-
Notifications
You must be signed in to change notification settings - Fork 127
[Security] Report rogue USDW/USDT pool — LP theft attack on BSC #2360
Copy link
Copy link
Open
Description
Security Report: Unauthorized Rogue LP Pools — USDW Token
Date: 2026-04-01
Chain: BNB Smart Chain (BSC)
Token: USD DWIN (USDW) — \nReference: USDW-INC-2026-0401-001
Summary
Automated bot addresses created unauthorized liquidity pools on SushiSwap pairing USDW with USDT/USDC at manipulated price ratios. When legitimate liquidity was added, the bots drained all USDT/USDC from the LP positions by swapping cheap USDW tokens.
Rogue Pools on SushiSwap
| Pool Address | Pair |
|---|---|
| USDT/USDW (V3) |
Attacker Addresses
| Address | Role |
|---|---|
| LP Drainer Bot | |
| LP Drainer Funder (Binance) | |
| MEV Trigger (50K txs) | |
| MEV Master Operator (316K txs) | |
| MEV Executor #1 | |
| MEV Executor #2 | |
| MEV Executor #3 |
Evidence
- Pool creation TX: BscScan
- Attacker funded from: Binance Exchange Withdrawal (KYC traceable)
- MEV bot network: 50K+ automated transactions
Request
- Flag/remove the rogue pools listed above from the SushiSwap UI
- Block the attacker addresses from creating new pools
- Warn users about these manipulated pools
Reported by Dwin Intertrade Company Limited — contact@dwinintertrade.com
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels