4.Meme, a memecoin launchpad on the BNB Chain, has suspended its Liquidity Supplier (LP) on PancakeSwap after detecting a malicious exploit focusing on its system.
The workforce confirmed the assault on Feb. 11 and guaranteed customers that steps had been being taken to resolve the difficulty. The platform halted its token LP to stop additional injury whereas retaining on-chain buying and selling operational.
Regardless of the assault, 4.Meme emphasised that its inside funds stay safe. The workforce has dedicated to monitoring the state of affairs and retaining the group knowledgeable.
The incident follows the platform’s current rise in prominence, primarily fueled by the surprising success of the Check (TST) token.
Initially created for an academic video, TST noticed an astonishing 10,000% surge after a social media publish from former Binance CEO Changpeng Zhao. Since then, the token has gained traction, even securing a list on Binance.
$200k in losses
Web3 safety agency CertiK revealed that the attacker leveraged the vulnerabilities in a number of unverified contracts to steal belongings price roughly $200,000.
In the meantime, safety agency PeckShield estimated the loss at round 287 BNB, equal to roughly $183,000.
SlowMist, one other blockchain safety agency, offered additional evaluation, pointing to liquidity manipulation as the first assault methodology.
Based on their findings, the exploit concerned a malicious actor front-running the token launch by making a pool on PancakeSwap V3. This technique allowed the attacker to set a man-made worth for the token earlier than its migration. When the token formally launched and built-in with PancakeSwap, the fraudulent pool dictated liquidity distribution, enabling the attacker to siphon belongings.
The safety agency recognized a crucial oversight in 4.Meme’s protocol—the absence of a verification mechanism for liquidity pool costs earlier than deposits. This flaw left the system weak to cost distortions and liquidity drain.
SlowMist’s founder, Yu Xian, attributed the exploit to weak safety measures, stressing that attackers can repeatedly exploit related loopholes until platforms implement rigorous verification processes.