An unverified contract was attacked by a flash loan, involving an amount of approximately $108,000
ChainCatcher message, CertiK Alert reports that a flash loan attack has been detected. The attacker exploited the unprotected depositBNB() function in the unverified contract 0x2d70d62deb1cb9918ff6be7bb5d173e8cd4ad854 to exchange 226 BNB for ADACash, profiting through sandwich trading. The attack involved an amount of approximately $108,000.CertiK Alert states that the funds associated with the 0x2d address are suspected to be related to the rug-pull incident of earnhubBSC from late 2021 to early 2022.