Market Cap: $3.8815T 3.280%
Volume(24h): $163.6243B 26.450%
  • Market Cap: $3.8815T 3.280%
  • Volume(24h): $163.6243B 26.450%
  • Fear & Greed Index:
  • Market Cap: $3.8815T 3.280%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$116775.692537 USD

1.94%

ethereum
ethereum

$3899.572429 USD

6.59%

xrp
xrp

$3.346387 USD

12.37%

tether
tether

$1.000217 USD

0.00%

bnb
bnb

$784.339372 USD

2.13%

solana
solana

$175.109322 USD

4.81%

usd-coin
usd-coin

$0.999858 USD

0.00%

dogecoin
dogecoin

$0.222511 USD

9.11%

tron
tron

$0.337344 USD

-0.35%

cardano
cardano

$0.790863 USD

7.37%

stellar
stellar

$0.457363 USD

15.05%

hyperliquid
hyperliquid

$40.872611 USD

7.79%

sui
sui

$3.775493 USD

8.99%

chainlink
chainlink

$18.745050 USD

12.76%

bitcoin-cash
bitcoin-cash

$576.424663 USD

1.17%

Cryptocurrency News Articles

SlowMist Uncovers How Cetus Lost $230M in Sophisticated Smart Contract Exploit

May 26, 2025 at 06:01 am

Blockchain security firm SlowMist has published a detailed technical breakdown of the $230 million exploit that targeted Cetus, a key liquidity provider on the SUI ecosystem.

SlowMist Uncovers How Cetus Lost $230M in Sophisticated Smart Contract Exploit

The essence of the Cetus exploit lies in the misusage of the checked_shlw function during a liquidity addition operation. This function, designed for efficient multiplication in assembly code, has a limitation when dealing with large numbers, specifically in the context of a modular arithmetic system.

As explained by SlowMist, "In essence, the modular arithmetic system used in blockchain smart contracts operates within a limited range of numbers. When an operation, such as multiplication, results in a sum exceeding this range, a remainder is calculated by dividing the product by the modulus. This remainder, in turn, becomes the final result of the modular multiplication."

The researchers further noted that "the checked_shlw function is meant to perform a left shift and multiply operation, checking for overflow in the process. However, in a scenario where a very large multiplier is used with a small multiplicand, the multiplication itself might not overflow, but the addition of the original multiplicand to the final product might."

This anomaly, according to SlowMist, was exploited by the attacker to exchange just one token for an outsized share of liquidity, ultimately draining the pools.

"This was a precision-engineered mathematical exploit. The attacker exploited the edge cases of a vulnerable math function to extract liquidity worth billions from the protocol," the researchers concluded.

The incident led to a sharp decline in token pair values and liquidity depth across Cetus. In response, the Cetus team suspended the smart contract to prevent further loss and launched a full investigation.

SlowMist has advised developers to pay closer attention to boundary conditions in smart contract development. The firm highlighted that even low-level math operations require rigorous validation to prevent similar vulnerabilities.

"The exploitation of the checked_shlw function's behavior in specific boundary conditions to perform an addition operation and trigger an overflow in the final step of the liquidity addition operation is a sophisticated technique that underscores the importance of meticulous coding practices in blockchain security," the researchers said.

As of now, Cetus continues to work with third-party security experts to patch the exploit and assess recovery options. This attack adds to a growing list of high-profile DeFi breaches in 2025, highlighting the risks associated with complex on-chain protocols.

Original source:coindoo

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Aug 09, 2025