Gate News, March 10 — According to BlockSec monitoring, a suspicious transaction targeting the MT-WBNB liquidity pool was detected on BSC, with an estimated loss of approximately $242,000. The vulnerability was caused by a flaw in the buyer restriction mechanism: under the deflationary mode, normal buy operations would be reverted, while routers/trading pairs were whitelisted. This allowed attackers to bypass restrictions through router swaps and liquidity removal. The attacker then sold MT to accumulate pendingBurnAmount and called distributeFees() to directly burn MT from the trading pair, artificially inflating the price. They then exchanged MT back to WBNB for profit. Additionally, a recommended rule allowing the first 0.2 MT transfer to bypass buyer restrictions enabled the attacker to initiate the attack.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Figure Faces Short Seller Accusations Over Blockchain Integration Claims; FIGR Stock Down 53% From January Peak
Figure Technology Solutions faced allegations from Morpheus Research of overstating its blockchain technology use, resulting in a significant drop in share prices. Figure defended its operations, highlighting its digital asset features and strong performance metrics.
GateNews6h ago
Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam
Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.
GateNews11h ago
SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software
SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.
GateNews11h ago
Zonda Exchange CEO Blames Missing Founder for $336M in Lost Bitcoin
Zonda CEO Przemysław Kral has attributed the exchange's loss of access to 4,500 BTC, valued at $336 million, to missing founder Sylwester Suszek's failure to transfer private keys. Amid allegations of bankruptcy and intensified withdrawal requests, Kral insists Zonda remains solvent and will pursue legal action while searching for Suszek, who disappeared in 2022.
GateNews12h ago
Grinex Exchange Halts All Trading After $15M Cyberattack on Wallet Systems
Grinex, a Kyrgyz crypto exchange, suspended trading after a cyberattack resulting in losses of around $15 million. The advanced nature of the attack points to organized or state-level involvement. Grinex has reported the incident to authorities and is assessing the damage.
GateNews12h ago
Tether Freezes $3.29M USDT Linked to Rhea Finance Exploit
Tether froze $3.29 million in USDT linked to Rhea Finance exploit, ensuring user protection and ecosystem trust. Blockchain tracking enabled this action against suspicious wallets after attackers moved funds to evade detection.
GateNews13h ago