Trusta AI smart contract exploit leads to TA token crash days after launch
The post Trusta AI smart contract exploit leads to TA token crash days after launch appeared on BitcoinEthereumNews.com.
Trusta AI (TA) tokens became the target of a liquidity pool exploit, just hours after the asset launched on Binance Alpha. TA slid as the attackers staged a fake liquidity pool. Blocksec Phantom intercepted worrying transfers from an unknown smart contract on BNB Smart Chain, as Trusta AI tokens appear to be crashing due to a smart contract attack. The contract caused a series of TA token transactions, with initial losses estimated at around $600K. After the initial attack, the losses stopped at around $615K. Investigators were unable to pinpoint the exact content of the contract, as it was not open source. Blocksec Phantom advises BNB Smart Chain users to revoke permission for the flawed contract. Until permission is revoked, the wallets remain exposed and may be drained of other assets. Any wallet that interacted with the rogue contract is at risk of losing its balances. ALERT! Our system has detected a series of malicious transactions targeting an unverified contract (0x16d7c6f43df19778e382b7a84bcb8c763971a551) on the Binance Smart Chain (BSC), with losses exceeding $600K. Since the contract is not open-source, our investigation indicates the… — BlockSec Phalcon (@Phalcon_xyz) July 23, 2025 The attack happened just a day after the TA trading launch, where the token reached $63M trading volumes as the latest Binance Alpha selection. Trusta AI attacked by rogue smart contract According to Certik, the attacker created two smart contracts that spoofed Trusta AI trading, making users pay exorbitant fees. The attackers then traded TA on legitimate liquidity pools. The rogue contract was generated two days ago and credited with only 0.3 BNB. As a result, TA sank to $0.09, down from an initial price of $0.17. The token is still in early price discovery, and it remains uncertain how much of the selling was due to the exploit, and what part was…