
Cetus Protocol on Sui dangles $6M carrot to hacker post $223M heist!
Date: 2025-05-23 04:35:24 | By Mabel Fairchild
Cetus Protocol's $6 Million Bounty: A Race Against Time to Recover $223M Hack
Hacker's Identity Revealed, Whitehat Settlement Proposed
Holy crypto heist, Batman! Cetus Protocol, the heavyweight champ of decentralized exchanges on the Sui blockchain, just threw down a $6 million bounty to the mastermind behind a jaw-dropping $223 million exploit on May 22. In a bold move, the Cetus team not only identified the hacker's Ethereum wallet but also sent an on-chain message with a "whitehat settlement" offer. The deal? Return 20,920 ETH and all frozen Sui (SUI) assets, and you get to keep 2,324 ETH (about $6 million) and a get-out-of-jail-free card.
Time's Ticking: The Stakes Are High
This ain't no leisurely stroll, folks. Cetus made it crystal clear: this offer's got an expiration date. If those funds get off-ramped or mixed, the deal's toast. And they're not messing around—they've got law enforcement, cybercrime gurus, the Sui Foundation, and heavy hitters like FinCEN and the U.S. Department of Defense on speed dial. Inca Digital, the cybersecurity rockstars, are leading the charge in these high-stakes negotiations.
The Heist: A Masterclass in Exploiting Vulnerabilities
So, how'd they pull it off? The attacker found a chink in Cetus' armor—a vulnerability in its pricing mechanism, specifically the concentrated liquidity market maker pools. They used slick spoof tokens, those crafty fakes with manipulated metadata, to sneak tiny amounts of liquidity into the trading pools. It was a genius move that threw the internal accounting into chaos, allowing the hacker to snatch valuable tokens like SUI and USD Coin (USDC) at wildly incorrect rates.
A Carefully Orchestrated Attack
It was like watching a high-stakes heist movie unfold. The attacker timed their spoof token deposits perfectly, using complex flash swaps and price manipulation to trick the system into thinking the pools were balanced. Boom—massive real assets drained without putting in equivalent value. It's the kind of thing that keeps DeFi developers up at night.
Security Audits: Not Always Enough
Here's the kicker: Cetus had passed recent security audits with flying colors before this went down. But this wasn't your run-of-the-mill code error. The attacker exploited internal pricing logic and economic assumptions, slipping through the cracks of typical vulnerability scans. It's a wake-up call for the entire DeFi space.
The Aftermath: A Trail of Chaos
After snagging $11 million from an SUI/USDC pool, the hacker went full throttle, bridging over $60 million in stolen funds to Ethereum and snagging more than 21,900 ETH. Right now, their wallets are bursting with millions of SUI, ETH, and stablecoins. The Sui ecosystem's been left reeling—smaller tokens like AXOL, HIPPO, and SQUIRT are practically worthless, SUI tanked up to 15%, and CETUS, Cetus' own token, took a 20–33% hit. Trading volumes went through the roof as users scrambled to pull their funds.
Cetus' Response and the Broader Implications
Cetus slammed the brakes on its smart contracts post-hack and is now in full-on fortress mode, trying to lock down its platform. But this incident's got the whole DeFi community buzzing. It's shining a harsh light on the security of protocols on newer chains like Sui and Aptos (APT). Sure, they're all about pushing the boundaries of innovation, but as analysts are quick to point out, vulnerabilities in complex DeFi logic are still a ticking time bomb waiting to go off.

Disclaimer
The information provided on HotFart is for general informational purposes only. All information on the site is provided in good faith, however we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability or completeness of any information on the site.
Comments (0)
Please Log In to leave a comment.