Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

$223 Million Stolen in Cetus Protocol Hack

Posted on May 28, 2025May 28, 2025 By CWS

A vulnerability within the sensible contract for liquidity swimming pools allowed hackers to steal roughly $223 million in digital property from cryptocurrency alternate Cetus Protocol.

The incident occurred on Could 22 and led to Cetus instantly pausing its sensible contract, however not earlier than the hackers have been capable of siphon each native SUI tokens and different tokens.

The attackers exploited a vulnerability in an open supply library used within the liquidity supplier’s sensible contract, manipulated pool costs, and proceeded to empty token reserves, repeating the method a number of instances, Cetus explains in a autopsy report.

“By manipulating the pool’s tick and liquidity mechanisms, the attacker efficiently drained a good portion of property throughout a number of iterations of the exploit,” it notes.

The hackers first swapped USDT to USDC, two stablecoins issued by Tether and Circle, respectively, then bridged to the Ethereum blockchain and transformed the funds to the native asset, blockchain analytics agency Elliptic says.

Cetus recognized two SUI pockets addresses managed by the attackers, in addition to two Ethereum Wallets storing parts of the stolen funds, after they have been transformed.

The hackers stole roughly $223 million, however Cetus mentioned it managed to freeze $162 million of the property. This makes the incident the second largest crypto heist of the 12 months, after the $1.5 billion Bybit hack.

“We’re working with the Sui Basis and different ecosystem members proper now on next-step options, with the purpose of recovering the remaining stolen funds,” Cetus mentioned.Commercial. Scroll to proceed studying.

The agency provided the hackers a “whitehat settlement”: they will maintain $6 million as a bounty, in the event that they return the remainder of the stolen Ethereum and SUI property.

Cetus notes that it has been working with its companions on a restoration plan, aiming to revive liquidity withdrawals and different performance as quickly as doable.

Late Monday, the alternate mentioned it had plans in place that will absolutely reimburse for the misplaced property.

“Utilizing our money and token treasuries, we are actually ready to totally cowl the stolen property at the moment off-chain if the locked funds are recovered by way of the upcoming neighborhood vote,” the corporate posted on X. “ This features a important mortgage from the Sui Basis, making a 100% restoration for all affected customers doable.”

Associated: FBI Says North Korea Hacked Bybit as Particulars of $1.5B Heist Emerge

Associated: German Authorities Take Down Crypto Swapping Service eXch

Associated: North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Distant Management’ Function

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Security Week News Tags:Cetus, Hack, Million, Protocol, Stolen

Post navigation

Previous Post: 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
Next Post: How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

Related Posts

vBulletin Vulnerability Exploited in the Wild Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities Security Week News
Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities Security Week News
Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News