TechFlow News: On March 10, according to BlockSec Phalcon monitoring, the MT-WBNB liquidity pool on BSC was attacked, resulting in losses of approximately $242,000. The attack exploited a flaw in the buyer restriction mechanism under the token’s deflationary model: ordinary buy transactions would revert, but routers and pair addresses were whitelisted. Attackers leveraged this vulnerability to acquire MT tokens from the pair via router-based swaps and liquidity removal. Subsequently, the attackers sold MT tokens to accumulate burn-eligible amounts and directly invoked the distributeFees() function to burn MT tokens from the pair, artificially inflating the MT price before swapping MT back to WBNB for profit. Additionally, the referral rule allowed the first 0.2 MT transfer to bypass buyer restrictions, providing attackers with the initial operational condition.
Navigating Web3 tides with focused insights
Contribute An Article
Media Requests
Risk Disclosure: This website's content is not investment advice and offers no trading guidance or related services. Per regulations from the PBOC and other authorities, users must be aware of virtual currency risks. Contact us / support@techflowpost.com ICP License: 琼ICP备2022009338号




