📢 Exclusive on Gate Square — #PROVE Creative Contest# is Now Live!
CandyDrop × Succinct (PROVE) — Trade to share 200,000 PROVE 👉 https://www.gate.com/announcements/article/46469
Futures Lucky Draw Challenge: Guaranteed 1 PROVE Airdrop per User 👉 https://www.gate.com/announcements/article/46491
🎁 Endless creativity · Rewards keep coming — Post to share 300 PROVE!
📅 Event PeriodAugust 12, 2025, 04:00 – August 17, 2025, 16:00 UTC
📌 How to Participate
1.Publish original content on Gate Square related to PROVE or the above activities (minimum 100 words; any format: analysis, tutorial, creativ
The SUI ecosystem project Cetus was attacked for $230 million, with an overflow vulnerability leading to massive losses.
SUI ecosystem project Cetus suffered a $230 million attack, detailed methods and flow of funds.
On May 22, the liquidity provider Cetus on the SUI ecosystem was allegedly attacked, resulting in a significant decrease in liquidity pool depth and a drop in several token trading pairs, with estimated losses exceeding $230 million. Cetus subsequently announced that it has suspended the smart contract and is investigating the incident.
A certain security team quickly intervened to analyze and issued a security alert. Below is a detailed analysis of the attack methods and the funds transfer situation.
Attack Analysis
The core of this attack lies in the attackers carefully constructing parameters, allowing the overflow to occur while bypassing detection, ultimately exchanging a minimal amount of tokens for a substantial amount of liquidity assets. The specific steps are as follows:
The attacker first borrowed a large amount of haSUI through a flash loan, causing the pool price to plummet by 99.90%.
The attacker chose a very narrow price range to establish a liquidity position, with a range width of only 1.00496621%.
Attack Core: The attacker claims to add a huge amount of liquidity, but the system actually only received 1 token A. This is due to an overflow detection bypass vulnerability in the checked_shlw function within the get_delta_a function.
The attacker removes liquidity and gains huge token profits.
The attacker returned the flash loan, netting approximately 10,024,321.28 haSUI and 5,765,124.79 SUI.
Project Party Fix
Cetus has released a patch that primarily fixes the implementation of the checked_shlw function:
Capital Flow Analysis
The attacker profited approximately $230 million, including various assets such as SUI, vSUI, and USDC. The attacker transferred part of the funds to EVM addresses via cross-chain bridges. Specific actions include:
According to Cetus, a total of $162 million in stolen funds has been successfully frozen on SUI.
On EVM chains, the actions of attackers include:
Summary
This attack demonstrates the dangers of mathematical overflow vulnerabilities. The attacker exploited the flaw in the checked_shlw function by making precise calculations and choosing specific parameters, obtaining massive liquidity at a very low cost. Developers should strictly validate the boundary conditions of all mathematical functions in smart contract development to prevent similar vulnerabilities.