An attacker exploited the Cetus Protocol by using spoof tokens to manipulate price curves and reserve calculations, allowing unauthorized extraction of real assets.

Claim

Quotes that support claims

The attacker exploited vulnerabilities in Cetus Protocol’s smart contracts by deploying spoof tokens to manipulate price curves and reserve calculations.
The attacker used spoof tokens to exploit price curves and reserve calculations, manipulating liquidity to extract real assets.

Related projects

Cetus Protocol
SUI

Related topics

Ethics

Referenced by

Technical exploit

Crypto news

Data block