According to Beosin EagleEye platform monitoring, the Jumpnfinance project Rugpull. The attack transaction is 0x48333962e6e946748a26d6222db95ce97e76c9ed3917123a7c9f2731f896b72c. The Beosin security team analyzed and found that the attacker first called the 0x6b1d9018() function of the 0xe156 contract, extracted the user assets in the contract, and stored them at the attacker’s address (0xd3de02b1af100217a4bc9b45d70ff2a5c1816982). At present, 2,100 BNB ($581,700) of the stolen funds have been transferred to Tornado.Cash, and the remaining 2,058 BNB ($571,128) are still stored in the attacker's address, and the Beosin security team will continue to track.