According to BlockSec Phalcon monitoring, the MT-WBNB liquidity pool on the BSC chain was attacked, resulting in losses of approximately $242,000. The attack exploited a flaw in the buyer restriction mechanism under the token’s deflationary model: ordinary purchase transactions were reverted, but the router and pair addresses were whitelisted, allowing the attacker to obtain MT tokens by swapping and removing liquidity through the router. The attacker then sold MT to accumulate the pending burn amount and called the distributeFees() function to directly burn MT from the pair, artificially inflating the price before exchanging MT back to WBNB for profit. Additionally, the referral rule allowed the first 0.2 MT transfer to bypass buyer restrictions, providing the attacker with initial operational conditions.
BSC Chain MT-WBNB Pool Attacked, Losing $242,000
TechFlowShare






On-chain data reveals a $242,000 exploit targeting a BSC chain MT-WBNB liquidity pool. Attackers bypassed token restrictions by using router addresses and liquidity withdrawal to accumulate MT tokens. They sold the tokens for burn quotas, triggered the distributeFees() function, and inflated prices to convert MT back to WBNB. On-chain analysis shows that the referral rule permitted the first 0.2 MT transfer to bypass limits, enabling the exploit.
Source:Show original
Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information.
Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.