header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

SlowMist Releases Detailed Analysis of $230 Million Cetus Hack

2025-05-24 16:10

BlockBeats News, May 24th, SlowMist officially released an analysis of the Cetus exploit incident, stating that the core of this event was the attacker exploiting a carefully crafted parameter to trigger an overflow that bypassed detection, ultimately being able to exchange a huge amount of liquidity assets with a minimal token amount.


SlowMist stated that the attacker utilized precise parameter selection and exploited a vulnerability in the `checked_shlw` function to obtain liquidity worth billions of dollars at the cost of only 1 token. This was an extremely precise mathematical attack, and the SlowMist security team advised developers to rigorously validate all mathematical function boundary conditions in smart contract development.


Earlier on May 22nd, according to community reports, the liquidity provider Cetus in the SUI ecosystem was suspected to have been attacked, resulting in a significant decrease in liquidity pool depth. Multiple token pairs on Cetus experienced a downturn, with the estimated loss exceeding $230 million. Subsequently, Cetus released a statement acknowledging an incident detected within the protocol, and as a precautionary measure, the smart contract has been temporarily paused while the team conducts an investigation into the event.

举报 Correction/Report
This platform has fully integrated the Farcaster protocol. If you have a Farcaster account, you canLogin to comment
Correction/Report
Submit
Add Library
Visible to myself only
Public
Save
Choose Library
Add Library
Cancel
Finish