Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

$223 Million Stolen in Cetus Protocol Hack

Posted on May 28, 2025May 28, 2025 By CWS

A vulnerability within the sensible contract for liquidity swimming pools allowed hackers to steal roughly $223 million in digital property from cryptocurrency alternate Cetus Protocol.

The incident occurred on Could 22 and led to Cetus instantly pausing its sensible contract, however not earlier than the hackers have been capable of siphon each native SUI tokens and different tokens.

The attackers exploited a vulnerability in an open supply library used within the liquidity supplier’s sensible contract, manipulated pool costs, and proceeded to empty token reserves, repeating the method a number of instances, Cetus explains in a autopsy report.

“By manipulating the pool’s tick and liquidity mechanisms, the attacker efficiently drained a good portion of property throughout a number of iterations of the exploit,” it notes.

The hackers first swapped USDT to USDC, two stablecoins issued by Tether and Circle, respectively, then bridged to the Ethereum blockchain and transformed the funds to the native asset, blockchain analytics agency Elliptic says.

Cetus recognized two SUI pockets addresses managed by the attackers, in addition to two Ethereum Wallets storing parts of the stolen funds, after they have been transformed.

The hackers stole roughly $223 million, however Cetus mentioned it managed to freeze $162 million of the property. This makes the incident the second largest crypto heist of the 12 months, after the $1.5 billion Bybit hack.

“We’re working with the Sui Basis and different ecosystem members proper now on next-step options, with the purpose of recovering the remaining stolen funds,” Cetus mentioned.Commercial. Scroll to proceed studying.

The agency provided the hackers a “whitehat settlement”: they will maintain $6 million as a bounty, in the event that they return the remainder of the stolen Ethereum and SUI property.

Cetus notes that it has been working with its companions on a restoration plan, aiming to revive liquidity withdrawals and different performance as quickly as doable.

Late Monday, the alternate mentioned it had plans in place that will absolutely reimburse for the misplaced property.

“Utilizing our money and token treasuries, we are actually ready to totally cowl the stolen property at the moment off-chain if the locked funds are recovered by way of the upcoming neighborhood vote,” the corporate posted on X. “ This features a important mortgage from the Sui Basis, making a 100% restoration for all affected customers doable.”

Associated: FBI Says North Korea Hacked Bybit as Particulars of $1.5B Heist Emerge

Associated: German Authorities Take Down Crypto Swapping Service eXch

Associated: North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Distant Management’ Function

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Security Week News Tags:Cetus, Hack, Million, Protocol, Stolen

Post navigation

Previous Post: 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
Next Post: How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

Related Posts

Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News
Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News
Russian APT Hits Ukrainian Government With New Malware via Signal Security Week News
Cybersecurity M&A Roundup: 44 Deals Announced in July 2025 Security Week News
Empirical Security Raises $12 Million for AI-Driven Vulnerability Management Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News