{"id":92891,"date":"2024-09-11T10:26:24","date_gmt":"2024-09-11T14:26:24","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=92891"},"modified":"2024-09-11T10:26:30","modified_gmt":"2024-09-11T14:26:30","slug":"unverified-contract-drains-1-4m-from-cut-token","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/unverified-contract-drains-1-4m-from-cut-token\/","title":{"rendered":"Unverified Contract Account Drains $1.4M from CUT Token Pools"},"content":{"rendered":"\n<p>On September 10,  blockchain security platform Certik reported an attacker drained over $1.4M worth of Bows Coin <a href=\"https:\/\/coinscreed.com\/staging\/asymmetry-finance-ampleforth-launch-afusd-synthetic-dollar.html\" data-type=\"post\" data-id=\"81070\">Synthetic US Dollar <\/a>(BSC-USD) from a liquidity pool that held CUT tokens <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets-1024x576.jpg\" alt=\"Unverified Contract Account Drains $1.4M from CUT Token Pools\" class=\"wp-image-84455\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets-1024x576.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets-300x169.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets-768x432.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets-860x484.jpg 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Unverified Contract Account Drains $1.4M from CUT Token Pools<\/figcaption><\/figure>\n\n\n\n<p>The CUT token contract depended on a distinct, unverified contract to establish its &#8220;future yield&#8221; parameter. This contract was utilized to drain the BSC-USD using an unknown method.<\/p>\n\n\n\n<p>CertiK reported the event on X.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/CertiKInsight?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#CertiKInsight<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> \ud83d\udea8<br><br>We have seen a flashloan exploit involving CUT token <br><br>BSC: 0x7057F3b0F4D0649B428F0D8378A8a0E7D21d36a7<br><br>The CUT contract uses ILPFutureYieldContract(_lpFutureYieldContractAddress) at 0x0917914b0A70ee7F1f2460Fcd487696856E31154 which is unverified and contains\u2026 <a href=\"https:\/\/t.co\/ycE4Px3Nxy\" target=\"_blank\">pic.twitter.com\/ycE4Px3Nxy<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; CertiK Alert (@CertiKAlert) <a href=\"https:\/\/twitter.com\/CertiKAlert\/status\/1833531143339012327?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 10, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Located at an address ending in 36a7 on the Binance Smart Chain, the CUT token that was exploited is distinct from the Crypto Unity project, which shares the same ticker symbol but a different address. <\/p>\n\n\n\n<p>Drainage of the pool was a component of the <a href=\"https:\/\/pancakeswap.finance\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/pancakeswap.finance\/\" rel=\"noreferrer noopener nofollow\">Pancakeswap exchange<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>. It is not believed to have impacted any other Pancakeswap pools.<\/p>\n\n\n\n<p>According to blockchain data, the perpetrator conducted four distinct transactions that drained the BSC-USD pool. The total quantity that was removed was $1,448,974.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"213\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-1024x213.png\" alt=\"CUT exploit transactions. Source: BSCScan.\" class=\"wp-image-92893\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-1024x213.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-300x62.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-768x160.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-1536x319.png 1536w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-860x179.png 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31-1320x274.png 1320w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-31.png 1746w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>CUT exploit transactions. Source: BSCScan.<\/em><\/figcaption><\/figure>\n\n\n\n<p>The transaction is unlikely to be a legitimate withdrawal, as the perpetrator did not own any liquidity provider tokens for the pool and had not made any deposits.<\/p>\n\n\n\n<p>Within each transaction, the perpetrator invoked a function known as &#8220;0x7a50b2b8.&#8221; However, it is absent from the token contract.<\/p>\n\n\n\n<p>According to the report, the attacker must have invoked ILPFutureYieldContract(), which enables the user to call a distinct function on an entirely different contract whose address terminates in 1154. The BSC Scan does not display any readable bytecode for this particular contract, as it is unverified.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"320\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-1024x320.png\" alt=\"Separate contract used in CUT exploit. Source: BSCSCan.\" class=\"wp-image-92894\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-1024x320.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-300x94.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-768x240.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-1536x481.png 1536w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-860x269.png 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32-1320x413.png 1320w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/09\/image-32.png 1732w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Separate contract used in CUT exploit. Source: BSCSCan.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Cointelegraph could not locate any marketing website or Twitter account promoting CUT. Investors may have mistakenly named it the unrelated Crypto Unity project.<\/p>\n\n\n\n<p>Exploits are a prevalent method for Web3 users to incur losses. An exploit of the <a href=\"https:\/\/coinscreed.com\/staging\/penpie-protocol-suffers-27m-loss-to-recent-hack.html\" data-type=\"post\" data-id=\"92149\">Penpie decentralized finance protocol<\/a> resulted in the loss of more than $25 million in cryptocurrency on September 3.<\/p>\n\n\n\n<p>An attacker exploited a defective deployment script to siphon $10 million from the Ronin gaming network's bridge on August 6. In this instance, the exploit has resulted in a collective loss of $1.4 million for CUT liquidity providers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 10, blockchain security platform Certik reported an attacker drained over $1.4M worth of Bows Coin Synthetic US Dollar (BSC-USD) from a liquidity pool that held CUT tokens The CUT token contract depended on a distinct, unverified contract to establish its &#8220;future yield&#8221; parameter. This contract was utilized to drain the BSC-USD using an [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":84455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[21770,21769,10413],"class_list":["post-92891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-crypto-unity-project","tag-cut-token","tag-pancakeswap-2"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/rho-markets.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/92891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=92891"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/92891\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/84455"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=92891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=92891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=92891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}