<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>SBL token Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/sbl-token/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/sbl-token/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Wed, 19 Mar 2025 07:19:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>SBL token Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/sbl-token/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Four.Meme Restarted Operation After Attacks!</title>
		<link>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/</link>
					<comments>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Wed, 19 Mar 2025 08:30:28 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI scams]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[CertiK analysis]]></category>
		<category><![CDATA[Chainalysis report]]></category>
		<category><![CDATA[crypto investor protection]]></category>
		<category><![CDATA[cybercrime syndicates]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[digital asset loss]]></category>
		<category><![CDATA[ExVul report]]></category>
		<category><![CDATA[February crypto hacks]]></category>
		<category><![CDATA[FixedFloat Exchange]]></category>
		<category><![CDATA[Four.meme]]></category>
		<category><![CDATA[liquidity manipulation]]></category>
		<category><![CDATA[sandwich attack]]></category>
		<category><![CDATA[SBL token]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[stablecoin laundering]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38675</guid>

					<description><![CDATA[<p>The BNB Chain-based memecoin launch platform Four.Meme has resumed its operations after suffering a sandwich attack that exploited around $120,000 in funds. Security Issue Resolved, Operations Restarted! In an X post dated March 18, Four.Meme announced that its launch function is back online after addressing a security vulnerability. Earlier, it had suspended the function, stating</p>
<p>The post <a href="https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/">Four.Meme Restarted Operation After Attacks!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="280" data-end="448">The <strong data-start="284" data-end="297">BNB Chain</strong>-based memecoin launch platform <strong data-start="329" data-end="342">Four.Meme</strong> has resumed its operations after suffering a sandwich attack that exploited around <strong data-start="426" data-end="438">$120,000</strong> in funds.</p>
<h2 data-start="455" data-end="505">Security Issue Resolved, Operations Restarted!</h2>
<p data-start="507" data-end="731">In an <strong data-start="513" data-end="518">X</strong> post dated <strong data-start="530" data-end="542">March 18</strong>, <strong data-start="544" data-end="557">Four.Meme</strong> announced that its launch function is back online after addressing a security vulnerability. Earlier, it had suspended the function, stating the platform was &#8220;under attack.&#8221;</p>
<p data-start="507" data-end="731"><em><span style="font-size: 14.4px;">&#8220;The launch function has now been resumed after a thorough security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is underway.&#8221;</span></em></p>
<p data-start="735" data-end="950">— <strong data-start="932" data-end="945">Four.Meme</strong> Team</p>
<p data-start="735" data-end="950"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-151397 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/Four.Meme_.png" alt="Four.Meme" width="539" height="555" /></p>
<h2 data-start="957" data-end="1000">$120,000 Sandwich Attack Confirmed!</h2>
<p data-start="1002" data-end="1181">Web3 security firm <strong data-start="1021" data-end="1030">ExVul</strong> reported in a <strong data-start="1045" data-end="1057">March 18</strong> <strong data-start="1058" data-end="1063">X</strong> post that the exploit was a market manipulation tactic known as a sandwich attack, netting the attacker <strong data-start="1168" data-end="1180">$120,000</strong>.</p>
<hr />
<p data-start="1183" data-end="1429"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1183" data-end="1429">According to <strong data-start="1196" data-end="1205">ExVul</strong>, the attacker &#8220;pre-calculated the address for creating the liquidity pool’s trading pair&#8221; and used one of the platform’s functions to purchase tokens. This allowed them to bypass <strong data-start="1385" data-end="1398">Four.Meme</strong>’s token transfer restrictions.</p>
<p data-start="1183" data-end="1429"><em><span style="font-size: 14.4px;">&#8220;Subsequently, the hacker lay in wait for </span><strong style="font-size: 14.4px;" data-start="1475" data-end="1488">Four.Meme</strong><span style="font-size: 14.4px;"> to add liquidity to the transaction, ultimately siphoning off the funds.&#8221;</span></em></p>
<p data-start="1433" data-end="1578">— <strong data-start="1569" data-end="1578">ExVul</strong></p>
<h2 data-start="1585" data-end="1653">CertiK Also Confirms: The Attacker Escaped with 192 BNB!</h2>
<p data-start="1655" data-end="1908">Blockchain security firm <strong data-start="1680" data-end="1690">CertiK</strong> confirmed similar details, stating that the attacker transferred an imbalanced amount of unlaunched tokens to pair addresses before the liquidity pair was created. They then manipulated the price at launch for profit.</p>
<p data-start="1910" data-end="2135">For example, in the case of the <strong data-start="1942" data-end="1955">SBL Token</strong>, the attacker sent a small amount of <strong data-start="1993" data-end="2006">SBL Token</strong> to the pre-calculated pair address, then made a <strong data-start="2055" data-end="2067">21.1 BNB</strong> profit by sandwiching the liquidity addition transaction at launch.</p>
<p data-start="2137" data-end="2330">In total, the attacker walked away with approximately <strong data-start="2191" data-end="2202">192 BNB</strong> (worth about <strong data-start="2216" data-end="2228">$120,000</strong>), which they later sent to the decentralized crypto exchange <strong data-start="2290" data-end="2304">FixedFloat</strong>, according to <strong data-start="2319" data-end="2329">CertiK</strong>.</p>
<p data-start="2137" data-end="2330"><img decoding="async" class="aligncenter wp-image-151396 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/four.meme_.jpeg" alt="Four.Meme" width="1020" height="672" /></p>
<h2 data-start="2337" data-end="2395">Four.Meme Hit by Its Second Exploit in Two Months!</h2>
<p data-start="2397" data-end="2601">This attack marks the second time in two months that the <strong data-start="2454" data-end="2467">Four.Meme</strong> platform has been exploited. The previous attack on <strong data-start="2520" data-end="2535">February 11</strong> resulted in a loss of about <strong data-start="2564" data-end="2576">$183,000</strong> worth of digital assets.</p>
<p data-start="2603" data-end="2796">In the wider crypto industry, <strong data-start="2633" data-end="2645">February</strong> saw <strong data-start="2650" data-end="2667">$1.53 billion</strong> in losses due to scams, exploits, and hacks, with the <strong data-start="2722" data-end="2738">$1.4 billion</strong> <strong data-start="2739" data-end="2748">Bybit</strong> hack accounting for the majority of the losses.</p>
<p data-start="2798" data-end="3089">Blockchain analytics firm <strong data-start="2824" data-end="2839">Chainalysis</strong> reported a total of <strong data-start="2860" data-end="2875">$51 billion</strong> in illicit transaction volume over the past year. This increase is attributed to a professionalized era of crypto crime dominated by AI-powered scams, stablecoin laundering, and efficient cybercriminal syndicates.</p>
<hr />
<p data-start="2798" data-end="3089"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/">Four.Meme Restarted Operation After Attacks!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/four.meme_ce.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/four.meme_ce.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
