📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
Cetus suffered an attack with a loss of $230 million, and $162 million of the stolen funds have been frozen.
Gate News bot message, according to the analysis report released by the Slow Mist team, the Cetus protocol was attacked, with the attacker exploiting the overflow detection flaw in the checked_shlw function to carry out the attack.
The attacker first borrowed haSUI through a flash loan, and then exploited a system vulnerability to exchange a large amount of liquidity using only 1 token. This attack caused a loss of approximately $230 million, involving various digital assets such as SUI, vSUI, and USDC.
The attacker transferred part of the funds to an EVM address via the Sui Bridge and deposited $10 million in assets into Suilend. Currently, the SUI Foundation has frozen $162 million of the stolen funds. Cetus has completed the vulnerability fix, and the SlowMist team recommends that developers strictly verify the boundary conditions of mathematical functions.
Source: Wu Says
Original link