QUADRIGA INITIATIVE
CRYPTO WATCHDOG & FRAUD RECOVERY PLATFORM
A COMMUNITY-BASED, NOT-FOR-PROFIT
$204 000 USD
JULY 2025
GLOBAL
RANT TOKEN
DESCRIPTION OF EVENTS
The RANT Token was originally launched on July 3rd. No sources have been able to tie this token to a social media, website, or other identifier.
The RANT Token smart contract appears to have been launched with flawed smart contract logic.
On July 5, a vulnerability was exploited in the #RANT token on the #BNBChain, resulting in a loss of approximately $204,000. The token had only been live for three days before the incident occurred. The root of the attack lay in the flawed token burn logic, specifically in how the smart contract handled burn operations during token sales. The mechanism allowed attackers to manipulate token prices by exploiting a weakness in how burn amounts were calculated.
The key issue was found in the _sellBurnliquidityPairTokens function, which mistakenly based the burn amount on the user’s transfer amount instead of referencing the liquidity pair’s actual balance. This oversight enabled attackers to perform small token transfers that triggered disproportionate burns from the liquidity pool, distorting the reserve ratios and inflating the token price. This type of manipulation opened the door for the attacker to profit by selling tokens at artificially high prices.
To execute the exploit, the attacker manipulated the price through this flawed logic, stole BNB, then swapped the funds for USDC. Finally, the stolen assets were bridged out using the Across Protocol. The incident highlights the critical need for more secure smart contract logic. Experts recommend adjusting the burn calculation to rely on the liquidity pool’s balance or using a fixed percentage to ensure fairness and prevent such exploits through small-scale manipulations.
Attacker: 0xad2cb8f48e74065a0b884af9c5a4ecbba101be23
The loss amount was reported as $203.8k by TenArmor.
SlowMist reported detecting "potential suspicious activities". "MistEye has detected potential suspicious activities related to $RANT on BSC."
It is unclear who is behind the RANT token project and whether any outcome was achieved.
There is no evidence of any recovery being possible.
The incident happened recently and further details may emerge over time.
The RANT token, launched on July 3rd without any identifiable team, website, or social media presence, suffered a major exploit just two days later due to flawed smart contract logic. A vulnerability in the _sellBurnliquidityPairTokens function allowed attackers to manipulate token prices by triggering disproportionate burns through small transfers, ultimately distorting liquidity pool reserves. This exploit led to a loss of approximately $203.8K, with the attacker swapping stolen BNB for USDC and bridging it out via the Across Protocol. Security firms like TenArmor and SlowMist flagged the suspicious activity, but the project's anonymous nature and lack of oversight make recovery unlikely, with further details still potentially forthcoming.
SlowMist - "MistEye has detected potential suspicious activities related to $RANT on BSC." - Twitter/X (Jul 8)
Agent Lisa - "The #RANT token on #BNBChain was exploited via a critical logic vulnerability in its _sellBurnLiquidityPairTokens function: Attackers used user transfer amounts instead of liquidity pair balances to manipulate token burning, draining $204K in funds." - Twitter/X (Jul 8)
RANTToken Attack - Agent Lisa (Jul 8)
Address Referenced By SlowMist - BSCScan (Jul 8)
Exploit Transaction - BSCScan (Jul 8)
TenArmor - "Our system has detected a suspicious attack involving #RANT on #BSC, resulting in an approximately loss of $203.8K." - Twitter/X (Jul 8)
Exploiter Address - BSCScan (Jul 8)
Rant Token Creation Transaction - BSCScan (Jul 8)
