Blockchain Security Firm released seat -hack post mortem report

Blockchain Security firm Deadb released a post -mortem report on the Cetus decentralized exchange hack, in which the root cause of the attack was identified as exploitation of liquidity parameters used by CETUS automated market maker (AMM), which was inflamed by a code “overflow” check.

As ReportHackers exploited a defect in the most important bits (MSB) investigation, allowing them to manipulate values ​​for liquidity parameters by order of magnitude and to establish relatively large positions with keystrokes. Dedaub security researchers wrote:

“This allowed them to add massive liquidity conditions with just one unit of token input, later the pool collectively has hundreds of crores of dollars tokens in draining.”

The event and post mortem updates reflect the unfortunate tendency Cyber ​​security exploitation and hack To affect Crypto and Web 3 industries.

Officials in the industry have constantly warned that industry firms should set up security measures and protect users before closing regulators and implement security measures on the industry.

Hackers, cybercrime, cyber security, hack
Fair MSB check. Source: Deadb

Connected: Lucky twice? Cetus recovering scheme on Sui reflects a solana bluprint

Cetus decentralized exchange hacked, deficit $ 223 million trigger

On 22 May, Cetus exchange was hackedUser’s loss causes $ 223 million within a 24 -hour period.

CETUS and Sui Foundation also announced that Sui network verification Freeze the majority of stolen property,

According to the CETUS team, $ 223 million was frozen at $ 223 million by verifications and ecosystems partners on the same day as hack.

The response attracts allegations of criticisms and centralization

The decision to freeze the stolen funds attracted mixed responses from the Crypto community, Decentralization advocates criticizing advocates To step into and control the chain.

“SUI verifications are actively sensoring transactions in blockchain,” a user wrote On X, many other positions echo.

Hackers, cybercrime, cyber security, hack
Source: Needle

“It completely reduces the principles of decentralization and transforms the network into nothing more than a centralized, permitted database,” the post continued.

“It is interesting that despite borrowing the ethos of bitcoin, how many web 3 projects supported by VCS are heavy on centralization,” Steve Boyer wrote on 23 May on 23 May. Post,

magazine: Fake Rabi Wallet Scam is connected to Dubai Crypto CEO and many more victims