PANews reported on March 27 that BlockSec Phalcon detected a suspicious transaction targeting an unknown contract (Stake) on the BSC chain, resulting in a loss of approximately $133,000. The attacker exploited a spot price dependency vulnerability in the Stake contract, manipulating the price of TUR in the TUR-NOBEL pool before staking TUR. The inflated price triggered reward calculations, and the attacker claimed the amplified rewards through referral accounts, ultimately converting the stolen TUR into USDT for profit.
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact
crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.