Gate News Report, March 10 — According to BlockSec monitoring, a suspicious transaction targeting the MT-WBNB liquidity pool was detected on BSC, with an estimated loss of approximately $242,000. The vulnerability stems from a flaw in the buyer restriction mechanism: under deflationary mode, normal buy operations are rolled back, while routers/trading pairs are whitelisted. This allows attackers to bypass restrictions through router swaps and liquidity removals to acquire MT from the trading pair. The attacker then sells MT to accumulate pendingBurnAmount and calls distributeFees() to directly burn MT from the trading pair, artificially inflating the price, then exchanges MT back to WBNB for profit. Additionally, a recommended rule allowing transfers of the first 0.2 MT to bypass buyer restrictions enabled the attacker to initiate the attack.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin