A fresh exploit on Binance Smart Chain has again put the LML protocol under the spotlight for how DeFi platforms manage pricing and staking rewards.
Attacker drains $950,000 from LML/USDT pool on BSC
A staking protocol on Binance Smart Chain suffered a major exploit that targeted the LML/USDT liquidity pool, leading to losses of about $950,000. Security firm BlockSec detected the incident through its Phalcon monitoring system, which flagged suspicious activity on the network.
Moreover, the firm disclosed that its systems had raised an alert hours before the loss estimate of roughly $950K was confirmed. However, the victim contract is not open source, which limits public code-level analysis and leaves investigators relying on transaction traces and on-chain behavior.
BlockSec stated that its review pointed to a likely pricing design flaw. In other words, the exploit did not appear to stem from a classic reentrancy bug, but from how the protocol calculated and applied token prices when distributing staking rewards.
How the price manipulation scheme unfolded
The attacker executed a structured plan. First, the exploiter used large swaps in the LML liquidity pool to push up the token’s quoted price. These trades created a sharp, temporary spike in the pool price, without reflecting genuine market demand or long-term value.
Next, the attacker turned to several pre-funded wallets that had already deposited funds into the BSC staking contract linked to LML. These addresses were all under the exploiter’s control. That said, from the protocol’s perspective they looked like independent users participating in normal staking activity.
While the artificially elevated price persisted, those wallets claimed staking rewards from the contract. Because the reward mechanism referenced the inflated price, payouts surged far beyond what the deposits would normally earn. Finally, the attacker sold the acquired tokens at higher prices, completing the profit cycle and monetizing the manipulated conditions.
The core design flaw inside the LML reward model
The central weakness came from how the BSC-based staking system calculated rewards. It relied on one pricing reference for reward distribution, while using another for actual trading. More specifically, it appears that rewards were based on a snapshot or internal average price that did not update in real time.
However, the attacker offloaded LML tokens using the live market price in the liquidity pool. This created a mismatch between the stale price used for rewards and the current price used for swaps. Exploiters could therefore inflate the live pool price and still claim rewards tied to earlier, misaligned calculations, turning the pricing gap directly into profit.
This structural issue meant the staking logic effectively allowed both price views to be exploited at once. The lml protocol became vulnerable because it did not tightly couple reward accounting with robust, manipulation-resistant price data across its components.
Expert recommendations and the role of oracles
Security specialists reviewing the incident argue that stronger pricing infrastructure could have blocked or limited the attack. In particular, many point to the importance of time-weighted average price (TWAP) feeds or resilient oracle systems that smooth out short-lived price spikes.
Moreover, using TWAP oracles can make it significantly harder for attackers to profit from brief manipulations in a single liquidity pool. By averaging prices over a set window, TWAP-based rewards become less sensitive to sudden swings driven by one or a few transactions, especially when combined with sanity checks or rate limits.
Experts also suggest implementing stricter validation rules before large reward claims are processed. That said, such checks must balance security with user experience, ensuring genuine users do not face excessive friction when collecting legitimate staking income.
Why DeFi remains exposed to recurring price attacks
Price manipulation is a recurring theme in decentralized finance, particularly when protocols depend heavily on local liquidity pool quotes. Many designs still treat these on-chain prices as authoritative, even though they can be skewed through large trades or the use of flash loans within a single block.
As a result, attackers can recycle similar playbooks across multiple projects. They identify protocols where sensitive operations, such as lending, liquidations, or reward calculations, rely on easily manipulated price feeds. However, the pace of innovation in DeFi often outstrips the implementation of hardened security architectures and robust testing scenarios.
Recent months have seen several comparable exploits reported across different chains and assets. This pattern underscores a systemic challenge: as capital and users flow into new protocols, many teams still underestimate the complexity of secure on-chain pricing and incentive design.
Implications for users and builders on Binance Smart Chain
For users, the exploit is a clear reminder that high staking yields can mask deep structural risks. Before locking tokens into a contract, it is essential to understand whether the underlying reward logic depends on prices that can be manipulated locally on a single pool.
Developers and protocol designers face an even sharper lesson. Strong pricing mechanisms are no longer optional add-ons; they are core infrastructure. Projects on BSC and other chains must invest in resilient oracles, simulation-based testing, and code audits that specifically focus on price-linked reward mechanisms.
Moreover, teams should test their systems under adversarial conditions, including extreme volatility, illiquid markets, and coordinated multi-wallet activity like that seen in this attack. Integrating circuit breakers or caps on reward outflows during abnormal price movements can further reduce potential damage.
Broader takeaways for the DeFi ecosystem
This latest LML-related exploit is not just about one staking pool or a single token. It highlights a broader need for smarter, defense-in-depth security strategies across the DeFi landscape. As protocols scale and interconnect, the ripple effects of pricing failures can spread quickly.
In summary, the BSC incident shows how design oversights in reward calculation and price sourcing can be weaponized into a price manipulation attack. If projects adopt robust oracle designs, better testing, and stricter safeguards, the industry can reduce the frequency and impact of such events while preserving innovation.

2 hours ago
10









English (US) ·