Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Breach

The full story behind the $260 million breach
NFT Gaming

The full story behind the $260 million breach

by admin May 23, 2025



What triggered the $260 million Cetus Protocol hack, and how did the Sui exploit spread into a chain-wide crisis?

Cetus Protocol hack wipes $260M in latest Sui exploit

On May 22, Cetus Protocol (CETUS), the primary decentralized exchange and liquidity provider on the Sui (SUI) blockchain, experienced a major security breach. The exploit drained an estimated $223 million, triggering an immediate disruption in DeFi activity across the Sui ecosystem.

Since its 2023 launch, Cetus has become a core part of Sui’s infrastructure, enabling token swaps and yield farming for more than 62,000 active users and generating over $7.15 million in daily trading fees.

SUI, the native token of the Sui blockchain, fell sharply from $4.19 to $3.62 as of this writing on May 23, a nearly 14% drop within a day.

SUI price chart | Source: crypto.news

CETUS, the native token of the affected protocol, declined from $0.26 to $0.15 during the immediate aftermath of the breach. Its current price of $0.17 marks only a partial recovery.

Tokens across the wider ecosystem reacted with similar volatility. Memecoins native to Sui, including LOFI, HIPPO, SQUIRT, SLOVE, and MEMEFI, saw losses ranging from 51% to 97%. Although prices have stabilized since, investor confidence remains shaky.

Among the top 15 assets listed on Cetus, more than 75% of total value was erased. Some tokens, such as LBTC and AXOLcoin, saw their prices collapse to near zero.

The broader impact went beyond token prices. Sui’s total value loced dropped from $2.13 billion to $1.92 billion at the time of writing, reflecting a contraction in a matter of hours.

Let’s understand how the exploit was carried out, what structural flaws it exposed, and how the community is preparing its response.

Sui hacker triggers liquidity drain on Cetus Protocol

The breach targeting the Cetus Protocol began in the early hours of May 22. At 3:52 AM PT (11:52 UTC), blockchain monitors detected irregular movements in the SUI/USDC liquidity pool, initially flagged as a possible $11 million outflow.

Ongoing investigation quickly expanded the scope, revealing that total losses across multiple pools may have ranged around $260 million.

The attack focused on a vulnerability in the smart contract system behind Cetus’s pricing mechanism.

At the core was the protocol’s oracle design, responsible for feeding real-time price data into the platform to enable fair trading across token pairs. In this case, the oracle served as the entry point for the exploit.

The wallet address involved, identified as “0xe28b50,” deployed spoof tokens such as BULLA to manipulate pricing curves and distort reserve balances.

Although these tokens carried little real liquidity, they were used to skew internal pool metrics, making valuable assets like SUI and USDC appear undercollateralized. After destabilizing the pricing logic, the attacker extracted real tokens from the pools without contributing proportional value.

On-chain analysts tracked the attacker moving around $63 million in USDC from Sui to Ethereum (ETH) in the hours following the exploit.

🚨 Cetus Protocol Exploit

As @d0rsky shared, @CetusProtocol liquidity pools were likely drained using a spoof token and near-zero liquidity inputs, exploiting potential miscalculations in pool math.

$63M has already been bridged to Ethereum:https://t.co/sIi1pqlPNl https://t.co/umjoczpsxB pic.twitter.com/HR6YMP7qgj

— Hacken🇺🇦 (@hackenclub) May 22, 2025

Conversion data showed that $58.3 million was swapped for 21,938 ETH at an average rate of $2,658 per coin. The pace of execution, estimated at roughly $1 million per minute, pointed to a coordinated and pre-planned operation.

Cetus initially referred to the issue as an “oracle bug,” a term that drew immediate scrutiny from developers and security experts. The scale and precision of the exploit raised doubts about that framing.

Cetus coin exposed in Sui exploit

The root of the Cetus breach wasn’t a single line of malicious code, but a structural flaw in how the protocol managed pricing and pool logic.

Cetus used an internal oracle system that depended on concentrated liquidity pool data to generate real-time price feeds. The intention was to reduce reliance on external oracles and limit vulnerability to outside manipulation. In doing so, however, the mechanism introduced new risks.

The vulnerability centered on the “addLiquidity,” “removeLiquidity,” and “swap” functions within the smart contracts. These functions were built to calculate token ratios and pool values, but failed to properly validate inputs when interacting with assets that held little or no economic value.

The attacker exploited this gap by introducing spoof tokens such as BULLA, which imitated the structure of legitimate assets but had no real liquidity or pricing history.

Introducing these tokens into the pool distorted the automated calculations that governed how much value could be added or removed, effectively allowing manipulation of the protocol’s internal accounting.

Using these spoofed assets, the attacker provided almost no real liquidity while extracting significant amounts of SUI and USDC at artificially favorable rates.

Cybersecurity firms classified the incident as a textbook example of oracle manipulation, where the protocol’s internal design became its own vulnerability.

The scale of the damage was reflected in transaction volumes. On-chain activity on Cetus surged from $320 million on May 21 to $2.9 billion on May 22, showing how quickly funds were moved and swapped once the exploit began.

Move, the programming language used for building on Sui, includes security protections that guard against low-level threats like reentrancy. In this case, the failure occurred above the language layer.

Smart contract execution was not the issue. The contracts performed exactly as instructed — the real problem was that those instructions were permitted at all.

Cetus had no filters or verification steps to ensure only tokens with actual liquidity could influence pricing. It lacked safeguards to reject assets with no market validation.

No caps were enforced on price deviation during short windows, and no circuit breakers were present to pause abnormal activity once volumes began spiking.

Once the spoof tokens entered and distorted the pricing engine, the rest of the system followed through exactly as designed — ultimately enabling the exploit to unfold without resistance.

Sui hack freeze raises decentralization doubts

Cetus moved quickly to contain the damage once the exploit was identified. Smart contract operations were paused around 4:00 AM PT on May 22 to prevent further outflows from the protocol.

A public statement followed shortly after on the project’s official X account, acknowledging the incident and pledging a full investigation. As of May 23, no detailed post-mortem has been released.

A broader response unfolded across the Sui ecosystem. The Sui Foundation, in coordination with validators and key partners, blacklisted the attacker’s addresses and froze approximately $162 million worth of stolen assets on the Sui network.

🚨ANNOUNCEMENT

As of earlier today, we have confirmed that an attacker has stolen approximately $223M from Cetus Protocol. We have took immediate action to lock our contract preventing further theft of funds.

$162M of the compromised funds have been successfully paused. We are…

— Cetus🐳 (@CetusProtocol) May 22, 2025

Efforts to recover the remaining funds, estimated between $60 million and $98 million, have encountered challenges. Roughly $60 million to $63 million in USDC was bridged out of Sui and converted into 21,938 ETH shortly after the exploit.

To encourage the return of the funds, Cetus has extended a $6 million white-hat bounty offer. The proposal targeted the converted ETH and included a firm condition: any attempt to launder or off-ramp the assets would void the offer. No response from the attacker has been made public as of now.

Tracing efforts have involved multiple cybersecurity firms and regulatory bodies. Inca Digital is leading the negotiation process, with forensic support from Hacken and PeckShield.

The Sui Foundation has also coordinated with agencies including FinCEN and the U.S. Department of Defense to explore additional recovery and legal options.

Exchange support has been mixed. Binance founder Changpeng Zhao expressed solidarity on X and confirmed that Binance is assisting with recovery coordination, although no technical interventions or account freezes have been publicly confirmed.

We are doing what we can to help SUI. Not a pleasant situation. Hope everyone stay SAFU!

— CZ 🔶 BNB (@cz_binance) May 22, 2025

The wallet freeze triggered a broader discussion around decentralization. Several users on X highlighted that Sui validators coordinated to block transactions from the attacker’s addresses, freezing over $160 million in assets.

SUI froze $160M from the Cetus hacker, on-chain, out of over $220M. The $60M gap was bridged to ETH.

While this is good in this case, this shows SUI network can freeze your funds on demand.

Decentralization is just marketing outside of BTC/ETH. pic.twitter.com/IO9b4h3NUq

— Duo Nine ⚡ YCC (@DU09BTC) May 22, 2025

While effective in this instance, the move raised concerns about how much control validators can exercise over network behavior.

Critics argue that such coordination challenges the principle of decentralization and suggests validator-driven censorship is possible, raising doubts over whether networks like Sui are truly decentralized or only claim to be.

Disclosure: This article does not represent investment advice. The content and materials featured on this page are for educational purposes only.





Source link

May 23, 2025 0 comments
0 FacebookTwitterPinterestEmail
Decrypt logo
GameFi Guides

Coinbase Data Breach Will ‘Lead to People Dying,’ TechCrunch Founder Says

by admin May 20, 2025



In brief

  • TechCrunch founder Michael Arrington has claimed that a recent data breach at Coinbase “will lead to people dying.”
  • Arrington’s claim comes amid a wave of kidnap attempts targeting high-net-worth crypto holders.
  • Former Coinbase CTO Balaji Srinivasan argued that the fault lies with state-mandated KYC data collection.

The founder of online news publication TechCrunch has claimed that Coinbase’s recent data breach “will lead to people dying,” amid a wave of kidnap attempts targeting high-net-worth crypto holders.

TechCrunch founder Michael Arrington added that this should be a point of reflection for regulators to re-think the importance of know-your-customer (KYC), a process that requires users to confirm their identity to a platform. He also called for prison time for executives that fail to “adequately protect” customer information.

I am a long time investor in and champion of @coinbase. Something that has to be said though – this hack – which includes home addresses and account balances – will lead to people dying. It probably has already. The human cost, denominated in misery, is much larger than the $400m… pic.twitter.com/ruSYKAGH7x

— Michael Arrington 🏴‍☠️ (@arrington) May 19, 2025

“This hack—which includes home addresses and account balances—will lead to people dying. It probably has already,” he tweeted. “The human cost, denominated in misery, is much larger than the $400 million or so they think it will actually cost the company to reimburse people.”

On Thursday, Coinbase announced that cybercriminals tried to blackmail the exchange into paying $20 million in Bitcoin over the stolen customer data—which it refused to pay. Instead, the company put out a $20 million award for any information that would lead to the “arrest and conviction” of the attackers. The crypto exchange has also pledged to reimburse any customers that were tricked into sending funds to the attackers.

The U.S. Justice Department has since opened a probe into the data breach, Bloomberg later reported.

But for Arrington, who also founded venture capital firm CrunchFund and hedge fund Arrington Capital, this isn’t enough. He believes that people are in immediate physical danger following the breach, which exposed data including names, addresses, phone numbers, emails, government-ID images, and more.

Arrington said that he was a “long time” investor in Coinbase but did not respond to Decrypt’s request for comment in what capacity this investment was made. Coinbase also did not respond to Decrypt’s request for comment.

Crypto kidnap attempts

A number of high-profile kidnapping attempts has heightened concerns over the safety of crypto owners with significant holdings.

In January, Ledger co-founder David Balland was abducted from his home in France alongside his wife. The pair were held captive for roughly 24 hours, with the kidnappers “mutilating” Balland’s hand as part of their ransom demand, before local law enforcement recovered the executive and his wife.

In March, popular streamer and OnlyFans personality Kaitlyn “Amouranth” Siragusa was the victim of a home invasion by three armed attackers who physically assaulted her while ordering her to transfer her Bitcoin to them. She managed to fire her gun, causing the attackers to flee the scene.

In May, the father of a crypto millionaire was rescued by French authorities after being held hostage for days—but not without having his finger severed by the kidnappers. A week later there was an attempted but failed kidnapping of a woman and her child, relatives of a leading figure in France’s crypto industry.

As a result of these and other incidents, an Amsterdam-based physical security firm told Bloomberg that it had noticed an uptick in clients with large crypto holdings, prior to the Coinbase breach.

The risks of KYC data

Arrington believes that in the wake of these attacks, crypto companies that handle user data need to be much more careful than they currently are.

“Combining these KYC laws with corporate profit maximization and lax laws on penalties for hacks like these means these issues will continue to happen,” he tweeted. “Both governments and corporations need to step up to stop this. As I said, the cost can only be measured in human suffering.”

I disagree the problem is execs. The problem is the state.

The state forces companies to collect KYC data that they do not want to collect. This issue is much bigger than crypto, and regulation is the actual thing to target.

With ZK, no need for KYC.https://t.co/kszGEy2tuZ

— Balaji (@balajis) May 20, 2025

Former Coinbase chief technology officer Balaji Srinivasan pushed back on Arrington’s position that executives should be punished, arguing that regulators are forcing KYC onto unwilling companies.

“When enough people die, the laws may change,” Arrington hit back.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.





Source link

May 20, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (98)
  • Esports (76)
  • Game Reviews (81)
  • Game Updates (88)
  • GameFi Guides (96)
  • Gaming Gear (96)
  • NFT Gaming (90)
  • Product Reviews (97)
  • Uncategorized (1)

Recent Posts

  • Ethereum stalls despite new BTC ATH; Shiba Inu whales are buying this new ICO
  • Polygon co-founder Mihailo Bjelic steps down, community calls it a ‘Big L’
  • People are tricking AI chatbots into helping commit crimes
  • Publicly Traded Semler Scientific Buys More Bitcoin as Law Firm Targets Company
  • Elden Ring Nightreign director says Fromsoft “kind of overlooked and neglected” playing as a duo, but 2 player-friendly “post-launch support” is being considered

Recent Posts

  • Ethereum stalls despite new BTC ATH; Shiba Inu whales are buying this new ICO

    May 24, 2025
  • Polygon co-founder Mihailo Bjelic steps down, community calls it a ‘Big L’

    May 24, 2025
  • People are tricking AI chatbots into helping commit crimes

    May 24, 2025
  • Publicly Traded Semler Scientific Buys More Bitcoin as Law Firm Targets Company

    May 24, 2025
  • Elden Ring Nightreign director says Fromsoft “kind of overlooked and neglected” playing as a duo, but 2 player-friendly “post-launch support” is being considered

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Ethereum stalls despite new BTC ATH; Shiba Inu whales are buying this new ICO

    May 24, 2025
  • Polygon co-founder Mihailo Bjelic steps down, community calls it a ‘Big L’

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close