<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=IPC_Token_TransferTime_Swap_Contract_Vulnerability</id>
	<title>IPC Token TransferTime Swap Contract Vulnerability - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=IPC_Token_TransferTime_Swap_Contract_Vulnerability"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=IPC_Token_TransferTime_Swap_Contract_Vulnerability&amp;action=history"/>
	<updated>2026-05-02T17:25:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=IPC_Token_TransferTime_Swap_Contract_Vulnerability&amp;diff=6541&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/ipctokentransfertimeswapcontractvulnerability.php}} {{Unattributed Sources}}  BNB Smart Chain ImageOn January 7th, 2025, the IPC AI token experienced an exploit, resulting in a loss of approximately $590K. The attacker leveraged the swap() function to avoid detection as a typical buy transaction, circumventing protective measures such as flashloan prote...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=IPC_Token_TransferTime_Swap_Contract_Vulnerability&amp;diff=6541&amp;oldid=prev"/>
		<updated>2025-02-12T20:37:52Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/ipctokentransfertimeswapcontractvulnerability.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Binancesecurity.jpg&quot; title=&quot;File:Binancesecurity.jpg&quot;&gt;thumb|BNB Smart Chain Image&lt;/a&gt;On January 7th, 2025, the IPC AI token experienced an exploit, resulting in a loss of approximately $590K. The attacker leveraged the swap() function to avoid detection as a typical buy transaction, circumventing protective measures such as flashloan prote...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/ipctokentransfertimeswapcontractvulnerability.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Binancesecurity.jpg|thumb|BNB Smart Chain Image]]On January 7th, 2025, the IPC AI token experienced an exploit, resulting in a loss of approximately $590K. The attacker leveraged the swap() function to avoid detection as a typical buy transaction, circumventing protective measures such as flashloan protection and the token’s deflationary burning mechanism. By using a low-level swap approach, the attacker repeatedly swapped IPC tokens in and out of the victim's liquidity pool (LP) without triggering buy logic or proper balance updates. The exploit took advantage of flaws in the _isAddLP() and _transfer() functions, with the attacker successfully draining the victim's pool while evading protective measures. The exact nature of the exploit, whether a hack or rugpull, remains unclear.&amp;lt;ref name=&amp;quot;bscscan-18021&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;pennysplayertwitter-18022&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;tikkalaresearchtwitter-18023&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;heimdqltwitter-18024&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscan-18025&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;certikalerttwitter-18026&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;contractcreation-18027&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;blocksecapp-18028&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About IPC AI Token ==&lt;br /&gt;
IPC AI token is a smart contract launched on December 31st, 2024.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
This sections is included if a case involved deception or information that was unknown at the time. Examples include:&lt;br /&gt;
&lt;br /&gt;
* When the service was actually started (if different than the &amp;quot;official story&amp;quot;).&lt;br /&gt;
* Who actually ran a service and their own personal history.&lt;br /&gt;
* How the service was structured behind the scenes. (For example, there was no &amp;quot;trading bot&amp;quot;.)&lt;br /&gt;
* Details of what audits reported and how vulnerabilities were missed during auditing.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
The IPC AI smart contract was exploited.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - IPC Token TransferTime Swap Contract Vulnerability&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|December 30th, 2024 10:17:04 PM MST&lt;br /&gt;
|Blockchain Smart Contract Launched&lt;br /&gt;
|The IPC AI smart contract is launched on the Binance Smart Chain.&lt;br /&gt;
|-&lt;br /&gt;
|January 7th, 2025 8:52:22 AM MST&lt;br /&gt;
|Blockchain Transaction Hacking&lt;br /&gt;
|The blockchain transaction attributed to the theft.&lt;br /&gt;
|-&lt;br /&gt;
|January 7th, 2025 10:45:00 AM MST&lt;br /&gt;
|Tikkala Security Posting&lt;br /&gt;
|Tikkala Security shares a Tornado funded address which reportedly gained about $560k from a token &amp;quot;AI IPC&amp;quot; swap.&lt;br /&gt;
|-&lt;br /&gt;
|January 7th, 2025 8:47:00 PM MST&lt;br /&gt;
|CertiK Posts About Exploit&lt;br /&gt;
|CertiK shares a post with more details about the exploit.&lt;br /&gt;
|-&lt;br /&gt;
|January 8th, 2025 2:18:00 AM MST&lt;br /&gt;
|pennysplayer Tweet Posted&lt;br /&gt;
|&amp;quot;IPC exploited for $500k, hacker used swap() function to avoid beging detected as buy behavior. Thus transferTime[sender] of attack contract stays 0. Additionly he got to buy with fee=0. And when selling, nearly 50% of last sell amout got burned from pair.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;IPC exploited for $500k, hacker used swap() function to avoid beging detected as buy behavior. Thus transferTime[sender] of attack contract stays 0. Additionly he got to buy with fee=0. And when selling, nearly 50% of last sell amout got burned from pair.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;So if _isAddLP(pair) returns false: the recipient == pair: is triaged as sell in the LP, can  force the transaction into the sell pathway&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The attacker circumvented the flashloan protection mechanism and exploited the deflationary mechanism that burns tokens on the pair to drain the victim pair of ~$590K.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The attacker repeatedly swapped IPC tokens in and out of the victim pair but did not trigger the protection logic against such behavior. &lt;br /&gt;
&lt;br /&gt;
Instead of regular swapping through a router, the attacker used the low-level 'swap()' of the pair to swap out both tokens that, during IPC transfer, the reserve has not been updated. &lt;br /&gt;
&lt;br /&gt;
The _isRemoveLP() compares the USDT reserve and balance on the pair and returns True, and thus _transfer() logic does not deem the IPC transfer as buy, and transferTime[recipient] is not properly updated.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The root cause is the _destroy() function in the _transfer() function which will update the token balance of the swap thus impact the K number. &lt;br /&gt;
We are not sure if this is a hack or rugpull.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
Losses were publicly reported as $590k widely, though one source reported as $560k. Actual blockchain data appears to show a value of $592k.&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $592,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;bscscan-18021&amp;quot;&amp;gt;[https://bscscan.com/tx/0x5ef1edb9749af6cec511741225e6d47103e0b647d1e41e08649caaff66942a91 BNB Smart Chain Transaction Hash (Txhash) Details | BscScan] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;pennysplayertwitter-18022&amp;quot;&amp;gt;[https://twitter.com/pennysplayer/status/1876921491264016469 @pennysplayer Twitter] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tikkalaresearchtwitter-18023&amp;quot;&amp;gt;[https://twitter.com/TikkalaResearch/status/1876686664371999007 @TikkalaResearch Twitter] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;heimdqltwitter-18024&amp;quot;&amp;gt;[https://twitter.com/heimdql/status/1876938103853551662 @heimdql Twitter] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscan-18025&amp;quot;&amp;gt;[https://bscscan.com/token/0xeab0d46682ac707a06aefb0ac72a91a3fd6fe5d1 AI IPC (IPC) Token Tracker | BscScan] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;certikalerttwitter-18026&amp;quot;&amp;gt;[https://twitter.com/CertiKAlert/status/1876838123281223997 @CertiKAlert Twitter] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;contractcreation-18027&amp;quot;&amp;gt;[https://bscscan.com/tx/0x5894b4e70f6323951e8b81c63f5440e4855777e267f1b0bc7f9e1b7353d6a129 Smart Contract Creation Transaction] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;blocksecapp-18028&amp;quot;&amp;gt;[https://app.blocksec.com/explorer/tx/bsc/0x5ef1edb9749af6cec511741225e6d47103e0b647d1e41e08649caaff66942a91?line=9 https://app.blocksec.com/explorer/tx/bsc/0x5ef1edb9749af6cec511741225e6d47103e0b647d1e41e08649caaff66942a91?line=9] (Accessed Feb 12, 2025)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>