Vampire Attack

Definition pending verification.

A vampire attack, in the context of decentralized finance (DeFi) and blockchain protocols, refers to a malicious strategy where a new protocol attempts to drain liquidity and users from an existing, established protocol. The attacker typically launches a new, competing protocol that offers highly attractive incentives, such as extremely high yields or token rewards, often funded by the attacker's own capital or newly minted tokens. Users, lured by these lucrative rewards, migrate their liquidity (e.g., depositing assets into liquidity pools) and/or their capital from the original protocol to the new one. The attacker's goal is to siphon off the value, user base, and network effects of the target protocol, effectively 'draining' it like a vampire. Once the liquidity is sufficiently drained, the attacker may abandon the new protocol, leaving behind a depleted original protocol and potentially worthless tokens from the new venture. These attacks exploit the composability and open nature of DeFi, where assets can be easily moved between protocols.

        graph LR
  Center["Vampire Attack"]:::main
  Pre_cryptography["cryptography"]:::pre --> Center
  click Pre_cryptography "/terms/cryptography"
  Rel_advanced_propulsion_systems["advanced-propulsion-systems"]:::related -.-> Center
  click Rel_advanced_propulsion_systems "/terms/advanced-propulsion-systems"
  Rel_von_neumann_architecture["von-neumann-architecture"]:::related -.-> Center
  click Rel_von_neumann_architecture "/terms/von-neumann-architecture"
  Rel_undercollateralized_lending["undercollateralized-lending"]:::related -.-> Center
  click Rel_undercollateralized_lending "/terms/undercollateralized-lending"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Простими словами

It's like a new lemonade stand opening next door that offers free lemonade and pays you to drink it. People rush to the new stand, leaving the old one with no customers and lots of unsold lemonade.

🤓 Expert Deep Dive

Vampire attacks leverage incentive mechanisms, often token emissions, to bootstrap network effects for a new protocol at the expense of an incumbent. The attacker typically deploys [liquidity mining](/uk/terms/liquidity-mining) programs with unsustainable APYs, funded by a large initial token allocation. Users arbitrage between the old and new protocols, migrating capital to maximize yield. The success of a vampire attack depends on the attacker's ability to offer significantly superior incentives and the target protocol's vulnerability to liquidity flight (e.g., low switching costs, lack of strong network effects). The sustainability of the attacker's incentives is often questionable; once the initial rewards are depleted or the attacker withdraws their capital, the new protocol may collapse. This strategy highlights the competitive dynamics within DeFi and the challenges of maintaining user loyalty and liquidity in an open, permissionless environment. Regulatory scrutiny may also arise if the attacker's token constitutes a security.

🔗 Пов'язані терміни

Попередні знання:

📚 Джерела