PANews reported on July 23 that the blockchain security agency BlockSec Phalcon issued a warning stating that its system detected a series of malicious transactions targeting an unverified contract on the Binance Smart Chain (BSC) (0x16d7c6f43df19778e382b7a84bcb8c763971a551), resulting in losses exceeding $600,000. Since the contract is not open source, investigations revealed that the vulnerability originated from a lack of slippage protection. Attackers exploited a fake liquidity pool to harvest TA tokens (0x539ae81a166e5e80aed211731563e549c411b140) and profited by selling in legitimate pools. BlockSec Phalcon strongly recommends that users who have authorized the contract revoke their permissions immediately to prevent further losses.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Security Agency: An unverified BSC contract was attacked, resulting in losses exceeding $600,000.
PANews reported on July 23 that the blockchain security agency BlockSec Phalcon issued a warning stating that its system detected a series of malicious transactions targeting an unverified contract on the Binance Smart Chain (BSC) (0x16d7c6f43df19778e382b7a84bcb8c763971a551), resulting in losses exceeding $600,000. Since the contract is not open source, investigations revealed that the vulnerability originated from a lack of slippage protection. Attackers exploited a fake liquidity pool to harvest TA tokens (0x539ae81a166e5e80aed211731563e549c411b140) and profited by selling in legitimate pools. BlockSec Phalcon strongly recommends that users who have authorized the contract revoke their permissions immediately to prevent further losses.