![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
CETUS协议是SUI区块链上最大的分散交换和流动性平台,遭受了毁灭性的剥削,导致损失
The DeFi world was rocked today by the exploit of Cetus Protocol, a leading decentralized exchange and liquidity platform on the Sui blockchain. In an attack that began on May 22, 2025, hackers stole digital assets worth more than $223 million from Cetus.
Defi World今天被SUI区块链上领先的分散交流和流动性平台CETUS协议的漏洞震撼。在2025年5月22日开始的一次袭击中,黑客从Cetus偷走了价值超过2.23亿美元的数字资产。
The exploit, which involved the creation of spoof tokens and the abuse of liquidity pool mechanics, is one of the most significant DeFi breaches in recent times and has triggered widespread disruption across the nascent Sui ecosystem.
涉及创建欺骗令牌和滥用流动性池机械师的漏洞利用是近来最重大的违规行为之一,并且在新生的SUI生态系统中引发了广泛的破坏。
It is the latest in a series of major crypto theft incidents, including the $71 million theft from the STEPN move-to-earn protocol in January 2025 and the $41 million theft from the Animoca Brands Ronin Network in November 2024.
这是一系列重大加密盗窃案中的最新事件中的最新事件,包括2025年1月的Stepn移居欧文协议的7100万美元盗窃,以及2024年11月的Animoca Brands Ronin Network的4100万美元盗窃。
According to reports by several blockchain analytics firms, the Cetus Protocol exploit began with the insertion of spoof tokens into the protocol’s liquidity pools.
根据几家区块链分析公司的报道,CETUS协议的利用始于将欺骗令牌插入协议的流动性池中。
One analysis by Chainalysis identified a key spoof token used in the attack as “BULLA.” Commencing with an initial deposit of 100,000 BULLA tokens, the hackers engaged in a series of rapid transactions to inflate the token’s value.
一项通过链分析的分析确定了在攻击中用作“ Bulla”的关键欺骗令牌。从初始存款开始的100,000个Bulla代币开始,黑客进行了一系列快速交易,以膨胀令牌的价值。
Cetus’s automated market maker (AMM), a core engine of the exchange, was manipulated by these actions. In the process of attempting to maintain price equilibrium, the protocol executed asset swaps that exchanged SUI and USDC tokens for BULLA at unbalanced rates.
CETUS的自动化做市商(AMM)是交易所的核心引擎,被这些行动操纵。在试图维持价格均衡的过程中,该协议执行了以不平衡的价格将SUI和USDC代币交换为Bulla的资产掉期。
As a result, the hackers were able to withdraw SUI and USDC tokens in disproportionately large amounts, while the liquidity providers who engaged in these trades sustained significant losses.
结果,黑客能够以不成比例的大量撤回SUI和USDC令牌,而从事这些行业的流动性提供者却遭受了巨大的损失。
CoinDesk reported that the exploit also involved vulnerabilities in the pricing oracle used by Cetus. This enabled the malicious actors to distort price feeds on the platform, further aiding them in their gains and rendering internal risk mechanisms at Cetus largely ineffective.
Coindesk报告说,该利用还涉及Cetus使用的定价甲骨文中的漏洞。这使恶意演员能够在平台上扭曲价格供应,从而进一步帮助他们获得收益,并在CETUS的内部风险机制基本上无效。
According to reports by Behainal and email correspondence from Cetus, the exploit was premeditated and technically sophisticated. It involved several layers of vulnerabilities that were carefully prepared for and exploited over a period of several weeks.
根据CETUS的Behainal和电子邮件信件的报道,该漏洞利用是有预谋和技术精致的。它涉及几层漏洞,这些漏洞是在几周的时间内精心准备和利用的。
The primary stage of the exploit is believed to have started on May 10, 2025, with the generation of the spoof tokens and their integration into Cetus’s smart contracts.
据信,漏洞利用的主要阶段是在2025年5月10日开始的,随着欺骗令牌的产生及其整合到Cetus的智能合约中。
Later, on May 22, 2025, the main phase of the exploit unfolded as the hackers rapidly executed a series of transactions to manipulate the AMM and siphon off funds.
后来,2025年5月22日,当黑客迅速执行一系列交易以操纵AMM和Siphon资金时,剥削的主要阶段展开了。
In total, the hackers executed around 300 transactions within a short time frame, which suggests that they might have been using bots or other automated tools to carry out the exploit undetected until the damage was already done.
总的来说,黑客在短时间内执行了大约300次交易,这表明他们可能一直在使用机器人或其他自动化工具来执行未检测到的漏洞利用,直到损坏已经造成损坏为止。
The immediate aftermath of the breach saw a dramatic market response. CETUS, the native token of the platform, plummeted more than 40%. Other Sui-based tokens, such as LOFI and Hippo, saw losses of over 80%, and the USDC stablecoin on Sui briefly lost its peg, dipping to $0.99.
违规后的直接后果产生了巨大的市场反应。平台的本地令牌Cetus暴跌了40%以上。其他基于SUI的令牌,例如Lofi和Hippo,损失超过80%,SUI上的USDC Stablecoin短暂失去了钉子,降至0.99美元。
Cetus’s total value locked (TVL) also took a hit, plunging by over $200 million as investors quickly pulled out their liquidity.
CETUS的总价值锁定(TVL)也受到了打击,随着投资者迅速撤出流动性,超过2亿美元。
The breach has also had wider implications for the nascent Sui ecosystem, raising concerns about the security of DeFi protocols on newer chains and the speed at which they are able to respond to critical vulnerabilities.
违规行为还对新生的SUI生态系统产生了更广泛的影响,引起了人们对Fefi协议对新链的安全性以及他们能够对关键漏洞做出响应的速度的担忧。
Liquidity providers on Sui rapidly withdrew their funds, exacerbating price slippage and destabilising token markets. Cross-chain bridges involving Sui assets also came under increased scrutiny as some services paused transactions to prevent potential contagion from the Cetus exploit.
SUI的流动性提供商迅速撤回了资金,加剧了价格滑倒和不稳定的令牌市场。涉及SUI资产的跨链桥梁也受到了越来越多的审查,因为某些服务停止了交易,以防止CETUS漏洞的潜在传染。
In response to the crisis, Cetus Protocol has announced the complete suspension of all smart contracts and the launch of an internal investigation in collaboration with the Sui Foundation and other key stakeholders. The team is actively pursuing options for recovering the stolen funds.
为了应对危机,CETUS协议宣布了与SUI基金会和其他主要利益相关者合作的所有智能合约的完全暂停和内部调查。该团队正在积极寻求恢复被盗资金的选择。
According to reports by several blockchain analytics firms, the primary address involved in the exploit is 0xe28b50. This wallet is currently known to hold 12.9 million SUI tokens, valued at $54 million. A portion of the stolen funds has already been liquidated into other assets.
根据几家区块链分析公司的报道,利用中涉及的主要地址为0xE28B50。目前,该钱包持有1,290万个Sui代币,价值5400万美元。一部分被盗资金已经被清算到其他资产中。
Cetus has also extended a $6 million bounty to the hacker, offering immunity from legal action if the stolen coins are returned. This white-hat recovery approach, though controversial, reflects the urgency and magnitude of the loss.
Cetus还向黑客延长了600万美元的赏金,如果返回被盗硬币,则可以免于法律行动。这种白帽恢复方法虽然有争议,但反映了损失的紧迫性和幅度。
Going forward, Cetus will be undergoing a complete security audit and overhaul of its codebase. Its developers will be working to patch the vulnerabilities that were exploited in the attack, and third-party firms will be brought in to conduct independent reviews of the protocol’s smart contracts.
展望未来,Cetus将对其代码库进行完整的安全审核和大修。其开发人员将努力修补攻击中利用的漏洞,并将引入第三方公司以对协议的智能合约进行独立的审查。
This incident is likely to spark broader reforms in how DeFi protocols approach oracle security, token whitelisting procedures, and smart contract validation.
这一事件可能会引发更广泛的改革,即Fefi协议如何接近Oracle安全性,doken白名单程序和智能合同验证。
The Sui Foundation is also expected to introduce new standards and guidelines for the purpose of preventing
还期望SUI基金会引入新的标准和准则,以防止
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
-
-
-
-
-
-
-
- 中国会改变对比特币(BTC)采矿的立场吗?
- 2025-06-08 03:45:12
- 本文回顾了有关美国在比特币采矿业的统治地位的最新发展以及包括唐纳德·特朗普总统征收的政治压力如何影响中国的政策。
-