PANews reported on March 10th that, according to BlockSec Phalcon monitoring, a suspicious transaction targeting the MT-WBNB trading pool was detected on BSC several hours ago, resulting in an estimated loss of approximately $242,000. The root cause lies in a flaw in the buyer restriction mechanism: in deflationary mode, normal buys are rolled back, but the router and trading pair addresses are whitelisted. Attackers bypassed the restrictions by exchanging and removing liquidity through the router, obtaining MT tokens from the trading pair.
The attacker then sold MT to accumulate pendingBurnAmount and called distributeFees() to directly destroy MT from the trading pair, artificially inflating the price, before exchanging the MT back for WBNB to profit. Furthermore, a referral rule allowing the first 0.2 MT to be transferred to bypass buyer restrictions enabled the attacker to launch the attack.

