Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

full

Jamie Crawley
Crypto Trends

Crypto Lender Ledn Goes Full Bitcoin Maxi as It Seeks to Reduce Client Asset Risk

by admin May 23, 2025



Cryptocurrency lender Ledn is removing support for ether

and will begin offering a bitcoin-only loan model starting July 1 as it looks to simplify its product and sharpen its focus around bitcoin .

The Cayman Islands-registered company may be attempting to broaden its appeal among the corners of the crypto community that say BTC is the only cryptocurrency that is needed. Such BTC advocates are often referred to as “Bitcoin Maxis.”

“With our new hyper-focus on Bitcoin-only lending, we’re going back to our roots and principles that inspired Bitcoin to begin with,” co-founder Adam Reeds said in an emailed announcement on Friday.

Ledn will also stop lending client assets to generate yield as it seeks to remove risk from its business model. Bitcoin offered to Ledn as collateral for loans will remain fully in its custody or that of its partners, Ledn said.

“Traditional finance relies on constantly reusing client assets to create leverage and, ultimately, inflation,” Reeds said. “Bitcoiners instinctively reject that model.”

Cryptocurrency lending was a major casualty of crypto winter in 2022, with the companies including BlockFi, Voyager, Celsius and Genesis going to the wall.

Ledn managed to survive and is now attempting to resurrect the BTC-backed lending sector, with its simplified product offering and helped by the friendlier regulatory approach to crypto in the U.S, co-founder Mauricio Di Bartolomeo told CoinDesk in a recent interview.



Source link

May 23, 2025 0 comments
0 FacebookTwitterPinterestEmail
The full story behind the $260 million breach
NFT Gaming

The full story behind the $260 million breach

by admin May 23, 2025



What triggered the $260 million Cetus Protocol hack, and how did the Sui exploit spread into a chain-wide crisis?

Cetus Protocol hack wipes $260M in latest Sui exploit

On May 22, Cetus Protocol (CETUS), the primary decentralized exchange and liquidity provider on the Sui (SUI) blockchain, experienced a major security breach. The exploit drained an estimated $223 million, triggering an immediate disruption in DeFi activity across the Sui ecosystem.

Since its 2023 launch, Cetus has become a core part of Sui’s infrastructure, enabling token swaps and yield farming for more than 62,000 active users and generating over $7.15 million in daily trading fees.

SUI, the native token of the Sui blockchain, fell sharply from $4.19 to $3.62 as of this writing on May 23, a nearly 14% drop within a day.

SUI price chart | Source: crypto.news

CETUS, the native token of the affected protocol, declined from $0.26 to $0.15 during the immediate aftermath of the breach. Its current price of $0.17 marks only a partial recovery.

Tokens across the wider ecosystem reacted with similar volatility. Memecoins native to Sui, including LOFI, HIPPO, SQUIRT, SLOVE, and MEMEFI, saw losses ranging from 51% to 97%. Although prices have stabilized since, investor confidence remains shaky.

Among the top 15 assets listed on Cetus, more than 75% of total value was erased. Some tokens, such as LBTC and AXOLcoin, saw their prices collapse to near zero.

The broader impact went beyond token prices. Sui’s total value loced dropped from $2.13 billion to $1.92 billion at the time of writing, reflecting a contraction in a matter of hours.

Let’s understand how the exploit was carried out, what structural flaws it exposed, and how the community is preparing its response.

Sui hacker triggers liquidity drain on Cetus Protocol

The breach targeting the Cetus Protocol began in the early hours of May 22. At 3:52 AM PT (11:52 UTC), blockchain monitors detected irregular movements in the SUI/USDC liquidity pool, initially flagged as a possible $11 million outflow.

Ongoing investigation quickly expanded the scope, revealing that total losses across multiple pools may have ranged around $260 million.

The attack focused on a vulnerability in the smart contract system behind Cetus’s pricing mechanism.

At the core was the protocol’s oracle design, responsible for feeding real-time price data into the platform to enable fair trading across token pairs. In this case, the oracle served as the entry point for the exploit.

The wallet address involved, identified as “0xe28b50,” deployed spoof tokens such as BULLA to manipulate pricing curves and distort reserve balances.

Although these tokens carried little real liquidity, they were used to skew internal pool metrics, making valuable assets like SUI and USDC appear undercollateralized. After destabilizing the pricing logic, the attacker extracted real tokens from the pools without contributing proportional value.

On-chain analysts tracked the attacker moving around $63 million in USDC from Sui to Ethereum (ETH) in the hours following the exploit.

🚨 Cetus Protocol Exploit

As @d0rsky shared, @CetusProtocol liquidity pools were likely drained using a spoof token and near-zero liquidity inputs, exploiting potential miscalculations in pool math.

$63M has already been bridged to Ethereum:https://t.co/sIi1pqlPNl https://t.co/umjoczpsxB pic.twitter.com/HR6YMP7qgj

— Hacken🇺🇦 (@hackenclub) May 22, 2025

Conversion data showed that $58.3 million was swapped for 21,938 ETH at an average rate of $2,658 per coin. The pace of execution, estimated at roughly $1 million per minute, pointed to a coordinated and pre-planned operation.

Cetus initially referred to the issue as an “oracle bug,” a term that drew immediate scrutiny from developers and security experts. The scale and precision of the exploit raised doubts about that framing.

Cetus coin exposed in Sui exploit

The root of the Cetus breach wasn’t a single line of malicious code, but a structural flaw in how the protocol managed pricing and pool logic.

Cetus used an internal oracle system that depended on concentrated liquidity pool data to generate real-time price feeds. The intention was to reduce reliance on external oracles and limit vulnerability to outside manipulation. In doing so, however, the mechanism introduced new risks.

The vulnerability centered on the “addLiquidity,” “removeLiquidity,” and “swap” functions within the smart contracts. These functions were built to calculate token ratios and pool values, but failed to properly validate inputs when interacting with assets that held little or no economic value.

The attacker exploited this gap by introducing spoof tokens such as BULLA, which imitated the structure of legitimate assets but had no real liquidity or pricing history.

Introducing these tokens into the pool distorted the automated calculations that governed how much value could be added or removed, effectively allowing manipulation of the protocol’s internal accounting.

Using these spoofed assets, the attacker provided almost no real liquidity while extracting significant amounts of SUI and USDC at artificially favorable rates.

Cybersecurity firms classified the incident as a textbook example of oracle manipulation, where the protocol’s internal design became its own vulnerability.

The scale of the damage was reflected in transaction volumes. On-chain activity on Cetus surged from $320 million on May 21 to $2.9 billion on May 22, showing how quickly funds were moved and swapped once the exploit began.

Move, the programming language used for building on Sui, includes security protections that guard against low-level threats like reentrancy. In this case, the failure occurred above the language layer.

Smart contract execution was not the issue. The contracts performed exactly as instructed — the real problem was that those instructions were permitted at all.

Cetus had no filters or verification steps to ensure only tokens with actual liquidity could influence pricing. It lacked safeguards to reject assets with no market validation.

No caps were enforced on price deviation during short windows, and no circuit breakers were present to pause abnormal activity once volumes began spiking.

Once the spoof tokens entered and distorted the pricing engine, the rest of the system followed through exactly as designed — ultimately enabling the exploit to unfold without resistance.

Sui hack freeze raises decentralization doubts

Cetus moved quickly to contain the damage once the exploit was identified. Smart contract operations were paused around 4:00 AM PT on May 22 to prevent further outflows from the protocol.

A public statement followed shortly after on the project’s official X account, acknowledging the incident and pledging a full investigation. As of May 23, no detailed post-mortem has been released.

A broader response unfolded across the Sui ecosystem. The Sui Foundation, in coordination with validators and key partners, blacklisted the attacker’s addresses and froze approximately $162 million worth of stolen assets on the Sui network.

🚨ANNOUNCEMENT

As of earlier today, we have confirmed that an attacker has stolen approximately $223M from Cetus Protocol. We have took immediate action to lock our contract preventing further theft of funds.

$162M of the compromised funds have been successfully paused. We are…

— Cetus🐳 (@CetusProtocol) May 22, 2025

Efforts to recover the remaining funds, estimated between $60 million and $98 million, have encountered challenges. Roughly $60 million to $63 million in USDC was bridged out of Sui and converted into 21,938 ETH shortly after the exploit.

To encourage the return of the funds, Cetus has extended a $6 million white-hat bounty offer. The proposal targeted the converted ETH and included a firm condition: any attempt to launder or off-ramp the assets would void the offer. No response from the attacker has been made public as of now.

Tracing efforts have involved multiple cybersecurity firms and regulatory bodies. Inca Digital is leading the negotiation process, with forensic support from Hacken and PeckShield.

The Sui Foundation has also coordinated with agencies including FinCEN and the U.S. Department of Defense to explore additional recovery and legal options.

Exchange support has been mixed. Binance founder Changpeng Zhao expressed solidarity on X and confirmed that Binance is assisting with recovery coordination, although no technical interventions or account freezes have been publicly confirmed.

We are doing what we can to help SUI. Not a pleasant situation. Hope everyone stay SAFU!

— CZ 🔶 BNB (@cz_binance) May 22, 2025

The wallet freeze triggered a broader discussion around decentralization. Several users on X highlighted that Sui validators coordinated to block transactions from the attacker’s addresses, freezing over $160 million in assets.

SUI froze $160M from the Cetus hacker, on-chain, out of over $220M. The $60M gap was bridged to ETH.

While this is good in this case, this shows SUI network can freeze your funds on demand.

Decentralization is just marketing outside of BTC/ETH. pic.twitter.com/IO9b4h3NUq

— Duo Nine ⚡ YCC (@DU09BTC) May 22, 2025

While effective in this instance, the move raised concerns about how much control validators can exercise over network behavior.

Critics argue that such coordination challenges the principle of decentralization and suggests validator-driven censorship is possible, raising doubts over whether networks like Sui are truly decentralized or only claim to be.

Disclosure: This article does not represent investment advice. The content and materials featured on this page are for educational purposes only.





Source link

May 23, 2025 0 comments
0 FacebookTwitterPinterestEmail
WizKids offers full refund on Baldur’s Gate 3 minis
Game Updates

WizKids offers full refund on Baldur’s Gate 3 minis

by admin May 20, 2025


WizKids is offering refunds for its Baldur’s Gate 3 miniature set after fans criticized the quality of the pre-painted figurines. The $50 D&D Icons of the Realms: Baldur’s Gate 3 set, which includes the six origin characters as well as Withers, drew backlash over its paint jobs, which lack detail and precision according to photos posted by customers.

WizKids acknowledged the situation in a statement, saying it “seeks to create products that enhance and add to the enjoyment of game play,” but that “unfortunately, we missed the mark on this goal.” To remedy the situation, customers who bought the set directly from WizKids can request a refund through the company’s customer service email. Those who purchased the set from a local retailer can seek a refund at that point of sale. There is also a product replacement option available through WizKids’ website for anyone who wishes to roll the dice again with WizKids.

Images of the melty-faced miniatures have been circulating online recently since they were sent out. A senior cinematic artist for Larian Studios who worked on Baldur’s Gate 3 took to X to share the disappointing distortion from expectations to reality. For some, the melty pre-painted faces were not the biggest cause for concern, because the miniature set they received didn’t even have a head for Shadowheart!

The set’s quality issues are surely disappointing for Baldur’s Gate 3 fans who were hoping for collectible-quality figures of the game’s beloved cast. Although seven pre-painted figures for $50 is not that expensive in the hobby, even those with modest expectations have been surprised by how poorly they turned out. For others, though, these flawed minis might end up as collectibles in their own right. Misprints and errors have occasionally gained value over time in other collectible hobbies, and with refunds and replacements already underway, the original run of these figures could ironically become a desired oddity for collectors.



Source link

May 20, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (96)
  • Esports (75)
  • Game Reviews (81)
  • Game Updates (86)
  • GameFi Guides (94)
  • Gaming Gear (94)
  • NFT Gaming (88)
  • Product Reviews (96)
  • Uncategorized (1)

Recent Posts

  • Nintendo Switch 2 will support regular USB mice in at least one game
  • Teenage Mutant Ninja Turtles: Tactical Takedown Review – Splitting Up The Family
  • Prices Head Lower as Trade War Heats Up
  • DGX B200 Blackwell node sets world record, breaking over 1,000 TPS/user
  • Dungeon RNG codes (May 2025)

Recent Posts

  • Nintendo Switch 2 will support regular USB mice in at least one game

    May 24, 2025
  • Teenage Mutant Ninja Turtles: Tactical Takedown Review – Splitting Up The Family

    May 24, 2025
  • Prices Head Lower as Trade War Heats Up

    May 24, 2025
  • DGX B200 Blackwell node sets world record, breaking over 1,000 TPS/user

    May 24, 2025
  • Dungeon RNG codes (May 2025)

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Nintendo Switch 2 will support regular USB mice in at least one game

    May 24, 2025
  • Teenage Mutant Ninja Turtles: Tactical Takedown Review – Splitting Up The Family

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close