An attacker exploited the Cetus Protocol by using spoof tokens to manipulate price curves and reserve calculations, allowing unauthorized extraction of real assets.
Claim
Quotes that support claims
The attacker exploited vulnerabilities in Cetus Protocol’s smart contracts by deploying spoof tokens to manipulate price curves and reserve calculations.
The attacker used spoof tokens to exploit price curves and reserve calculations, manipulating liquidity to extract real assets.
Related projects
Cetus Protocol
SUI
Related topics
Ethics
Referenced by
Technical exploit
Crypto news
Data block