According to the Beosin EagleEye security risk monitoring, early warning and blocking platform monitoring of the blockchain security audit company Beosin, the AES project has been hacked. The Beosin security team analyzed and found that because the AES-USDT transaction pair contract has a skim function, this function can force balance the supply of the transaction pair and send the excess funds to the specified address. During this attack, the attacker first directly transferred some AES tokens to the transaction pair, resulting in an unbalanced supply, so that when the skim function is called, the excess tokens will be transferred to the address specified by the attacker , and the attacker specifies the trading pair contract as the receiving address here, so that the redundant AES is sent to the trading pair contract, causing the trading pair contract to remain unbalanced after the forced balance, and the attacker can repeatedly call the forced balance function. In addition, when the transfer function of the AES token contract is called, if the sender sets the transaction pair contract for the contract, a part of AES will be destroyed (equivalent to the deflation token). The AES in the transaction pair was destroyed very little, causing the attacker to use a small amount of AES to exchange a large amount of USDT. At present, the profitable funds have been transferred to the attacker's address (0x85214763f8eC06213Ef971ae29a21B613C4e8E05), and the profit is about 61,608 US dollars.