Crypto pool liquidity is the total assets locked in a decentralized finance liquidity pool.
Hackers manipulate the pool liquidity to create artificial imbalances that allow them to control prices and execute profitable trades.
Cybersecurity researchers at Check Point recently reported that their Threat Intelligence system flagged pool manipulation, causing a 22,000% token surge.
In this manipulation, the attacker managed to steal $80,000 by exploiting the liquidity pool.
During the analysis, researchers found two wallets created by the scammer, and here below we have mentioned those:-.
The wallet one deployed WIZ token and its liquidity pool with WETH and WIZ reserves.
The wallet two created malicious contract, exploiting a backdoor for WIZ token price manipulation, leading to an $80,000 theft.
Imagine a digital reservoir holding Token A and Ethereum.
Users freely swap these tokens, affecting their values.
The scammer manipulates the pool by burning Token A, boosting its value through supply and demand dynamics.
The reduction in Token A increases Ethereum's value, causing a significant surge in the token price, especially for WIZ in the WIZ/WETH pool.
This strategy inflates token prices in liquidity pools temporarily by burning one side.
Decentralized exchanges, relying on pool ratios, are vulnerable to exploitations like rug pulls.
To reach the burn function, the scammer bypasses checks by setting limitsEnabled to False, achieved through running 'removeLimits.
Running public functions with the scammer's contract address as input verifies these conditions.
Examining the WIZ token, experts find a backdoor where the scammer, who is likely the creator, set the ExcludedForMaxTxAmount to True for the malicious contract address.
This link suggests the same individual who designed both the WIZ token and the scam.
The scammer temporarily boosts token prices in the liquidity pool, manipulating balances to impact decentralized exchange rates.
This tactic exposes the vulnerability in liquidity pools tied to different contracts.
Exploiting backdoors, scammers manipulate liquidity pools, underscoring the need for vigilance in decentralized finance against fraudulent schemes.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 06 Dec 2023 14:15:10 +0000