{"id":125353,"date":"2025-03-19T02:18:56","date_gmt":"2025-03-19T02:18:56","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=125353"},"modified":"2025-03-19T02:18:56","modified_gmt":"2025-03-19T02:18:56","slug":"four-meme-resumes-operations-after-120k-sandwich-attack","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=125353","title":{"rendered":"Four.Meme resumes operations after $120K sandwich attack"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsThe BNB Chain-based memecoin launch platform Four.Meme has resumed operations after being hit with a sandwich attack that exploited it for around $120,000.\u00a0\u00a0<br \/>\nFour.Meme said in a March 18 X post that its launch function was back after inspecting and addressing a security issue. It had earlier suspended the function to investigate it, saying it was \u201cunder attack.\u201d<br \/>\n\u201cThe launch function has now been resumed after a thorough security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is underway,\u201d the Four.Meme team said.\u00a0<br \/>\nSource: Four.MemeWeb3 security firm ExVul said in a March 18 X post that the exploit appeared to be a market manipulation technique known as a sandwich attack that netted the attacker $120,000.\u00a0<br \/>\nIt said the attacker \u201cpre-calculated the address for creating the liquidity pool\u2019s trading pair\u201d and utilized one of the platform\u2019s functions to purchase tokens, which successfully bypassed Four.Meme\u2019s token transfer restrictions.<br \/>\n\u201cSubsequently, the hacker lay in wait for Four.Meme to add liquidity to the transaction, ultimately siphoning off the funds,\u201d ExVul added.<br \/>\nSource: ExVulBlockchain security firm CertiK came to a similar conclusion and said the attacker transferred an imbalanced amount of un-launched tokens to pair addresses before the pair was created, then manipulated the price at launch to sell them afterward for profit.\u00a0<br \/>\n\u201cIn this case of SBL token, for example, the attacker sent a bit of SBL token to the pre-calculated pair address in advance, then profited 21.1 BNB by sandwiching the add liquidity transaction at launch,\u201d CertiK said.\u00a0<br \/>\nSource: CertiKThe tactic saw the attacker leave with at least 192 BNB (BNB), worth about $120,000, which they sent to the decentralized crypto exchange FixedFloat, according to CertiK.\u00a0<br \/>\nRelated: Pump.fun memecoins are dying at record rates, less than 1% survive<br \/>\nIt\u2019s the second time that Four.Meme has been attacked in as many months, with a Feb. 11 exploit resulting in the loss of about $183,000 worth of digital assets.<br \/>\nAcross the broader crypto industry, February saw $1.53 billion in losses to scams, exploits and hacks, with the $1.4 billion Bybit hack accounting for the lion\u2019s share.\u00a0<br \/>\nBlockchain analytics firm Chainalysis says the past year saw $51 billion in illicit transaction volume, partly due to crypto crime entering a professionalized era dominated by AI-driven scams, stablecoin laundering, and efficient cyber syndicates.\u00a0<br \/>\nMagazine: Memecoins will die and DeFi will rise again \u2014 Sasha Ivanov\u00a0<a href=\"https:\/\/cointelegraph.com\/news\/four-meme-resumes-operation-sandwich-exploit?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsThe BNB Chain-based memecoin launch platform Four.Meme has resumed operations after being hit with a sandwich attack that exploited it for around $120,000.\u00a0\u00a0 Four.Meme said in a March&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125353"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=125353"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125353\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=125353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=125353"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=125353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}