SlowMist releases analysis of the $230 million Cetus theft: hackers used a very small amount of tokens to exchange for huge amounts of liquid assets
SlowMist released an analysis of the theft of 230 million US dollars in Cetus. It pointed out that the core of this incident is that the attacker carefully constructed parameters to cause overflow but bypass detection, and ultimately exchange a huge amount of liquidity assets with a very small amount of tokens. The core reason is the existence of an overflow detection bypass vulnerability in the checked_shlw in the get_delta_a function. The attacker took advantage of this to cause a serious deviation in the calculation of how much haSUI needs to be added to the system. Due to the undetected overflow, the system misjudged the amount of haSUI needed, allowing the attacker to exchange a large amount of liquidity assets with very few tokens, thus achieving the attack.
This attack demonstrates the power of mathematical overflow vulnerabilities. Attackers use precise calculations to select specific parameters, exploit the flaws in the checked_shlw function, and obtain liquidity worth tens of billions at the cost of 1 token. This is an extremely precise mathematical attack, and developers are advised to rigorously verify all boundary conditions of mathematical functions in smart contract development.
免責事項:本記事の内容はあくまでも筆者の意見を反映したものであり、いかなる立場においても当プラットフォームを代表するものではありません。また、本記事は投資判断の参考となることを目的としたものではありません。
こちらもいかがですか?
ETH 10周年記念イベント - Bitgetコミュニティカーニバル
[新規上場] BitgetがNERO Chain(NERO)を上場!参加して65,000,000 NEROの山分けを獲得しよう
[新規上場] BitgetがDePHY(PHY)を上場!参加して6,600,000 PHYの山分けを獲得しよう
先物取引と取引BotにSLPUSDTが登場
トレンド
もっと見る暗号資産価格
もっと見る








