LW Token Price Manipulation Attack: Difference between revisions

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Jump to navigation Jump to search
(Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/lwtokenpricemanipulationattack.php}} {{Unattributed Sources}} thumb|LW Token Price ChartLittle is known about the LW token. It doesn't appear to have an official website and there is limited references on social media, however it traded on PancakeSwap and was listed on several sites. On May 11th, the price spiked and rapidly fell due to a flash loan exploit. Approximately $48k...")
 
(Another 30 minutes complete.)
Line 4: Line 4:
[[File:Lwtoken.jpg|thumb|LW Token Price Chart]]Little is known about the LW token. It doesn't appear to have an official website and there is limited references on social media, however it traded on PancakeSwap and was listed on several sites. On May 11th, the price spiked and rapidly fell due to a flash loan exploit. Approximately $48k worth of BNB was removed and brought to TornadoCash.
[[File:Lwtoken.jpg|thumb|LW Token Price Chart]]Little is known about the LW token. It doesn't appear to have an official website and there is limited references on social media, however it traded on PancakeSwap and was listed on several sites. On May 11th, the price spiked and rapidly fell due to a flash loan exploit. Approximately $48k worth of BNB was removed and brought to TornadoCash.


This is a global/international case not involving a specific country.<ref name="slowmisthackedarchive-10953" /><ref name="panewslabarchive-11037" /><ref name="panewslab-11038" /><ref name="peckshieldalerttwitter-11039" /><ref name="peckshieldalerttwitter-11040" /><ref name="bscscan-11041" /><ref name="bscscan-11042" /><ref name="metatrustalerttwitter-11043" /><ref name="metatrustalerttwitter-11044" /><ref name="bscscan-11045" /><ref name="bscscan-11046" /><ref name="bscscan-11047" /><ref name="hexagatetwitter-11048" /><ref name="dedotfisecuritytwitter-11049" /><ref name="tronweeklytwitter-11050" /><ref name="bscnewpairstwitter-11051" /><ref name="bscscan-11052" /><ref name="coinbrain-11053" /><ref name="blockchain-11054" /><ref name="top100token-11055" /><ref name="listingspy-11056" /><ref name="coinsgem-11057" /><ref name="poocoinapp-11058" />
This is a global/international case not involving a specific country.<ref name="slowmisthackedarchive-10953" /><ref name="panewslabarchive-11037" /><ref name="panewslab-11038" /><ref name="peckshieldalerttwitter-11039" /><ref name="peckshieldalerttwitter-11040" />


== About LW Token ==
== About LW Token ==
<ref name="bscscan-11047" /><ref name="bscscan-11052" /><ref name="coinbrain-11053" /><ref name="blockchain-11054" /><ref name="top100token-11055" /><ref name="listingspy-11056" /><ref name="coinsgem-11057" /><ref name="poocoinapp-11058" />
"The Warden system based on data from 1.000.000+ SmartContract, this contract has 95% to be a RugPull or HoneyPot!"
"The Warden system based on data from 1.000.000+ SmartContract, this contract has 95% to be a RugPull or HoneyPot!"


Line 68: Line 70:
|May 11th, 2023 3:00:00 AM MDT
|May 11th, 2023 3:00:00 AM MDT
|Added To DexKoala
|Added To DexKoala
|The trading pair is added to DexKoala. There are reportedly 6 token holders at this time.
|The trading pair is added to DexKoala. There are reportedly 6 token holders at this time<ref name="bscnewpairstwitter-11051" />.
|-
|-
|May 11th, 2023 10:29:00 AM MDT
|May 11th, 2023 10:29:00 AM MDT
|LW Smart Contract Exploited
|LW Smart Contract Exploited
|The exploit transaction occurs on the Binance Smart Chain.
|The exploit transaction occurs on the Binance Smart Chain<ref name="bscscan-11041" />. TBD need to explain it.
|-
|May 11th, 2023 8:10:15 PM MDT
|First Exploit Transaction
|The first exploit transaction occurs<ref name="bscscan-11045" />. TBD need to explain it.
|-
|May 11th, 2023 8:11:39 PM MDT
|Second Exploit Transaction
|The second exploit transaction occurs<ref name="bscscan-11046" />. TBD need to explain it.
|-
|May 11th, 2023 8:29:54 PM MDT
|Funds Moving To TornadoCash
|The first transaction starts moving the funds through TornadoCash<ref>[https://bscscan.com/tx/0x4617131298a4ab375448465d0381b6cb217301abd7ca5988b1d239f6332d3a97 First TornadoCash Transaction - BscScan] (May 29, 2023)</ref><ref name="bscscan-11042" />.
|-
|May 11th, 2023 8:32:42 PM MDT
|Funds Moving To TornadoCash
|The final transaction moving the funds through TornadoCash<ref>[https://bscscan.com/tx/0x8fc57b3aad542088459e3609230fd64a26b538d38e6ca367a76d1f86a34a277c Final TornadoCash Transaction - BscScan] (May 29, 2023)</ref><ref name="bscscan-11042" />.
|-
|-
|May 11th, 2023 8:35:00 PM MDT
|May 11th, 2023 8:35:00 PM MDT
Line 81: Line 99:
|TornadoCash Transfer Reported
|TornadoCash Transfer Reported
|PeckShield reports that the exploiter has already cashed their 150 BNB token through TornadoCash.
|PeckShield reports that the exploiter has already cashed their 150 BNB token through TornadoCash.
|-
|May 12th, 2023 12:15:00 AM MDT
|MetaTrust Alert Tweet
|MetaTrust posts an alert and analysis on Twitter about the exploit<ref name="metatrustalerttwitter-11043" /> including a detailed technical analysis<ref name="metatrustalerttwitter-11044" />.
|-
|May 12th, 2023 9:52:00 AM MDT
|Hexagate Analysis Tweet
|Hexagate reported on the situation on Twitter, and notes that the smart contract used a flashswap and was deployed 10 hours before the attack happened<ref name="hexagatetwitter-11048" />.
|-
|May 12th, 2023 5:42:00 PM MDT
|DeDotFiSecurity Analysis Tweet
|DeDotFiSecurity posts an analysis of the exploit on Twitter, noting that roughly $48k was taken and the LW token experienced a drop in price of roughly 80%<ref name="dedotfisecuritytwitter-11049" />.
|-
|May 13th, 2023 10:59:00 AM MDT
|TronWeekly Report
|TronWeekly reports with a new tweet about the LW token attack<ref name="tronweeklytwitter-11050" />.
|}
|}


== Technical Details ==
== Technical Details ==
This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?
This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?
Exploiter BSC Wallet: <ref name="bscscan-11042" />
Transactions: <ref name="bscscan-11041" /> (DeDotFiSecurity) <ref name="bscscan-11045" /> <ref name="bscscan-11046" /> (MetaTrust/Hexagate)
Transaction Stealing Funds $48,415 USDT (DeDotFiSecurity):
<nowiki>https://bscscan.com/tx/0xd0dd0c8aa71860ff2d7fe6f9763892d936e31fb8c1aef01ec5ffbc947dbedbeb</nowiki>
A couple of transactions (Hexagate,MetaTrust)
<nowiki>https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a</nowiki>
<nowiki>https://bscscan.com/tx/0x96b34dc3a98cd4055a984132d7f3f4cc5a16b2525113b8ef83c55ac0ba2b3713</nowiki>
Exploiting Contract Address
<nowiki>https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c</nowiki>
<nowiki>https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c</nowiki>
[1]Exploit Transaction 2 - As Reported By Hexagate - BscScan
Transfer To TornadoCash - BSCScan
<nowiki>https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5</nowiki>
=== MetaTrust Technical Analysis ===
MetaTrust published a technical analysis on Twitter<ref name="metatrustalerttwitter-11043" /><ref name="metatrustalerttwitter-11044" />.<blockquote>#MetaTrustAlert Our #MetaScout detected that $LW on BSC was attacked by the flashloan with a loss of ~48.4k $USD.
The price of $LW has dropped ~21.5%
It is a price manipulation attack.
In this attack, the marketAddr account has 173,272 $USDT, which is used to buy back the $LW and increase the price of the $LW.
The attacker first swapped $USDT for the $LW
The attacker triggered the buy-backs of $LW and increased the price of $LW
Finally, the attacker swapped $LW for the $USDT</blockquote>
=== Hexagate Technical Analysis ===
Hexagate published a brief technical analysis of the exploit<ref name="hexagatetwitter-11048" />.<blockquote>We identified an exploit on $LW token, on the PancakeSwap pair of $LW - $BUSD that resulted in an accumulated theft of ~$48k. The exploiting contract, utilizing a flashswap on the contract to conduct the attack, deployed around *10 hours* before the attack happened</blockquote>
=== DeDotFiSecurity Technical Analysis ===
The DeDotFiSecurity team posted a technical analysis on Twitter on the day after the exploit<ref name="dedotfisecuritytwitter-11049" />.<blockquote>$LW Token Exploit
~ $48k has been stolen due to the exploit on the $LW token, specifically on the PancakeSwap pair of $LW - $BUSD.
As a result of the exploit, the $LW token has experienced a significant drop of approximately -80%.
Transaction Link Stolen Amount: ~$48,415 USDT
The attacker deployed the exploiting contract around 10 hours before the attack occurred
The $LW exploiter has already transferred around 150 $BNB into @TornadoCash</blockquote>


== Total Amount Lost ==
== Total Amount Lost ==
Line 120: Line 211:


== References ==
== References ==
<references><ref name="slowmisthackedarchive-10953">[https://web.archive.org/web/20230519161338/https://hacked.slowmist.io/en/ SlowMist Hacked - SlowMist Zone] (May 19, 2023)</ref>
<references>
 
<ref name="slowmisthackedarchive-10953">[https://web.archive.org/web/20230519161338/https://hacked.slowmist.io/en/ SlowMist Hacked - SlowMist Zone] (May 19, 2023)</ref>
<ref name="panewslabarchive-11037">[https://web.archive.org/web/20230519161338/https://www.panewslab.com/zh/sqarticledetails/4jq3adah.html 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews] (May 19, 2023)</ref>
<ref name="panewslabarchive-11037">[https://web.archive.org/web/20230519161338/https://www.panewslab.com/zh/sqarticledetails/4jq3adah.html 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews] (May 19, 2023)</ref>
<ref name="panewslab-11038">[https://www.panewslab.com/zh/sqarticledetails/4jq3adah.html 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews] (May 19, 2023)</ref>
<ref name="panewslab-11038">[https://www.panewslab.com/zh/sqarticledetails/4jq3adah.html 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews] (May 19, 2023)</ref>
<ref name="peckshieldalerttwitter-11039">[https://twitter.com/PeckShieldAlert/status/1656850634312925184 @PeckShieldAlert Twitter] (May 19, 2023)</ref>
<ref name="peckshieldalerttwitter-11039">[https://twitter.com/PeckShieldAlert/status/1656850634312925184 @PeckShieldAlert Twitter] (May 19, 2023)</ref>
<ref name="peckshieldalerttwitter-11040">[https://twitter.com/PeckShieldAlert/status/1656852216337268736 @PeckShieldAlert Twitter] (May 19, 2023)</ref>
<ref name="peckshieldalerttwitter-11040">[https://twitter.com/PeckShieldAlert/status/1656852216337268736 @PeckShieldAlert Twitter] (May 19, 2023)</ref>
 
<ref name="bscscan-11041">[https://bscscan.com/tx/0xd0dd0c8aa71860ff2d7fe6f9763892d936e31fb8c1aef01ec5ffbc947dbedbeb Exploit Transaction - BscScan] (May 19, 2023)</ref>
<ref name="bscscan-11041">[https://bscscan.com/tx/0xd0dd0c8aa71860ff2d7fe6f9763892d936e31fb8c1aef01ec5ffbc947dbedbeb Binance Transaction Hash (Txhash) Details | BscScan] (May 19, 2023)</ref>
<ref name="bscscan-11042">[https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5 Exploiter BSC Wallet - BscScan] (May 19, 2023)</ref>
 
<ref name="metatrustalerttwitter-11043">[https://twitter.com/MetaTrustAlert/status/1656855782342938624 MetaTrustAlert - "#MetaTrustAlert Our #MetaScout detected that $LW on BSC was attacked by the flashloan with a loss of ~48.4k $USD. The price of $LW has dropped ~21.5%" - Twitter] (May 19, 2023)</ref>
<ref name="bscscan-11042">[https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5 Address 0x4404de29913e0fd055190e680771a016777973e5 | BscScan] (May 19, 2023)</ref>
<ref name="metatrustalerttwitter-11044">[https://twitter.com/MetaTrustAlert/status/1656905935670083590 MetaTrustAlert - "It is a price manipulation attack. In this attack, the marketAddr account has 173,272 $USDT, which is used to buy back the $LW and increase the price of the $LW." - Twitter] (May 19, 2023)</ref>
 
<ref name="bscscan-11045">[https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a Exploit Transaction 1 - BscScan] (May 19, 2023) </ref>
<ref name="metatrustalerttwitter-11043">[https://twitter.com/MetaTrustAlert/status/1656855782342938624 @MetaTrustAlert Twitter] (May 19, 2023)</ref>
<ref name="bscscan-11046">[https://bscscan.com/tx/0x96b34dc3a98cd4055a984132d7f3f4cc5a16b2525113b8ef83c55ac0ba2b3713 Exploit Transaction 2 - BscScan] (May 19, 2023)</ref>
 
<ref name="metatrustalerttwitter-11044">[https://twitter.com/MetaTrustAlert/status/1656905935670083590 @MetaTrustAlert Twitter] (May 19, 2023)</ref>
 
<ref name="bscscan-11045">[https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a Binance Transaction Hash (Txhash) Details | BscScan] (May 19, 2023)</ref>
 
<ref name="bscscan-11046">[https://bscscan.com/tx/0x96b34dc3a98cd4055a984132d7f3f4cc5a16b2525113b8ef83c55ac0ba2b3713 Binance Transaction Hash (Txhash) Details | BscScan] (May 19, 2023)</ref>
 
<ref name="bscscan-11047">[https://bscscan.com/token/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) Token Tracker | BscScan] (May 19, 2023)</ref>
<ref name="bscscan-11047">[https://bscscan.com/token/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) Token Tracker | BscScan] (May 19, 2023)</ref>
 
<ref name="hexagatetwitter-11048">[https://twitter.com/hexagate_/status/1657051084131639296 hexagate_ - "We identified an exploit on $LW token, on the PancakeSwap pair of $LW - $BUSD that resulted in an accumulated theft of ~$48k. The exploiting contract, utilizing a flashswap on the contract to conduct the attack, deployed around *10 hours* before the attack happened" - Twitter] (May 19, 2023)</ref>
<ref name="hexagatetwitter-11048">[https://twitter.com/hexagate_/status/1657051084131639296 @hexagate_ Twitter] (May 19, 2023)</ref>
<ref name="dedotfisecuritytwitter-11049">[https://twitter.com/DeDotFiSecurity/status/1657169429434626050 DeDotFiSecurity - "~ $48k has been stolen due to the exploit on the $LW token, specifically on the PancakeSwap pair of $LW - $BUSD." - Twitter] (May 19, 2023)</ref>
 
<ref name="tronweeklytwitter-11050">[https://twitter.com/TronWeekly/status/1657430397016502273 TronWeekly - "The LW token on #BSC was attacked, with a loss of 48,415 USDT, and the price of $LW token plummeted by 69%. The attackers have transferred about 150 #BNB to Tornado Cash." - Twitter] (May 19, 2023)</ref>
<ref name="dedotfisecuritytwitter-11049">[https://twitter.com/DeDotFiSecurity/status/1657169429434626050 @DeDotFiSecurity Twitter] (May 19, 2023)</ref>
<ref name="bscnewpairstwitter-11051">[https://twitter.com/BSCNewPairs/status/1656584978728206336 BSCNewPairs - "LW | $LW 0x0DD683980E9e05fa5E621ebcD167cecf5dC6A981 Holders: 6 Safety checker unavailable." - Twitter] (May 19, 2023)</ref>
 
<ref name="tronweeklytwitter-11050">[https://twitter.com/TronWeekly/status/1657430397016502273 @TronWeekly Twitter] (May 19, 2023)</ref>
 
<ref name="bscnewpairstwitter-11051">[https://twitter.com/BSCNewPairs/status/1656584978728206336 @BSCNewPairs Twitter] (May 19, 2023)</ref>
 
<ref name="bscscan-11052">[https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f GGGTOKEN | Address 0x7b8c378df8650373d82ceb1085a18fe34031784f | BscScan] (May 19, 2023)</ref>
<ref name="bscscan-11052">[https://bscscan.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f GGGTOKEN | Address 0x7b8c378df8650373d82ceb1085a18fe34031784f | BscScan] (May 19, 2023)</ref>
<ref name="coinbrain-11053">[https://coinbrain.com/converter/bnb-0x7b8c378df8650373d82ceb1085a18fe34031784f/cad LW to CAD Price Converter & Calculator, Live Exchange Rate | CoinBrain] (May 19, 2023)</ref>
<ref name="coinbrain-11053">[https://coinbrain.com/converter/bnb-0x7b8c378df8650373d82ceb1085a18fe34031784f/cad LW to CAD Price Converter & Calculator, Live Exchange Rate | CoinBrain] (May 19, 2023)</ref>
 
<ref name="blockchain-11054">https://blockchain.coinmarketcap.com/token/bsc/0x7b8c378df8650373d82ceb1085a18fe34031784f (May 19, 2023)</ref>
<ref name="blockchain-11054">[https://blockchain.coinmarketcap.com/token/bsc/0x7b8c378df8650373d82ceb1085a18fe34031784f https://blockchain.coinmarketcap.com/token/bsc/0x7b8c378df8650373d82ceb1085a18fe34031784f] (May 19, 2023)</ref>
 
<ref name="top100token-11055">[https://top100token.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) contract is 0x7b8c378df8650373d82ceb1085a18fe34031784f on BSC | Top100Token] (May 19, 2023)</ref>
<ref name="top100token-11055">[https://top100token.com/address/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) contract is 0x7b8c378df8650373d82ceb1085a18fe34031784f on BSC | Top100Token] (May 19, 2023)</ref>
<ref name="listingspy-11056">[https://listingspy.net/token/pancakeswap/lw-lw/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) token price, charts, analysis, scam check | ListingSpy] (May 19, 2023)</ref>
<ref name="listingspy-11056">[https://listingspy.net/token/pancakeswap/lw-lw/0x7b8c378df8650373d82ceb1085a18fe34031784f LW (LW) token price, charts, analysis, scam check | ListingSpy] (May 19, 2023)</ref>
<ref name="coinsgem-11057">[https://coinsgem.com/token/0x7B8C378df8650373d82CeB1085a18FE34031784F LW (LW) token contract is 0x7B8C378df8650373d82CeB1085a18FE34031784F on binance - CoinsGEM] (May 19, 2023)</ref>
<ref name="coinsgem-11057">[https://coinsgem.com/token/0x7B8C378df8650373d82CeB1085a18FE34031784F LW (LW) token contract is 0x7B8C378df8650373d82CeB1085a18FE34031784F on binance - CoinsGEM] (May 19, 2023)</ref>
 
<ref name="poocoinapp-11058">[https://poocoin.app/tokens/0x7b8c378df8650373d82ceb1085a18fe34031784f PooCoin BSC Charts] (May 19, 2023)</ref>
<ref name="poocoinapp-11058">[https://poocoin.app/tokens/0x7b8c378df8650373d82ceb1085a18fe34031784f PooCoin BSC Charts] (May 19, 2023)</ref></references>
</references>

Revision as of 12:39, 29 May 2023

Notice: This page is a freshly imported case study from the original repository. The original content was in a different format, and may not have relevant information for all sections. Please help restructure the content by moving information from the 'About' section to other sections, and add any missing information or sources you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!

LW Token Price Chart

Little is known about the LW token. It doesn't appear to have an official website and there is limited references on social media, however it traded on PancakeSwap and was listed on several sites. On May 11th, the price spiked and rapidly fell due to a flash loan exploit. Approximately $48k worth of BNB was removed and brought to TornadoCash.

This is a global/international case not involving a specific country.[1][2][3][4][5]

About LW Token

[6][7][8][9][10][11][12][13]

"The Warden system based on data from 1.000.000+ SmartContract, this contract has 95% to be a RugPull or HoneyPot!"

"The LW token on BSC was attacked, with a loss of 48,415 USDT, and the price of LW token plummeted by 69%. The attackers have transferred about 150 BNB to Tornado Cash."

"According to news from PANews on May 12, according to Paidun’s early warning and monitoring, the LW token on BSC was attacked, with a loss of 48,415 USDT, and the price of LW token plummeted by 69%. The attacker has transferred about 150 BNB to Tornado Cash."

"#MetaTrustAlert Our #MetaScout detected that $LW on BSC was attacked by the flashloan with a loss of ~48.4k $USD." "$LW is exploited (w/ 48,415 $USDT) $LW has dropped -69%"

"We identified an exploit on $LW token, on the PancakeSwap pair of $LW - $BUSD that resulted in an accumulated theft of ~$48k. The exploiting contract, utilizing a flashswap on the contract to conduct the attack, deployed around *10 hours* before the attack happened"

"The LW token on #BSC was attacked, with a loss of 48,415 USDT, and the price of $LW token plummeted by 69%. The attackers have transferred about 150 #BNB to Tornado Cash."

"It is a price manipulation attack.

In this attack, the marketAddr account has 173,272 $USDT, which is used to buy back the $LW and increase the price of the $LW.

The attacker first swapped $USDT for the $LW

The attacker triggered the buy-backs of $LW and increased the price of $LW

Finally, the attacker swapped $LW for the $USDT"

"The $LW exploiter has already transferred ~150 $BNB into Tornado Cash."

This is a global/international case not involving a specific country.

The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.

Include:

  • Known history of when and how the service was started.
  • What problems does the company or service claim to solve?
  • What marketing materials were used by the firm or business?
  • Audits performed, and excerpts that may have been included.
  • Business registration documents shown (fake or legitimate).
  • How were people recruited to participate?
  • Public warnings and announcements prior to the event.

Don't Include:

  • Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
  • Anything that wasn't reasonably knowable at the time of the event.

There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.

The Reality

This sections is included if a case involved deception or information that was unknown at the time. Examples include:

  • When the service was actually started (if different than the "official story").
  • Who actually ran a service and their own personal history.
  • How the service was structured behind the scenes. (For example, there was no "trading bot".)
  • Details of what audits reported and how vulnerabilities were missed during auditing.

What Happened

The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.

Key Event Timeline - LW Token Price Manipulation Attack
Date Event Description
May 11th, 2023 3:00:00 AM MDT Added To DexKoala The trading pair is added to DexKoala. There are reportedly 6 token holders at this time[14].
May 11th, 2023 10:29:00 AM MDT LW Smart Contract Exploited The exploit transaction occurs on the Binance Smart Chain[15]. TBD need to explain it.
May 11th, 2023 8:10:15 PM MDT First Exploit Transaction The first exploit transaction occurs[16]. TBD need to explain it.
May 11th, 2023 8:11:39 PM MDT Second Exploit Transaction The second exploit transaction occurs[17]. TBD need to explain it.
May 11th, 2023 8:29:54 PM MDT Funds Moving To TornadoCash The first transaction starts moving the funds through TornadoCash[18][19].
May 11th, 2023 8:32:42 PM MDT Funds Moving To TornadoCash The final transaction moving the funds through TornadoCash[20][19].
May 11th, 2023 8:35:00 PM MDT PeckShield Alert PeckShield alerts and posts an announcement on Twitter about the exploit.
May 11th, 2023 8:42:00 PM MDT TornadoCash Transfer Reported PeckShield reports that the exploiter has already cashed their 150 BNB token through TornadoCash.
May 12th, 2023 12:15:00 AM MDT MetaTrust Alert Tweet MetaTrust posts an alert and analysis on Twitter about the exploit[21] including a detailed technical analysis[22].
May 12th, 2023 9:52:00 AM MDT Hexagate Analysis Tweet Hexagate reported on the situation on Twitter, and notes that the smart contract used a flashswap and was deployed 10 hours before the attack happened[23].
May 12th, 2023 5:42:00 PM MDT DeDotFiSecurity Analysis Tweet DeDotFiSecurity posts an analysis of the exploit on Twitter, noting that roughly $48k was taken and the LW token experienced a drop in price of roughly 80%[24].
May 13th, 2023 10:59:00 AM MDT TronWeekly Report TronWeekly reports with a new tweet about the LW token attack[25].

Technical Details

This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?

Exploiter BSC Wallet: [19]

Transactions: [15] (DeDotFiSecurity) [16] [17] (MetaTrust/Hexagate)

Transaction Stealing Funds $48,415 USDT (DeDotFiSecurity):

https://bscscan.com/tx/0xd0dd0c8aa71860ff2d7fe6f9763892d936e31fb8c1aef01ec5ffbc947dbedbeb

A couple of transactions (Hexagate,MetaTrust)

https://bscscan.com/tx/0xb846f3aeb9b3027fe138b23bbf41901c155bd6d4b24f08d6b83bd37a975e4e4a

https://bscscan.com/tx/0x96b34dc3a98cd4055a984132d7f3f4cc5a16b2525113b8ef83c55ac0ba2b3713

Exploiting Contract Address

https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c

https://bscscan.com/address/0xa4fbc2c95ac4240277313bf3f810c54309dfcd6c

[1]Exploit Transaction 2 - As Reported By Hexagate - BscScan

Transfer To TornadoCash - BSCScan

https://bscscan.com/address/0x4404de29913e0fd055190e680771a016777973e5

MetaTrust Technical Analysis

MetaTrust published a technical analysis on Twitter[21][22].

#MetaTrustAlert Our #MetaScout detected that $LW on BSC was attacked by the flashloan with a loss of ~48.4k $USD.

The price of $LW has dropped ~21.5%

It is a price manipulation attack.

In this attack, the marketAddr account has 173,272 $USDT, which is used to buy back the $LW and increase the price of the $LW.

The attacker first swapped $USDT for the $LW

The attacker triggered the buy-backs of $LW and increased the price of $LW

Finally, the attacker swapped $LW for the $USDT

Hexagate Technical Analysis

Hexagate published a brief technical analysis of the exploit[23].

We identified an exploit on $LW token, on the PancakeSwap pair of $LW - $BUSD that resulted in an accumulated theft of ~$48k. The exploiting contract, utilizing a flashswap on the contract to conduct the attack, deployed around *10 hours* before the attack happened

DeDotFiSecurity Technical Analysis

The DeDotFiSecurity team posted a technical analysis on Twitter on the day after the exploit[24].

$LW Token Exploit

~ $48k has been stolen due to the exploit on the $LW token, specifically on the PancakeSwap pair of $LW - $BUSD.

As a result of the exploit, the $LW token has experienced a significant drop of approximately -80%.

Transaction Link Stolen Amount: ~$48,415 USDT

The attacker deployed the exploiting contract around 10 hours before the attack occurred

The $LW exploiter has already transferred around 150 $BNB into @TornadoCash

Total Amount Lost

The total amount lost has been estimated at $48,000 USD.

How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?

Immediate Reactions

How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?

Ultimate Outcome

What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?

Total Amount Recovered

There do not appear to have been any funds recovered in this case.

What funds were recovered? What funds were reimbursed for those affected users?

Ongoing Developments

What parts of this case are still remaining to be concluded?

Individual Prevention Policies

No specific policies for individual prevention have yet been identified in this case.

For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.

Platform Prevention Policies

Policies for platforms to take to prevent this situation have not yet been selected in this case.

For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.

Regulatory Prevention Policies

No specific regulatory policies have yet been identified in this case.

For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.

References

  1. SlowMist Hacked - SlowMist Zone (May 19, 2023)
  2. 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews (May 19, 2023)
  3. 派盾:BSC上LW代币遭遇攻击,损失约5万美元 - PANews (May 19, 2023)
  4. @PeckShieldAlert Twitter (May 19, 2023)
  5. @PeckShieldAlert Twitter (May 19, 2023)
  6. LW (LW) Token Tracker | BscScan (May 19, 2023)
  7. GGGTOKEN | Address 0x7b8c378df8650373d82ceb1085a18fe34031784f | BscScan (May 19, 2023)
  8. LW to CAD Price Converter & Calculator, Live Exchange Rate | CoinBrain (May 19, 2023)
  9. https://blockchain.coinmarketcap.com/token/bsc/0x7b8c378df8650373d82ceb1085a18fe34031784f (May 19, 2023)
  10. LW (LW) contract is 0x7b8c378df8650373d82ceb1085a18fe34031784f on BSC | Top100Token (May 19, 2023)
  11. LW (LW) token price, charts, analysis, scam check | ListingSpy (May 19, 2023)
  12. LW (LW) token contract is 0x7B8C378df8650373d82CeB1085a18FE34031784F on binance - CoinsGEM (May 19, 2023)
  13. PooCoin BSC Charts (May 19, 2023)
  14. BSCNewPairs - "LW | $LW 0x0DD683980E9e05fa5E621ebcD167cecf5dC6A981 Holders: 6 Safety checker unavailable." - Twitter (May 19, 2023)
  15. 15.0 15.1 Exploit Transaction - BscScan (May 19, 2023)
  16. 16.0 16.1 Exploit Transaction 1 - BscScan (May 19, 2023)
  17. 17.0 17.1 Exploit Transaction 2 - BscScan (May 19, 2023)
  18. First TornadoCash Transaction - BscScan (May 29, 2023)
  19. 19.0 19.1 19.2 Exploiter BSC Wallet - BscScan (May 19, 2023)
  20. Final TornadoCash Transaction - BscScan (May 29, 2023)
  21. 21.0 21.1 MetaTrustAlert - "#MetaTrustAlert Our #MetaScout detected that $LW on BSC was attacked by the flashloan with a loss of ~48.4k $USD. The price of $LW has dropped ~21.5%" - Twitter (May 19, 2023)
  22. 22.0 22.1 MetaTrustAlert - "It is a price manipulation attack. In this attack, the marketAddr account has 173,272 $USDT, which is used to buy back the $LW and increase the price of the $LW." - Twitter (May 19, 2023)
  23. 23.0 23.1 hexagate_ - "We identified an exploit on $LW token, on the PancakeSwap pair of $LW - $BUSD that resulted in an accumulated theft of ~$48k. The exploiting contract, utilizing a flashswap on the contract to conduct the attack, deployed around *10 hours* before the attack happened" - Twitter (May 19, 2023)
  24. 24.0 24.1 DeDotFiSecurity - "~ $48k has been stolen due to the exploit on the $LW token, specifically on the PancakeSwap pair of $LW - $BUSD." - Twitter (May 19, 2023)
  25. TronWeekly - "The LW token on #BSC was attacked, with a loss of 48,415 USDT, and the price of $LW token plummeted by 69%. The attackers have transferred about 150 #BNB to Tornado Cash." - Twitter (May 19, 2023)