Market Cap: $3.4254T 0.810%
Volume(24h): $101.3627B 5.110%
  • Market Cap: $3.4254T 0.810%
  • Volume(24h): $101.3627B 5.110%
  • Fear & Greed Index:
  • Market Cap: $3.4254T 0.810%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$109411.229943 USD

1.33%

ethereum
ethereum

$2553.606862 USD

1.74%

tether
tether

$1.000428 USD

0.03%

xrp
xrp

$2.341860 USD

1.08%

bnb
bnb

$670.830787 USD

0.73%

solana
solana

$176.268506 USD

2.27%

usd-coin
usd-coin

$0.999984 USD

0.02%

dogecoin
dogecoin

$0.225741 USD

1.45%

cardano
cardano

$0.759061 USD

2.46%

tron
tron

$0.271465 USD

0.76%

hyperliquid
hyperliquid

$39.035037 USD

15.53%

sui
sui

$3.603805 USD

-0.02%

chainlink
chainlink

$15.624041 USD

1.75%

avalanche
avalanche

$23.308658 USD

2.19%

stellar
stellar

$0.287205 USD

0.67%

Cryptocurrency News Articles

SlowMist Uncovers How Cetus Lost $230M in Sophisticated Smart Contract Exploit

May 26, 2025 at 06:01 am

Blockchain security firm SlowMist has published a detailed technical breakdown of the $230 million exploit that targeted Cetus, a key liquidity provider on the SUI ecosystem.

SlowMist Uncovers How Cetus Lost $230M in Sophisticated Smart Contract Exploit

The essence of the Cetus exploit lies in the misusage of the checked_shlw function during a liquidity addition operation. This function, designed for efficient multiplication in assembly code, has a limitation when dealing with large numbers, specifically in the context of a modular arithmetic system.

As explained by SlowMist, "In essence, the modular arithmetic system used in blockchain smart contracts operates within a limited range of numbers. When an operation, such as multiplication, results in a sum exceeding this range, a remainder is calculated by dividing the product by the modulus. This remainder, in turn, becomes the final result of the modular multiplication."

The researchers further noted that "the checked_shlw function is meant to perform a left shift and multiply operation, checking for overflow in the process. However, in a scenario where a very large multiplier is used with a small multiplicand, the multiplication itself might not overflow, but the addition of the original multiplicand to the final product might."

This anomaly, according to SlowMist, was exploited by the attacker to exchange just one token for an outsized share of liquidity, ultimately draining the pools.

"This was a precision-engineered mathematical exploit. The attacker exploited the edge cases of a vulnerable math function to extract liquidity worth billions from the protocol," the researchers concluded.

The incident led to a sharp decline in token pair values and liquidity depth across Cetus. In response, the Cetus team suspended the smart contract to prevent further loss and launched a full investigation.

SlowMist has advised developers to pay closer attention to boundary conditions in smart contract development. The firm highlighted that even low-level math operations require rigorous validation to prevent similar vulnerabilities.

"The exploitation of the checked_shlw function's behavior in specific boundary conditions to perform an addition operation and trigger an overflow in the final step of the liquidity addition operation is a sophisticated technique that underscores the importance of meticulous coding practices in blockchain security," the researchers said.

As of now, Cetus continues to work with third-party security experts to patch the exploit and assess recovery options. This attack adds to a growing list of high-profile DeFi breaches in 2025, highlighting the risks associated with complex on-chain protocols.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on May 26, 2025