<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Unverified_BSC_Contract_Access_Control_Swap_Vulnerability</id>
	<title>Unverified BSC Contract Access Control Swap Vulnerability - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Unverified_BSC_Contract_Access_Control_Swap_Vulnerability"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Unverified_BSC_Contract_Access_Control_Swap_Vulnerability&amp;action=history"/>
	<updated>2026-05-02T17:24:18Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Unverified_BSC_Contract_Access_Control_Swap_Vulnerability&amp;diff=6811&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/unverifiedbsccontractaccesscontrolswapvulnerability.php}} {{Unattributed Sources}}  Binance Security ImageAn unverified smart contract was deployed on the Binance Smart Chain (BSC) at address 0x16D7..., containing a critical vulnerability in its 0xf8c03cc4() function. Due to a lack of proper access controls, the function could be called by anyone to ini...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Unverified_BSC_Contract_Access_Control_Swap_Vulnerability&amp;diff=6811&amp;oldid=prev"/>
		<updated>2025-07-25T17:25:08Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/unverifiedbsccontractaccesscontrolswapvulnerability.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Binancesecurity.jpg&quot; title=&quot;File:Binancesecurity.jpg&quot;&gt;thumb|Binance Security Image&lt;/a&gt;An unverified smart contract was deployed on the Binance Smart Chain (BSC) at address 0x16D7..., containing a critical vulnerability in its 0xf8c03cc4() function. Due to a lack of proper access controls, the function could be called by anyone to ini...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/unverifiedbsccontractaccesscontrolswapvulnerability.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Binancesecurity.jpg|thumb|Binance Security Image]]An unverified smart contract was deployed on the Binance Smart Chain (BSC) at address 0x16D7..., containing a critical vulnerability in its 0xf8c03cc4() function. Due to a lack of proper access controls, the function could be called by anyone to initiate token swaps using assets from users who had granted the contract prior approvals. The attacker exploited this flaw by draining tokens—such as WBNB and TA—from unsuspecting users, swapping them through malicious or manipulated liquidity pools at inflated rates. This led to losses totaling approximately $615,000, with notable attack transactions including 0x960f, 0xc374, and 0xb92d. The victims were largely TrustaLabs token holders, and the exploit was reported by both HackenClub and TenArmor. No fund recovery has been reported, and the contract remains a cautionary example of the risks of approving unverified contracts.&amp;lt;ref name=&amp;quot;tenarmoraltertweet-20703&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscantransaction1-20704&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscantransaction2-20705&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscantransaction3-20706&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;hackenclubtweet-20707&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;belmanjen36046twitter-20708&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscancontract-20709&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscancreation-20710&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About Unverified Contract ==&lt;br /&gt;
An unverified contract was created on July 21st, 2025. Limited information is known about this contract or it's creator.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
The smart contract contained a vulnerability which allowed tokens to be drained from users who had granted the contract permissions.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
An unverified smart contract on BSC exploited a critical access control flaw to drain approximately $615,000 from users who had unknowingly approved it to spend their tokens.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - Unverified BSC Contract Access Control Swap Vulnerability&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|July 21st, 2025 9:57:38 PM MDT&lt;br /&gt;
|Smart Contract First Created&lt;br /&gt;
|The unverified smart contract is first launched on the Binance Smart Chain.&lt;br /&gt;
|-&lt;br /&gt;
|July 23rd, 2025 2:15:02 AM MDT&lt;br /&gt;
|First Attack Transaction&lt;br /&gt;
|The first attack transaction, as later reported by TenArmor.&lt;br /&gt;
|-&lt;br /&gt;
|July 23rd, 2025 2:18:11 AM MDT&lt;br /&gt;
|Second Attack Transaction&lt;br /&gt;
|The second attack transaction, as later reported by TenArmor.&lt;br /&gt;
|-&lt;br /&gt;
|July 23rd, 2025 2:39:04 AM MDT&lt;br /&gt;
|Third Attack Transaction&lt;br /&gt;
|The third and final attack transaction which is reported by TenArmor.&lt;br /&gt;
|-&lt;br /&gt;
|July 23rd, 2025 5:48:00 AM MDT&lt;br /&gt;
|HackenClub Tweet Posted&lt;br /&gt;
|HackenClub posts a detailed analysis of the attack transactions with further detailed information.&lt;br /&gt;
|-&lt;br /&gt;
|July 23rd, 2025 10:50:00 AM MDT&lt;br /&gt;
|TenArmorAlert Tweet Posted&lt;br /&gt;
|TenArmor posts an alert tweet about the compromise, with some limited details about the exploit.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
The exploit targeting the Binance Smart Chain (BSC) involves a smart contract at address 0x16D7..., which lacks adequate access control on a specific function: 0xf8c03cc4(). This function was improperly exposed, allowing anyone to invoke it and trigger token swaps on behalf of users who had previously approved the contract to spend their tokens.&lt;br /&gt;
&lt;br /&gt;
The attacker exploited this vulnerability by identifying externally owned accounts (EOAs) that had given token approvals to the contract—likely in anticipation of a legitimate service or interaction. Using the 0xf8c03cc4() function, the attacker repeatedly drained these tokens by swapping them through manipulated or malicious liquidity pools (e.g., fake PancakeSwap pools) with inflated exchange rates, maximizing the value extracted per transaction. One example involved draining Wrapped BNB (WBNB), while another involved TA tokens, both via pools under the attacker's control.&lt;br /&gt;
&lt;br /&gt;
This attack affected a wide range of TrustaLabs token holders and led to an estimated total loss of around $615,000. The victims were primarily users who had unknowingly granted token approvals to the vulnerable contract.&lt;br /&gt;
&lt;br /&gt;
Attack Transactions:&lt;br /&gt;
0x960f3fbbe53b80bc306a64ad33d16dd73bfc164c787114d57cfe0080b5c10b08&lt;br /&gt;
0xc3745e4f08bcccaf3efe584a9408d77d675cb996151735c8deaff34997c3a10e&lt;br /&gt;
0xb92d3594b818470cc3f6c03eff4a9c5704d87df9749557336545c39c7b2bfed9&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
Hackenclub reported the losses as $615k. They reported that loss transactions include 0x960f for $280k, and 0xc374 for $335k. TenArmor reported the loss total as $610k, from 3 transactions.&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $612,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
Reports about the exploit were put together and published by HackenClub and TenArmor.&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
It appears that the vulnerable contract caused damage far beyond it's initial purpose. It's unclear if any recovery was made or any actions were undertaken to resolve the vulnerability.&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There is no indication that any funds were recovered from the incident.&lt;br /&gt;
&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
Investigation may continue for affected users.&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;tenarmoraltertweet-20703&amp;quot;&amp;gt;[https://twitter.com/TenArmorAlert/status/1948063277864382599 TenArmorAlert - &amp;quot;It appears that the 0xf8c03cc4() function of the contract 0x16d7 lacks proper access control and swaps specified tokens on unverified pairs from the users who have granted approvals to this contract.&amp;quot; - Twitter/X] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscantransaction1-20704&amp;quot;&amp;gt;[https://bscscan.com/tx/0x960f3fbbe53b80bc306a64ad33d16dd73bfc164c787114d57cfe0080b5c10b08 First Attack Transaction - BSCScan] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscantransaction2-20705&amp;quot;&amp;gt;[https://bscscan.com/tx/0xc3745e4f08bcccaf3efe584a9408d77d675cb996151735c8deaff34997c3a10e Second Attack Transaction - BSCScan] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscantransaction3-20706&amp;quot;&amp;gt;[https://bscscan.com/tx/0xb92d3594b818470cc3f6c03eff4a9c5704d87df9749557336545c39c7b2bfed9 Third Attack Transaction - BSCScan] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;hackenclubtweet-20707&amp;quot;&amp;gt;[https://twitter.com/hackenclub/status/1947987227385925653 Hacken Club - &amp;quot;A large-scale exploit has impacted a number of EOAs on BNB Chain, with many @TrustaLabs holders among the victims.&amp;quot; - Twitter/X] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;belmanjen36046twitter-20708&amp;quot;&amp;gt;[https://twitter.com/belman_jen36046/status/1948039729611477367 @belman_jen36046 Twitter] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscancontract-20709&amp;quot;&amp;gt;[https://bscscan.com/address/0x16d7c6f43df19778e382b7a84bcb8c763971a551 The Unverified Contract - BSCScan] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscancreation-20710&amp;quot;&amp;gt;[https://bscscan.com/tx/0x431a539263dd841ee487ecf705d13630cc377678b673f8ae86e5a220d7068513 The Unverified Contract Creation Transaction - BSCScan] (Accessed Jul 23, 2025)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>