consist of?
  46. 46. Vampire Attacks in Decentralized Finance (DeFi): Explanation and Examples
  47. 47. What are wrapped tokens 
  48. 48. What are security tokens?
  49. 49. What are Social Tokens? 
  50. 50. Liquidity Provider Tokens (LPs). What are they, and why are they so important?
  51. 51. What is the Lightning Network, and how does it work?
  52. 52. What is Play-to-Earn (P2E) and how does it work?
  53. 53. Cryptocurrency steps - What is move to earn M2E?
  54. 54. Segregated Witness - what is Segwit Bitcoin all about?
  55. 55. What are Decentralized Cryptocurrency DEX Exchanges?
  56. 56. What is Curve Finance?
  57. 57. What is GameFi and how does it work?
  58. 58. What is Proof of Reserves (PoR)? How does it work?
  59. 59. DAO Investment: A revolution in the world of finance and investment
  60. 60. What is MakerDAO and DAI Stablecoin?
  61. 61. What is the SubDAO protocol, and how does it work?
  62. 62. How to Create Your Own Decentralized Autonomous Organization (DAO)?
  63. 63. Atomic Swap: What is an atomic swap, and how does it work with cryptocurrencies?
  64. 64. What Is Cryptocurrency Vesting? What Are Its Advantages?
  65. 65. What Is the Metaplex Candy Machine Protocol? How Does It Work?
  66. 66. What Is the BNB Greenfield Ecosystem?
  67. 67. What Is Slashing in Cryptocurrencies?
  68. 68. Royalties – What Are They? How Does This Type of Licensing Fee Work?
  69. 69. What is TradFi? The importance for cryptocurrencies!
  70. 70. What is the Real World Asset (RWA) trend in cryptocurrencies? Explanation and examples!
  71. 71. Pyth Network: a powerful oracle harnessing the power of Solana!
  72. 72. What are stables in the world of cryptocurrencies?
  73. 73. What Is Binance Oracle?
  74. 74. Shibarium: A new era in the Shiba Inu ecosystem?
  75. 75. What is an ETF? How will an exchange-traded fund on bitcoin work?
  76. 76. Symmetric and asymmetric encryption - key cryptography techniques!
  77. 77. Hedging in cryptocurrencies - great portfolio protection against risk!
  78. 78. How to create your own cryptocurrency? 
  79. 79. What is a Dusting Attack in cryptocurrencies? How to protect against it?
  80. 80. What is a Black Swan?
Lesson 46 of 80
In Progress

46. Vampire Attacks in Decentralized Finance (DeFi): Explanation and Examples

Rest assured – we won’t be talking about bloodshed, although because of the name, it might seem that way. Those sensitive to this topic can safely continue reading.

Vampire attacks in the cryptocurrency space do not even have anything to do with individuals. In fact, a Vampire Attack is one of the unethical methods of acquisition in decentralized finance (DeFi). It takes place when one protocol offers better rates and profits than another. In doing so, it steals all customers and investors, or to put it more bluntly, it sucks liquidity out of a given protocol.

In the cryptocurrency industry, such an attack is also referred to as an aggressive marketing or growth strategy.

Vampire Attack – definition

In the decentralized finance (DeFi) space, such an attack occurs when a new protocol in the market (usually a fork of an existing design) offers users and investors better prices, incentives, or profits compared to the original design.

Such a successful vampire attack results in a loss of fluidity for the main project. Interestingly, there have been cases in practice where, through such attacks, new projects have completely ‘killed’ the original ones. These projects were then abandoned in favor of the ‘new’ ones.

This type of attack is very common. Even Uniswap has fallen victim to it. Do you remember the famous airdrop of UNI tokens? Well, that’s right. The behavior had one purpose – to keep users on the platform and trigger DAO.

How is Vampire attack carried out?

The steps the attackers take are child’s play. First, they identify the platform on which they want to launch the attack. Then they offer users free airdrops, lower fees, higher profits. In a word, they present the new platform in all the best possible terms, in comparison with which the original project compares very poorly.

Secondly, they are gradually expanding their offerings, introducing, for example, new liquidity pools. And those who become liquidity providers will be rewarded with free tokens. The result? Increased liquidity and volume on the newly established platform.

You have already taken the time to notice that this whole “strategy” is highly unethical. It is 100% detrimental not only to the project under attack but also to the entire ecosystem of decentralized finance (DeFi). It only makes sense if old, non-innovative projects are eliminated through vampire attacks.

Who is being targeted by the Vampires?

In fact, most DeFi projects. Any project that relies on users and liquidity can fall victim to a vampire attack. In practice, this includes not only decentralized finance (DeFi) but also decentralized exchanges (DEX), farms, or other projects in any way linked to liquidity pools.

Projects that are targets tend to have certain characteristics. Which ones? These are:

  • First and foremost, high liquidity, which literally vampires suck up. They are attractive because they offer a large pool of capital to capture.
  • Another feature is users. A free community that attackers can access is a tasty morsel for them.
  • Fees. Projects that want to carry out a vampire attack can offer lower fees and thus draw users away from the original project.
  • Lack of development. Projects in any crypto sector that truly stand still and do not follow the spirit of innovation are prime targets for a vampire attack. They will easily be overshadowed by competing, growing projects.

How to avoid a vampire attack?

Using the so-called lock-in period. It is required of new liquidity providers and prevents liquidity from being provided only to be immediately withdrawn altogether. Collateral is increasingly used for new projects.

Another way to do this is to limit the number of LP tokens that users can withdraw in a given period. This prevents mass migration and loss of liquidity. As a result, a given protocol retains the liquidity necessary to function properly.

Greater rewards for loyal users. Those who have been with a protocol longer receive greater rewards for their commitment and time spent developing the protocol. A great way to retain existing users.

Vesting. Another great way to prevent vampire attacks. By giving rewards to liquidity providers, platforms are assured of keeping liquidity for longer. It works the same way the other way – taking away a guaranteed reward for withdrawing liquidity before a certain time.

First vampire attack

The first known example of a vampire attack is attributed to the SushiSwap exchange. The protocol was launched on 28 August 2020, when DeFi was booming. At that time, TVL (total blockchain value) had risen in DeFi to more than US$15 billion. Every day there were new projects that wanted to take over some liquidity flowing into DeFi. Competition was very high, and each project wanted to attract users.

When SushiSwap was launched, it attracted more than 100 million USD token LP in just a few hours. How was this accomplished? By distributing numerous SUSHI tokens to users who pledged their LPs to the project. Initially, project users could only deposit Uniswap LP tokens into SushiSwap. This was the key to the vampire attack.

Over the next two weeks, the intelligent SushiSwap contract router – MasterChef – was launched. It automatically replaced all LP Uniswap tokens with basic ones, leaving them on SushiSwap, while migrating all liquidity to the protocol and giving users LP SushiSwap tokens. The result? An outflow of more than US$1bn from the Uniswap liquidity pool. The TVL of SushiSwap increased, and Uniswap halved.

Uniswap quickly responded by airdropping its token UNI to attract users back and regain lost TVLs. SushiSwap was successful and very quickly began to be copied by other industry protocols.

Further examples of vampire attacks

Dash/Masternode: The Dash project fell victim to an attack when it popularized the masternode concept. As a result, later projects such as PivX and ZCoin forked and modified the main Dash protocol and directly competed with it.

Blur/OpenSea: An example from the non-fungible token (NFT) market. Blur encouraged users to migrate from other projects by offering them free airdrops. Momentarily, the platform even overtook OpenSea in terms of trading volume.

Summary

Taking a critical look at the whole process, vampire attacks can even be seen as positive. They lead to fiercer competition between projects and force them to innovate and make improvements.

In practice, many projects that follow this practice offer nothing new. They are no better than competitors. Therefore, even vampire attacks have had to evolve. They currently no longer offer one type of incentive to users, but an entire range with the emphasis on keeping them!