• Blockchain AI Convergence: Fact-Check & Market Guide (2026)
• SEC v. Ripple Case Ends: XRP Outlook & Monero 51% Attack (2026)
• XRP ETF Forecasts & Bitmine’s $20B ETH Bet: 2026 Analysis
• PsiQuantum has started building its million-qubit quantum facility. Scientists say a machine this po
• DoorDash, Chainlink & Oblong Market Shifts Guide (2026)
• Crypto Market News: Regulatory Shifts & Corporate Volatility (March 2026)
• DoorDash, Chainlink & Oblong Market Shifts Guide (2026)
• Crypto & Tech Market Trends 2026: Pi, XRP, Robotaxi Safety
• China's central bank says it will firmly maintain the stable operation of financial markets
• Corporate Crypto Treasuries: ETH & BTC Strategy Guide (2026)
A flaw in the buy limit system for the MT token on the BSC chain let a hacker make off with around $
2026-03-10 13:05:33
BlockSec Flags $242K Exploit on BSC: Attacker Manipulated MT-WBNB Pool via Flawed Buyer Rules
Another day, another DeFi exploit. BlockSec spotted a suspicious transaction on BSC targeting the MT-WBNB liquidity pool, with losses estimated at $242,000. The issue? A broken buyer restriction mechanism.
Here's how it went down. Under deflationary mode, normal buys would revert. But routers and the trading pair itself were whitelisted. That gave the attacker a way in: swap and remove liquidity via the router to grab MT from the pool.
Then came the manipulation. The attacker sold MT to build up pendingBurnAmount, called distributeFees() to burn MT directly from the pair—artificially pumping the price—and swapped back to WBNB for profit. A referral rule that let the first 0.2 MT transfer bypass restrictions was the entry point.

| DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing. |







