ChainCatcher News, according to SlowMist monitoring, Four.meme Token was attacked by exploiting pre-release vulnerabilities to steal Liquidity.
The attacker purchased a small amount of Token through the 0x7f79f6df function of Four.meme before the Token was released, and used this function to send the Token to the PancakeSwap trading pair address that had not been created yet.
This allows attackers to create trading pairs and add Liquidity without the need to transfer unreleased Tokens, bypassing the transfer restrictions (MODETRANSFERRESTRICTED) before the release of Four.MEME Tokens.
In the end, the attacker added Liquidity at an unexpected price, successfully stealing the Liquidity of the fund pool.
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
SlowMist: Four.meme Token was exploited by a Hacker to steal Liquidity before the Token release vulnerability
ChainCatcher News, according to SlowMist monitoring, Four.meme Token was attacked by exploiting pre-release vulnerabilities to steal Liquidity. The attacker purchased a small amount of Token through the 0x7f79f6df function of Four.meme before the Token was released, and used this function to send the Token to the PancakeSwap trading pair address that had not been created yet. This allows attackers to create trading pairs and add Liquidity without the need to transfer unreleased Tokens, bypassing the transfer restrictions (MODETRANSFERRESTRICTED) before the release of Four.MEME Tokens. In the end, the attacker added Liquidity at an unexpected price, successfully stealing the Liquidity of the fund pool.