PANews reported on May 24 that SlowMist released an analysis of the Cetus theft incident. The core of this incident was that the attacker carefully constructed parameters to cause overflow but bypass detection, and ultimately exchanged a huge amount of liquid assets for a very small amount of tokens. The attacker took advantage of the defect of the checked_shlw function to obtain a variety of assets including SUI, vSUI, USDC, etc. at the cost of 1 token. The attacker transferred part of the funds (USDC, SOL, etc.) to the EVM address through Sui Bridge and other cross-chains. And deposited $10 million in assets in Suilend. Currently, $162 million in stolen funds have been frozen by the SUI Foundation. Cetus has fixed the vulnerability, and SlowMist recommends that developers strictly verify the boundary conditions of mathematical functions.
According to previous news , Cetus confirmed that hackers stole approximately US$223 million and has frozen US$162 million of stolen funds.
