autorenew
BURN Token Exploit: $150K Loss on BSC Due to Referral Reward Flaw

BURN Token Exploit: $150K Loss on BSC Due to Referral Reward Flaw

Hey there, meme token enthusiasts! If you're deep into the world of blockchain and crypto, you know that with great rewards come great risks. Recently, the folks at BlockSec's Phalcon tool sounded the alarm on a sneaky exploit targeting the BURN token on Binance Smart Chain (BSC). This incident resulted in around $150,000 in losses, all because of a poorly designed referral reward system. Let's break it down step by step, so you can understand what went wrong and how to spot similar issues in the future.

What is the BURN Token?

First off, a quick intro to BURN. Launched in late 2023 by the team behind @Burn_building, BURN is a community-driven token on BSC following a "Burn and Build" model. The idea is simple: hold BURN, participate in the community, and watch the ecosystem grow through token burns and development initiatives. It's got that classic meme token vibe—fun, engaging, and aimed at decentralization. You can check out the token contract on BSCScan here.

But like many meme tokens, it comes with staking and locking features to earn rewards, which is where things got hairy.

The Exploit: How It All Went Down

According to the Phalcon alert posted on X, the attack hit an unverified smart contract at address 0x93fd192e1cd288f1f5ee0a019429b015016061f9. This contract handles staking and locking of BURN tokens, offering referral rewards in BUSD (a stablecoin pegged to the US dollar).

The root problem? The rewards were calculated using the spot price of the BURN/BUSD trading pair, which is super easy to manipulate in low-liquidity pools. Here's the play-by-play of the attack:

  1. Staking with Referrals: Normally, when you stake or lock BURN through a referrer, you get rewards in BUSD based on the amount staked and the current BURN/BUSD price.

  2. Price Manipulation via Flash Loans: The attacker borrowed a ton of BURN using flash loans (quick, no-collateral loans that must be repaid in the same transaction). This pumped up the BURN price temporarily. Then, they created multiple new contracts to act as "users," bypassing the "one referral per address" rule and any max investment caps. This let them rack up huge, inflated BUSD rewards.

  3. Dumping and Profiting: After stacking the rewards, the attacker sold the borrowed BURN, crashing the price. With the price low, they claimed their BUSD rewards to buy back BURN at a bargain, pocketing the difference.

The result? About $150K siphoned off. Phalcon shared one of the suspicious transactions in their post (check the linked alert for details).

Expert Opinions and Lessons Learned

The thread also drew a response from @veritas_web3, who pointed out: "Using a spot price for rewards is a known vulnerability. This was an avoidable attack." Spot on—relying on easily manipulable prices without safeguards like oracles or time-weighted averages is a recipe for disaster in DeFi.

For meme token creators and investors, this is a wake-up call. Always audit contracts, especially unverified ones, and use tools like Phalcon for real-time monitoring. If you're building or investing in similar projects, consider implementing anti-flash-loan measures or using more stable price feeds.

Staying Safe in the Meme Token Game

Incidents like this highlight why security is paramount in the wild world of meme tokens. At Meme Insider, we're all about keeping you informed so you can navigate these waters smarter. If you've got thoughts on this exploit or tips on secure meme token practices, drop them in the comments below!

Stay vigilant, and happy memeing! 🚀

You might be interested