CoinDeskPolicy2024-04-04 tarihinde yayınlandı2024-04-05 tarihinde güncellendi

Özet

Maximum extractable value (MEV), in which blockchain operators reorder transactions to squeeze out additional profits, usually at the expense of whoever is sending the transac...

  • The European Securities and Markets Authority (ESMA) flagged a technique employed by some crypto miners as a potential form of market abuse in its latest regulatory proposals under MiCA.
  • Crypto policy watchers want the regulator to clarify that reordering transactions to maximize profits, known as MEV, is not all bad.

The European Union markets regulator flagged maximum extractable value (MEV), whereby blockchain operators reorder user transactions to maximize their own profits, as a potential form of market abuse, a stance that is worrying some industry watchers who say the case is not clear-cut.

In regulatory proposals published last week by the European Securities and Markets Authority (ESMA) under the digital assets law known as MiCA, the watchdog referred to MEV as potentially suspicious. MEV is broadly defined, but it generally encompasses trading strategies where blockchain operators – the companies and individuals that add blocks to the chain – preview the network's transaction queue to extract extra profits for themselves. Frequently, such tactics involve reordering user transactions – shifting how they're ordered into blocks, or frontrunning them with new transactions – just before the trades are written to the chain's ledger.

MEV is often called an "invisible tax" on users, since certain methods for extracting it, like sandwich attacks and frontrunning, can eat directly into end-user profits. While MEV is a controversial topic even within the industry, some industry advocates argue that MEV plays a positive role in general since it can help to improve blockchain network efficiency.

Advertisement
Advertisement

Read more: What is MEV?

“MEV by itself should not at all be considered as a market abuse and should not have a negative connotation," Anja Blaj, a policy expert at the European Crypto Initiative (EUCI), said in an interview over WhatsApp. "There are very limited scenarios and tactics that have similar effects to those of market abuse. This should be emphasized over and over again as MEV's purpose in the first place is to compensate the good actors for the validation work they do.”

Out of scope?

Some crypto policy watchers have argued that MEV is not even within MiCA’s scope, and EUCI has warned that applying MiCA to MEV could lead to overregulation. While it's true the MiCA text does not mention MEV, ESMA's consultation on proposals to tackle market abuse notes that the legislation extends the EU’s existing market abuse rules to include reporting suspicious activity resulting not just from transactions but also “the functioning of the distributed ledger technology such as the consensus mechanism.”

“MiCA is clear when indicating that orders, transactions, and other aspects of the distributed ledger technology may suggest the existence of market abuse e.g., the well-known maximum extractable value," it said.

Advertisement
Advertisement

ESMA also noted that MiCA doesn’t require crypto service providers to report activity such as “scams, payments fraud or account takeover.”

Peter Kerstens, an adviser to the European Commission on financial sector digitalization and cybersecurity, said MEV is neither good nor bad but may lead to questions about market integrity.

Investors have a legitimate expectation that transactions on the blockchain will be validated in the order they were submitted, and MEV reordering can lead to frontrunning, where the "validators" that operate blockchains can move their own transactions ahead of others to ink an extra profit, according to Kerstens.

“So MEV may lead to questions about the integrity of the market and it may trigger market abuse/frontrunning, but it does not have to in every instance,” Kerstens, who was instrumental in the creation of MiCA, said in a statement to CoinDesk.

Search for regulatory clarity

The legislation, whose full name is Markets in Crypto Assets, was finalized last year and made the EU the first major jurisdiction to comprehensively regulate the burgeoning digital assets sector.

ESMA and the European Banking Authority (EBA) have been consulting on measures and guidance they’re required to issue under MiCA, with industry watchers engaging with the watchdogs to improve clarity on the rules – particularly for various service providers.

EUCI is seeking more clarity from ESMA, ensuring that the regulator is clear on what scenarios involving MEV constitute market abuse.

“When, if, a malicious MEV tactic is detected, it should further be elaborated who's responsible for it," Blaj said. "We cannot talk about effective enforcement without clarity around the 'who' and 'what for.'”

Advertisement
Advertisement

Kerstens noted his thoughts on MEV are his personal views, but added that ESMA’s consultation seeking public feedback is in response to the European Commission – which proposed the MiCA framework – asking the regulator to provide advice on “if and when MEV is/leads to/can lead to market abuse.”

“So an official/institutional view on this may be forthcoming,” Kerstens said.

ESMA’s latest consultation is open for comments until June 25.

Edited by Sheldon Reback.

İlgili Okumalar

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit17 dk önce

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit17 dk önce

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit45 dk önce

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit45 dk önce

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit1 saat önce

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit1 saat önce

İşlemler

Spot
Futures
活动图片