🎉 #Gate Alpha 3rd Points Carnival & ES Launchpool# Joint Promotion Task is Now Live!
Total Prize Pool: 1,250 $ES
This campaign aims to promote the Eclipse ($ES) Launchpool and Alpha Phase 11: $ES Special Event.
📄 For details, please refer to:
Launchpool Announcement: https://www.gate.com/zh/announcements/article/46134
Alpha Phase 11 Announcement: https://www.gate.com/zh/announcements/article/46137
🧩 [Task Details]
Create content around the Launchpool and Alpha Phase 11 campaign and include a screenshot of your participation.
📸 [How to Participate]
1️⃣ Post with the hashtag #Gate Alpha 3rd
Cetus suffered an attack resulting in a loss of $230 million, raising alarm bells for the security of the SUI ecosystem.
Cetus Attacked, Loss Exceeds $230 Million
On May 22, the SUI ecosystem liquidity provider Cetus allegedly suffered an attack, with multiple trading pairs experiencing significant declines and the liquidity pool depth sharply decreasing, with estimated losses exceeding $230 million. Cetus subsequently issued a statement saying that it has suspended the smart contract and is investigating the incident.
The security team conducted an in-depth analysis of the attack, revealing the specific methods used by the attackers.
Attack Analysis
Attackers exploited system vulnerabilities by carefully constructing parameters to achieve operations that exchanged a very small amount of tokens for a huge amount of liquidity. The specific steps are as follows:
Borrowing a large amount of haSUI through flash loans caused the pool price to plummet by 99.90%.
Open liquidity positions in a very narrow price range, with a range width of only 1.00496621%.
Declares to add a huge amount of liquidity, but actually pays only 1 token A. This is the core of the attack, exploiting the overflow detection bypass vulnerability in the checked_shlw function of get_delta_a.
The system has a serious deviation when calculating the required haSUI amount, leading to a misjudgment that allows attackers to exchange a minimal amount of Tokens for a large quantity of liquidity assets.
Finally, remove liquidity to obtain huge token profits and complete the attack.
Project Party Fix
After the attack, Cetus quickly released a patch. The main fix addressed the error mask and judgment conditions in the checked_shlw function, ensuring that it can correctly detect situations that may lead to overflow.
Capital Flow Analysis
Attackers profited approximately $230 million, including various assets such as SUI, vSUI, and USDC. Some funds were transferred to EVM addresses via cross-chain bridges. Approximately $10 million in assets were deposited into Suilend, and 24 million SUI were transferred to a new address and have not yet been withdrawn.
Fortunately, the SUI Foundation and other relevant parties have successfully frozen approximately $162 million of the stolen funds on the SUI chain.
On the EVM chain, the attacker exchanged part of the funds for ETH and transferred 20,000 ETH to a new address. Currently, the balance of that address on Ethereum is 3,244 ETH.
Summary
This attack fully demonstrates the power of mathematical overflow vulnerabilities. The attacker achieved substantial profits by precisely calculating and selecting parameters, exploiting function defects in the smart contract. This serves as a reminder to developers that they must rigorously validate all boundary conditions of mathematical functions during contract development to prevent similar attacks.