
律动BlockBeats|3月 10, 2026 04:39
[BlockSec: Flaw in MT Token Purchase Restriction Mechanism on BSC Chain Exploited by Hacker for $242,000 Arbitrage]
BlockBeats News, March 10: According to monitoring by BlockSec, its system detected a suspicious transaction targeting the MT-WBNB liquidity pool on the BSC chain, with an estimated loss of approximately $242,000. The issue lies in a flaw in the buyer restriction mechanism: under the deflationary model, normal purchase operations would revert, while the router/trading pair is whitelisted. This allowed the attacker to bypass restrictions through router swaps and liquidity removal, extracting MT from the trading pair.
The attacker then sold MT to accumulate pendingBurnAmount and invoked the distributeFees() function to directly burn MT from the trading pair, artificially inflating the price. They subsequently converted MT back to WBNB for profit. Additionally, a recommended rule allowing transfers of up to 0.2 MT to bypass buyer restrictions enabled the attacker to initiate the exploit.
Timeline