ALERT! Our system detected a suspicious transaction targeting the MT–WBNB pool on #BSC hours ago, resulting in an estimated loss of ~$242K. The root cause stems from a flawed buyer-limitation mechanism: in deflation mode normal buys revert while router/pair are whitelisted, allowing the attacker to bypass restrictions via router swaps and liquidity removal to obtain MT from the pair. The attacker then sold MT to accumulate pendingBurnAmount and called distributeFees() to burn MT directly from the pair, artificially pumping the price before swapping MT back to WBNB for profit. Additionally, a referral rule allowing the first 0.2 MT transfer to bypass buyer limits enabled the attacker to bootstrap the attack. Attack TX: app.blocksec.com/phalcon/explo...… 🟦 Found by #PhalconSecurity, 🟦 Analyzed via #PhalconExplorer.
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content



