Cetus suffers a $230 million attack, SUI ecosystem faces severe damage.

Analysis of the $230 Million Attack Incident on Cetus

On May 22, SUI ecosystem liquidity provider Cetus was suspected of being attacked, with multiple trading pairs experiencing significant drops, estimated losses exceeding $230 million. Cetus subsequently announced that it has suspended its smart contracts and is investigating the incident.

The security team quickly intervened to analyze and issued a security alert. Below is a detailed analysis of the attack methods and the situation regarding fund transfers.

Slow Mist: Cetus was hacked for $230 million, analysis of the attack method and fund transfer situation

Attack Analysis

The attacker exploited the system vulnerabilities by carefully constructing parameters to execute an attack that exchanged a minimal amount of tokens for a substantial amount of liquidity assets. The main steps are as follows:

  1. Borrowing a large amount of haSUI through flash loans caused the pool price to plummet by 99.90%.

  2. Open a liquidity position in a very narrow price range, with a range width of only 1.00496621%.

  3. Exploit the overflow detection bypass vulnerability in the checked_shlw of the get_delta_a function to declare adding a huge amount of liquidity but actually only pay 1 token.

  4. The system has a significant deviation in calculating the required haSUI amount, allowing attackers to acquire a large amount of liquidity assets at a very low cost.

  5. Remove liquidity to obtain huge token profits, with a net profit of about 10 million haSUI and 5.76 million SUI after repaying the flash loan.

Slow Fog: Cetus was stolen 230 million USD, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was stolen $230 million, analyzing the attack method and fund transfer situation

Slow Fog: Cetus stolen 230 million USD, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was hacked for 230 million USD, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Project Party Repair Status

Cetus has released a patch that mainly fixes the error mask and judgment conditions in the checked_shlw function, ensuring it can correctly detect overflow situations.

Slow Mist: Cetus stolen 230 million USD, analyzing attack methods and fund transfer situation

Capital Flow Analysis

Attackers profited approximately $230 million, including various assets such as SUI, vSUI, and USDC. Some funds were transferred to EVM addresses via cross-chain bridges, with about $10 million deposited into Suilend, and 24 million SUI transferred to a new address that has not yet been withdrawn.

Fortunately, the SUI Foundation and ecosystem members collaborated to freeze approximately $162 million in stolen funds.

On the EVM receiving address, part of the funds were exchanged for ETH through a DEX, 20,000 ETH was transferred to a new address, and the current balance of that address is 3,244 ETH.

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was stolen $230 million, analyzing the attack methods and fund transfer situation

Slow Fog: Cetus was hacked for 230 million USD, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Mist: Cetus was stolen 230 million USD, analysis of attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing attack methods and fund transfer status

Slow Mist: Cetus was hacked for 230 million USD, analysis of attack methods and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analysis of attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack methods and fund transfer situation

Slow Mist: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Slow Fog: Cetus was hacked for $230 million, analyzing the attack method and fund transfer situation

Summary

This attack highlights the dangers of mathematical overflow vulnerabilities. Developers should rigorously validate the boundary conditions of all mathematical functions in smart contract development to guard against similar precision math attacks.

CETUS-2.17%
SUI0.08%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)