Gate News, March 10 — According to BlockSec monitoring, a suspicious transaction targeting the MT-WBNB liquidity pool was detected on BSC, with an estimated loss of approximately $242,000. The vulnerability was caused by a flaw in the buyer restriction mechanism: under the deflationary mode, normal buy operations would be reverted, while routers/trading pairs were whitelisted. This allowed attackers to bypass restrictions through router swaps and liquidity removal. The attacker then sold MT to accumulate pendingBurnAmount and called distributeFees() to directly burn MT from the trading pair, artificially inflating the price. They then exchanged MT back to WBNB for profit. Additionally, a recommended rule allowing the first 0.2 MT transfer to bypass buyer restrictions enabled the attacker to initiate the attack.