Cetus was attacked by hackers, resulting in a loss of $230 million. The SUI Foundation has frozen $162 million.

robot
Abstract generation in progress

Cetus suffered attacks leading to huge losses, analysis of attack methods and fund flow.

On May 22, the liquidity provider Cetus on the SUI ecosystem reportedly suffered an attack, with multiple trading pairs experiencing significant declines, estimated losses exceeding $230 million. Cetus subsequently announced that it has suspended its smart contracts and is investigating the incident.

The security team quickly intervened to analyze the situation. Below is a detailed analysis of the attack methods and the funds transfer situation.

Attack Analysis

Attackers exploit overflow vulnerabilities by carefully crafting parameters to bypass detection, exchanging a minuscule amount of tokens for a massive amount of liquidity assets. The specific steps are as follows:

  1. The attacker borrowed a large amount of haSUI through a flash loan, causing the pool price to plummet by 99.90%.

  2. Open liquidity positions in a very narrow price range, with a width of only 1.00496621%.

  3. Claims to add a large amount of liquidity but only actually pays 1 token. This is the core of the attack, exploiting a vulnerability in the overflow detection of checked_shlw in the get_delta_a function.

  4. The system misjudges the required number of tokens, allowing attackers to exchange a small number of tokens for a large amount of liquidity assets.

  5. The attacker removed liquidity, obtaining a huge token profit, ultimately netting approximately 10 million haSUI and 5.76 million SUI.

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Project Party Repair Status

Cetus has released a fix patch, mainly correcting the checked_shlw function:

  • Correct the error mask to the correct threshold
  • Adjust judgment conditions
  • Ensure correct detection of overflows that may be caused by left shifts.

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Capital Flow Analysis

Attackers profited approximately $230 million, including various assets such as SUI, vSUI, and USDC. Some funds were transferred to EVM addresses through cross-chain bridges. The specific flow is as follows:

  • Approximately $10 million deposited into Suilend
  • 24 million SUI transferred to the new address, not yet transferred out.
  • Transfer USDC, SOL, suiETH, etc. to EVM addresses through cross-chain bridges.
  • The funds on the EVM address are partially exchanged for ETH.
  • 20000 ETH transferred to new address

Slow Mist: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was stolen 230 million dollars, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was stolen 230 million USD, analyzing the attack method and fund transfer situation

Slow Mist: Cetus stolen $230 million, analysis of attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analysis of the attack method and fund transfer situation

Slow Fog: Cetus was stolen 230 million USD, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was hacked for 230 million USD, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was stolen 230 million USD, analysis of attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was stolen 230 million USD, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analysis of attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Currently, the SUI Foundation claims to have successfully frozen $162 million of stolen funds.

Summary

This attack fully demonstrates the dangers of mathematical overflow vulnerabilities. Developers should strictly validate all boundary conditions of mathematical functions in smart contract development to prevent similar attacks.

CETUS-1.23%
SUI-1.98%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
FloorSweepervip
· 08-07 23:19
Another chain is gone, gm
View OriginalReply0
ApeWithAPlanvip
· 08-04 23:58
Another major vulnerability is really ridiculous.
View OriginalReply0
StrawberryIcevip
· 08-04 23:58
Sui is gone again, truly one wave hasn't settled before another rises.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)