💞 #Gate Square Qixi Celebration# 💞
Couples showcase love / Singles celebrate self-love — gifts for everyone this Qixi!
📅 Event Period
August 26 — August 31, 2025
✨ How to Participate
Romantic Teams 💑
Form a “Heartbeat Squad” with one friend and submit the registration form 👉 https://www.gate.com/questionnaire/7012
Post original content on Gate Square (images, videos, hand-drawn art, digital creations, or copywriting) featuring Qixi romance + Gate elements. Include the hashtag #GateSquareQixiCelebration#
The top 5 squads with the highest total posts will win a Valentine's Day Gift Box + $1
Cetus was attacked by hackers, resulting in a loss of $230 million. The SUI Foundation has frozen $162 million.
Cetus suffered attacks leading to huge losses, analysis of attack methods and fund flow.
On May 22, the liquidity provider Cetus on the SUI ecosystem reportedly suffered an attack, with multiple trading pairs experiencing significant declines, estimated losses exceeding $230 million. Cetus subsequently announced that it has suspended its smart contracts and is investigating the incident.
The security team quickly intervened to analyze the situation. Below is a detailed analysis of the attack methods and the funds transfer situation.
Attack Analysis
Attackers exploit overflow vulnerabilities by carefully crafting parameters to bypass detection, exchanging a minuscule amount of tokens for a massive amount of liquidity assets. The specific steps are as follows:
The attacker borrowed a large amount of haSUI through a flash loan, causing the pool price to plummet by 99.90%.
Open liquidity positions in a very narrow price range, with a width of only 1.00496621%.
Claims to add a large amount of liquidity but only actually pays 1 token. This is the core of the attack, exploiting a vulnerability in the overflow detection of checked_shlw in the get_delta_a function.
The system misjudges the required number of tokens, allowing attackers to exchange a small number of tokens for a large amount of liquidity assets.
The attacker removed liquidity, obtaining a huge token profit, ultimately netting approximately 10 million haSUI and 5.76 million SUI.
Project Party Repair Status
Cetus has released a fix patch, mainly correcting the checked_shlw function:
Capital Flow Analysis
Attackers profited approximately $230 million, including various assets such as SUI, vSUI, and USDC. Some funds were transferred to EVM addresses through cross-chain bridges. The specific flow is as follows:
Currently, the SUI Foundation claims to have successfully frozen $162 million of stolen funds.
Summary
This attack fully demonstrates the dangers of mathematical overflow vulnerabilities. Developers should strictly validate all boundary conditions of mathematical functions in smart contract development to prevent similar attacks.