<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=BUIDL_BSC_Transfer_Burn_Smart_Contract_Vulnerability</id>
	<title>BUIDL BSC Transfer Burn Smart Contract Vulnerability - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=BUIDL_BSC_Transfer_Burn_Smart_Contract_Vulnerability"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=BUIDL_BSC_Transfer_Burn_Smart_Contract_Vulnerability&amp;action=history"/>
	<updated>2026-05-02T17:42:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=BUIDL_BSC_Transfer_Burn_Smart_Contract_Vulnerability&amp;diff=6568&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/buidlbsctransferburnsmartcontractvulnerability.php}} {{Unattributed Sources}}  Binance Smart ChainThe BUIDL smart contract, launched on January 3rd, 2025, on the Binance Smart Chain, was found to have a vulnerability in its transfer() function. This flaw allowed tokens from the pair to be easily burned, leading to a loss of approximately $8,000. The inc...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=BUIDL_BSC_Transfer_Burn_Smart_Contract_Vulnerability&amp;diff=6568&amp;oldid=prev"/>
		<updated>2025-03-05T00:27:20Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/buidlbsctransferburnsmartcontractvulnerability.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Binancesecurity.jpg&quot; title=&quot;File:Binancesecurity.jpg&quot;&gt;thumb|Binance Smart Chain&lt;/a&gt;The BUIDL smart contract, launched on January 3rd, 2025, on the Binance Smart Chain, was found to have a vulnerability in its transfer() function. This flaw allowed tokens from the pair to be easily burned, leading to a loss of approximately $8,000. The inc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/buidlbsctransferburnsmartcontractvulnerability.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Binancesecurity.jpg|thumb|Binance Smart Chain]]The BUIDL smart contract, launched on January 3rd, 2025, on the Binance Smart Chain, was found to have a vulnerability in its transfer() function. This flaw allowed tokens from the pair to be easily burned, leading to a loss of approximately $8,000. The incident was reported by TenArmorAlert, though it remains unclear who created the smart contract or who was directly affected by the exploit.&amp;lt;ref name=&amp;quot;attacktx-18232&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;tenarmoralert-18233&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;slowmistweekly-18234&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;createtx-18235&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About BUIDL ==&lt;br /&gt;
The BUIDL smart contract was first launched on January 3rd, 2025 on the Binance Smart Chain.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
The smart contract unfortunately had a vulnerability in the transfer function.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
The BUIDL token smart contract was emptied by a wallet known as &amp;quot;JHY Exploiter&amp;quot;.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - BUIDL BSC Transfer Burn Smart Contract Vulnerability&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|January 3rd, 2025 6:43:57 AM MST&lt;br /&gt;
|Smart Contract Creation&lt;br /&gt;
|The BUIDL smart contract is first created.&lt;br /&gt;
|-&lt;br /&gt;
|January 12th, 2025 1:41:42 AM MST&lt;br /&gt;
|Attack Transaction On BSC&lt;br /&gt;
|The attack transaction itself on the Binance Smart Chain.&lt;br /&gt;
|-&lt;br /&gt;
|January 12th, 2025 3:12:00 AM MST&lt;br /&gt;
|TenArmorAlert Posted Tweet&lt;br /&gt;
|TenArmorAlert posts about the exploit on Twitter/X.&lt;br /&gt;
|-&lt;br /&gt;
|January 12th, 2025 3:31:00 AM MST&lt;br /&gt;
|TenArmorAlert Adding Image&lt;br /&gt;
|TenArmorAlert adds an image with some parts of the smart contract code to their tweet.&lt;br /&gt;
|-&lt;br /&gt;
|January 14th, 2025 8:05:00 AM MST&lt;br /&gt;
|SlowMist Summary List&lt;br /&gt;
|The BUIDL smart contract breach is included in a list of hacks from the past week by SlowMist.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;It appears that there is a flaw in the transfer() function in the #BUIDL smart contract that can burn token from the pair which can be easily exploited.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
&amp;quot;resulting in an approximately loss of $8K.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $8,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
The incident was reported by TenArmorAlert.&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
It is unclear who created this smart contract and who was affected.&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;attacktx-18232&amp;quot;&amp;gt;[https://bscscan.com/tx/0x24c004505bd44621015396e78b952bffe886e85e5f28ade3634295d600f4a18e Attack Transaction Receiving 8,037.009088985334656993 BSCUSD - BSCScan] (Accessed Mar 4, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tenarmoralert-18233&amp;quot;&amp;gt;[https://twitter.com/TenArmorAlert/status/1878389367074705463 TenArmorAlert - &amp;quot;It appears that there is a flaw in the transfer() function in the #BUIDL smart contract that can burn token from the pair which can be easily exploited.&amp;quot; - Twitter/X] (Accessed Mar 4, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;slowmistweekly-18234&amp;quot;&amp;gt;[https://twitter.com/SlowMist_Team/status/1879182969405075884 SlowMist - &amp;quot;BUIDL (Loss: ~$8K)&amp;quot; - Twitter/X] (Accessed Mar 4, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;createtx-18235&amp;quot;&amp;gt;[https://bscscan.com/tx/0x5d903d95998efeb92030817e390fcdfbdaf6964569dd823c8b799e2bf6f3b3db Contract Creation Transaction - BSCScan] (Accessed Mar 4, 2025)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>