Tuesday, July 1, 2025
banner


The Cetus Protocol that is considered that the largest liquidity provider at Blockchain Sui has experienced security incident 22. May 2025, starting from around 10:30 UTC.

In a few minutes, hackers could withdraw significant amounts of multiple tokens using what seems vulnerability in smart contracts that regulate liquidity. What happens often, vulnerability In decentralized exchanges (DEXS) and automated market producers are used to drain their liquid pool or for price manipulation.

Elliptic calculates that the combined value of the Gender SUI-SUI and other tokens stolen in this exploitation exceeds 200 million dollars, which makes the second largest hack of 2025 dollars in February.

Part of the stolen funds are made up of tokens that have largely fallen in value after theft. Therefore, while some reports suggest that the stolen funds were worth more than $ 260 million just before theft, the exploitator is unlikely to benefit from the full amount.

Monitoring of stolen funds

The exploiter first used Dex to replace the USD to the USD – both trees that are capable of frozen by their publishers, ie.

Together with the USDC but stolen, these funds are then bridged into Ethereum BlockChain and finally replaced the Dexa Group to the Home Property, Eth.

The Elliptical Researcher, with its holistic transactional monitoring opportunities, can be used to identify transactions from the initial exploitation to the SUI on its current location on the Etereum, where a significant part of the funds is yet to be moved.

Source: elliptical investigator.

Elliptical investigators continue to monitor the situation.

How elliptic can help

Elliptic has taken emergency action to ensure that the addresses are linked to this exploitation available to display and trace using our holistic analytical analytical analytics of the next generation. Users will be able to ensure that they do not force inadvertent funds called from – or are sent to – entity or individuals responsible for this stealing.

Our industry leading coverage blockade – Surpasses 50 blocks – It has proven key to ensuring that the decking techniques of the cross-cross and cross-term assets that are currently noticed on hacker washing operations can still be accompanied. Any related risks or exposure to virtual property services, through any blockchain, so it can be detected and prevented in real time.

Found this interesting? Share in your network.



banner
crypto & nft lover

Johnathan DoeCoin

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar.

Follow Me

Top Selling Multipurpose WP Theme

Newsletter

banner

Leave a Comment

crypto & nft lover

John DoeCoin

Learn all about cryptocurrency and NFT, we publish news and interesting fauths from the world of crypto.

@2022 u2013 All Right Reserved. Designed and Developed by Evegal.com