On May 22, 2025, Cetus, the largest decentralized exchange (DEX) in the Sui public chain ecosystem, was attacked by hackers. Liquidity dropped sharply in an instant, prices of multiple trading pairs collapsed, and losses exceeded US$220 million.
As of press time, the timeline is as follows:
On the morning of May 22, hackers attacked Cetus and stole $230 million. Cetus urgently suspended the contract and issued an announcement On the afternoon of May 22, the hacker transferred about 60 million US dollars across the chain, and the remaining 162 million US dollars were still in the Sui chain address. The Sui verification node quickly took action to add the hacker address to the Deny List and freeze the funds. On the evening of May 22, Sui CPO @emanabio tweeted to confirm: Funds have been frozen and return will begin soon On May 23, Cetus began fixing vulnerabilities and updating contracts On May 24, Sui open sourced PR, explaining that funds will be recovered through aliasing and whitelist. On May 26, Sui initiated an on-chain governance vote, proposing whether to implement a protocol upgrade and transfer hacker assets to a custodial address. On May 29, the voting results were announced, with more than 2/3 of the verification nodes supporting the protocol; the protocol upgrade is ready to be implemented From May 30th to early June, the protocol upgrade took effect, the designated transaction hash was executed, and the hackers assets were legally transferred 2. Attack PrincipleThere are many articles on the event principle in the industry, and here we only give an overview of the core principles:
From the attack process point of view:
The attacker first used a flash loan to borrow about 10,024,321.28 haSUI, instantly dropping the price of the trading pool by 99.90%. This huge sell order caused the target pool price to drop from about 1.8956 × 10 ^ 19 to 1.8425 × 10 ^ 19, almost clearing the bottom. The attacker then created a liquidity position on Cetus with an extremely narrow range (the lower limit of the tick is 300000, the upper limit is 300200, and the width of the range is only 1.00496621%). Such a narrow range amplifies the impact of subsequent calculation errors on the number of tokens required.The core principle of the attack:
The problem is that there is an integer overflow vulnerability in the get_delta_a function used by Cetus to calculate the number of tokens required. The attacker deliberately stated that a huge amount of liquidity (about 10^37 units) would be added, but only 1 token was actually put into the contract. Due to an error in the overflow detection condition of checked_shlw, the contract truncates the high position during the left shift calculation, causing the system to seriously underestimate the amount of haSUI required, thereby exchanging a huge amount of liquidity for a very small cost. From a technical point of view, the above vulnerability stems from the fact that Cetus used incorrect masks and judgment conditions in the Move smart contract, resulting in any value less than 0xffffffffffffffffAfter the incident, two official actions were taken: freeze vs. recovery, which consists of two stages :
The freezing phase is completed by Deny List + node consensus; The recovery phase requires on-chain protocol upgrade + community voting + designated transaction execution to bypass the blacklist. 3. Sui’s freezing mechanismSui Chain itself has a special Deny List mechanism, which enables the freezing of hacker funds. Not only that, Sui’s token standard also has a “ regulated token ” mode with a built-in freezing function.
This emergency freeze took advantage of this feature: the validator node quickly added the addresses related to the stolen funds in the local configuration file. In theory, each node operator can modify TransactionDenyConfig to update the blacklist, but in order to ensure network consistency, the Sui Foundation, as the initial configuration publisher, conducted centralized coordination. The foundation first officially released a configuration update containing the hackers address, and the validator took effect synchronously according to the default configuration, so that the hackers funds were temporarily sealed on the chain. There is actually a highly centralized factor behind this. In order to rescue the victims from frozen funds, Sui team immediately launched a whitelist mechanism patch. This is for the subsequent transfer back of funds. Legal transactions can be constructed in advance and registered in the whitelist, and can be enforced even if the fund address is still on the blacklist. The new feature transaction_allow_list_skip_all_checks allows specific transactions to be pre-added to the exempt list, allowing these transactions to skip all security checks, including signatures, permissions, blacklists, etc. It should be noted that the whitelist patch cannot directly steal the hackers assets ; it only gives certain transactions the ability to bypass freezing, and the actual asset transfer still requires a legal signature or additional system permission module to complete. In fact, the mainstream freezing schemes in the industry often occur at the token contract level and are controlled by multiple signatures of the issuer. Take USDT issued by Tether as an example. Its contract has a built-in blacklist function, and the issuing company can freeze the illegal address, making it impossible to transfer USDT. This solution requires multiple signatures to initiate a freezing request on the chain, and it is only actually executed after multiple signatures reach a consensus, so there is an execution delay. Although Tether’s freezing mechanism is effective, statistics show that there are often “window periods” in the multi-signature process, leaving opportunities for criminals to take advantage. In contrast, Suis freeze occurs at the underlying protocol level and is collectively operated by validator nodes, executing much faster than ordinary contract calls. In this model, in order to execute quickly enough, it means that the management of these validator nodes themselves is highly unified. 4. Sui’s “transfer-style recycling” implementation principleWhat’s even more surprising is that Sui not only froze the hacker’s assets, but also planned to “transfer and recover” the stolen funds through on-chain upgrades.
On May 27, Cetus proposed a community voting plan to upgrade the protocol and send the frozen funds to a multi-signature escrow wallet. The Sui Foundation then initiated an on-chain governance vote. On May 29, the voting results were announced, and about 90.9% of the validators supported the proposal. Sui officially announced that once the proposal is passed, all funds frozen in the two hacker accounts will be recovered into a multi-signature wallet without the hackers signature. No hacker signature is required, what a unique feature, there has never been such a repair method in the blockchain industry. From Suis official GitHub PR, we know that the protocol has introduced an address aliasing mechanism. The upgrade includes: pre-specifying alias rules in ProtocolConfig, so that some allowed transactions can treat legitimate signatures as being sent from hacker accounts. Specifically, the rescue transaction hash list to be executed is bound to the target address (i.e., the hacker address), and any executor who signs and publishes these fixed transaction summaries is deemed to have initiated the transaction as a valid hacker address owner. For these specific transactions, the validator node system bypasses the Deny List check. From the code level, Sui added the following judgment to the transaction verification logic: when a transaction is blocked by the blacklist, the system traverses its signers and checks whether protocol_config.is_tx_allowed_via_aliasing(sender, signer, tx_digest) is true. As long as there is a signer that satisfies the alias rule, that is, the transaction is marked as allowed to pass, the previous interception error will be ignored and normal packaging and execution will continue. 5. Viewpoint 160 million, tearing apart the industrys deepest underlying beliefsRegarding the Cetus incident, from my personal point of view, this storm may pass quickly, but this model will not be forgotten because it subverted the foundation of the industry and broke the traditional consensus that blockchain cannot be tampered with under the same set of ledgers. In blockchain design, the contract is the law and the code is the referee. But in this incident, the code failed, governance intervened, and power was overridden, forming a pattern of voting behavior determining the results of the code. This is because Suis approach of directly misappropriating transactions is very different from the mainstream blockchains approach to dealing with hacker issues. This is not the first time that consensus has been tampered with, but it is the most silent one
Historically: Ethereum used a hard fork to roll back transfers to compensate for losses during The DAO incident in 2016, but this decision led to the split of the Ethereum and Ethereum Classic chains. The process was controversial, but in the end different groups formed different consensus beliefs. The Bitcoin community has also experienced similar technical challenges: the value overflow vulnerability in 2010 was urgently repaired by developers and the consensus rules were upgraded, completely erasing approximately 18.4 billion illegally generated bitcoins. This is the same hard fork model, rolling back the ledger to before the problem, and then users can still decide for themselves which ledger system to continue using. Compared with the DAO hard fork, Sui did not choose to split the chain, but targeted this incident precisely by upgrading the protocol and configuring aliases . In doing so, Sui maintained the continuity of the chain and most of the consensus rules unchanged, but also showed that the underlying protocol can be used to implement targeted rescue operations. 問題是 historical “fork-style rollbacks” are users’ choice of belief; Sui’s “protocol-style amendments” are chains making decisions for you.
Not Your Key, Not Your Coin? Not Anymore, Im afraid.
In the long run, this means that the concept of “ Not your keys, not your coins ” is broken on the Sui chain: even if the user’s private keys are intact, the network can still block the flow of assets and redirect assets through collective agreement changes. If this becomes a precedent for blockchain to respond to large-scale security incidents in the future, or even is considered a practice that can be followed again. “When a chain can break the rules for justice, it also has a precedent for breaking any rules.” Once a public welfare money grab is successful, the next time it may be an operation in the moral gray area. What happens then? The hacker did steal the user’s money, so can group voting take his money away? Is the voting based on who has more money (pos) or who has more people? If the one with more money wins, then the final producer described by Liu Cixin will soon arrive. If the one with more people wins, then the mob will also rise up. Under the traditional system, it is very normal that illegal income is not protected, and freezing and transfer are routine operations of traditional banks. But the fact that this cannot be achieved from a technical perspective is the root cause of the development of the blockchain industry. Now the big stick of industry compliance continues to ferment. Today, it can freeze and modify account balances for hackers, and tomorrow it can make arbitrary modifications for geographical factors and conflict factors. If the chain becomes a regional partial tool. The value of the industry will be greatly compressed, and at best it will be just another less useful financial system. This is also the reason why I am determined to stay in the industry: Blockchain is not valuable because it cannot be frozen, but because even if you hate it, it will not change for you.With regulation being the general trend, can the chain protect its own soul?
Once upon a time, alliance chains were more popular than public chains because they met the regulatory needs of that era. The decline of alliances today actually means simply complying with this demand, not the needs of real users. The regulated users have been lost, so what about the need for regulatory tools ? From the perspective of industry developmentIs efficient centralization a necessary stage in the development of blockchain? If the ultimate goal of decentralization is to protect the interests of users, can we tolerate centralization as a transitional measure? The word democracy in the context of on-chain governance is actually token weighted . So if a hacker holds a large amount of SUI (or if the DAO is hacked one day and the hacker controls the voting rights), can he also legally vote to cleanse himself ? Ultimately, the value of a blockchain is not whether it can be frozen, but that even if a group has the ability to freeze it, it chooses not to do so. The future of a chain is not determined by its technical architecture, but by the set of beliefs it chooses to protect. This article is sourced from the internet: The hacker stole the money, so can Sui rob it? #分析© 版權聲明文章版权归作者所有,未经允许请勿转载。 上一篇 SignalPlus Macro Analysis Special Edition: TACO 下一篇 Aptos Move Security Library Co-construction Initiative: Building Trusted Infrastructure Standards for Developers 相關文章 The First Wave of the 2026 Market is Actually Meme Coins: Prelude to Recovery or Bull Trap? 6086cf14eb90bc67ca4fc62b 11,976 2 Must-watch items next week: US CPI data may be absent for the first time; Binance Alpha lists JCT and ALLO (November 10- 6086cf14eb90bc67ca4fc62b 17,201 Bitget Report: Earnings Season Frenzy – Analyzing the Explosive Growth in Demand for Tokenized US Stocks 6086cf14eb90bc67ca4fc62b 16,837 16 熱的Ethereum Treasury: A Disruptor or Builder of the On-Chain Ecosystem?Recommended Articles 6086cf14eb90bc67ca4fc62b 24,070 3 SIA: Building the Web3 Intelligent Transaction Layer for the AI Era – A Comprehensive Analysis of the Airdrop Campaign 6086cf14eb90bc67ca4fc62b 17,971 3 If you can’t beat them, join them? Nasdaq executives explain why they embraced tokenization. 6086cf14eb90bc67ca4fc62b 21,680 暫無評論 您必須先登入才能發表評論! 立即登入 暫無評論... Bee.com 全球最大的 Web3 入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko 幣活 盔甲 下載Bee Network APP開啟您的Web3之旅 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 下載蜜蜂網路APP 並開始 web3 之旅 全球最大的Web3入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 搜尋 搜尋站內鏈上社群媒體新聞 熱門推薦: 擼毛打金 數據分析 必關大神 教我避坑 繁體中文 English 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский 繁體中文
智能索引记录
-
2026-03-02 22:07:11
综合导航
成功
标题:å¯å§çæ¼é³_å¯å§çææ_å¯å§çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½å¯å§é¢é,ä»ç»å¯å§,å¯å§çæ¼é³,å¯å§æ¯
-
2026-03-02 11:59:09
综合导航
成功
标题:Очки защитные закрытые прозрачные вентиляция поясок YATO YT-73832 (216199623) - RIA
简介:Продаю на RIA - Очки защитные закрытые прозрачные вентиляция
-
2026-03-02 14:49:49
图片素材
成功
标题:初中散文作文2000字 初中2000字散文作文大全-作文网
简介:作文网优秀初中散文2000字作文大全,包含初中散文2000字作文素材,初中散文2000字作文题目、美文范文,作文网原创名
-
2026-03-02 14:17:31
综合导航
成功
标题:Blog - Nar10 Bilişim Barkod Sistemi- Depo ve Stok Takibi
简介:Online Stok Takip, Barkodlu Satış, Depo Şube Mağaza Entegras
-
2026-03-02 21:04:52
电商商城
成功
标题:【京东优评】热卖商品_优质评价排行、看实拍买好货 - 京东
简介:京东优评频道,为用户提供真实、专业的商品评价排行榜,包含商品价格、图片、品牌、优惠券、商品怎么样等多维度信息,精选用户购
-
2026-03-02 19:37:43
新闻资讯
成功
标题:602《风云无双》121、122、123服6月7日火爆开启 - 新闻公告 - 602游戏平台 - 做玩家喜爱、信任的游戏平台!cccS
简介:602《风云无双》121、122、123服6月7日火爆开启
-
2026-03-02 11:41:06
综合导航
成功
标题:Ihre Karriere bei TUP - Durchstarten im Themenfeld Intralogistik
简介:Wir bieten interessante Karrierechancen für Branchen- und Th
-
2026-03-02 18:33:24
综合导航
成功
标题:补气血的口服液哪个好 - 云大夫
简介:补气血的口服液有很多,没有哪个更好的说法,主要看患者的病情更适用于哪种药物。常见的有阿胶补血口服液、复方阿胶浆、当归补血
-
2026-03-02 12:32:58
电商商城
成功
标题:水感凝肌液预订订购价格 - 京东
简介:京东是国内专业的水感凝肌液网上购物商城,本频道提供水感凝肌液商品预订订购价格,水感凝肌液哪款好信息,为您选购水感凝肌液提
-
2026-03-02 21:16:01
综合导航
成功
标题:éè»çæ¼é³_éè»çææ_éè»çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½éè»é¢é,ä»ç»éè»,éè»çæ¼é³,éè»æ¯
-
2026-03-02 12:52:18
教育培训
成功
标题:乡情作文600字【热】
简介:在生活、工作和学习中,大家对作文都再熟悉不过了吧,借助作文人们可以反映客观事物、表达思想感情、传递知识信息。那么问题来了
-
2026-03-02 20:43:47
综合导航
成功
标题:Andres Saenz - EY Global Vice Chair - Strategy EY - It
简介:Contact and profile information for Andres Saenz, EY Global
-
2026-03-02 19:29:54
综合导航
成功
标题:善呈新能源招聘_福建省善呈新能源有限公司招聘_电话_地址 _【官方】
简介:善呈新能源招聘,福建省善呈新能源有限公司招聘,公司在福建省宁德市蕉城区宝信行政公馆22#3梯506室,招聘岗位详情。
-
2026-03-02 12:41:00
图片素材
成功
标题:流浪狗的作文 描写流浪狗的作文 关于流浪狗的作文 素材-作文网
简介:作文网精选关于流浪狗的作文,包含流浪狗的作文素材,关于流浪狗的作文题目,以流浪狗为话题的作文大全,作文网原创名师点评,欢
-
2026-03-02 22:23:10
综合导航
成功
标题:方舟界域传送最新章节_方舟界域传送全文免费阅读-笔趣阁
简介:方舟界域传送方舟界域传送全文免费阅读方舟界域传送是作家心杀墨贝尔的最新玄幻小说大作,笔趣阁提供方舟界域传送首发最新章节及
-
2026-03-02 19:41:14
游戏娱乐
成功
标题:障碍滑雪练习_障碍滑雪练习html5游戏_4399h5游戏-4399小游戏
简介:障碍滑雪练习在线玩,障碍滑雪练习下载, 障碍滑雪练习攻略秘籍.更多障碍滑雪练习游戏尽在4399小游戏,好玩记得告诉你的朋
-
2026-03-02 22:09:59
视频影音
成功
标题:第二十二章:收集要素_底特律变人全结局全奖杯图文攻略_全杂志收集图文攻略_3DM单机
简介:《底特律:变人》全结局全奖杯图文攻略,全杂志收集图文攻略(含“路线/结局”“收集/成就”)。《底特律:变人》是由Quan
-
2026-03-02 12:29:00
综合导航
成功
标题:Domain Names California European Favorite Domain Name Registration DomainsNext.com
简介:Domain registration fast, simple, and affordable. Your Busin
-
2026-03-02 21:33:40
综合导航
成功
标题:æ¥æªçæ¼é³_æ¥æªçææ_æ¥æªçç¹ä½_è¯ç»ç½
简介:è¯ç»ç½æ¥æªé¢é,ä»ç»æ¥æª,æ¥æªçæ¼é³,æ¥æªæ¯
-
2026-03-02 18:46:39
综合导航
成功
标题:陆贞里的阿碧是好人吗最新章节_24第1页_陆贞里的阿碧是好人吗免费章节_恋上你看书网
简介:24第1页_陆贞里的阿碧是好人吗_鸡毛令箭_恋上你看书网
-
2026-03-02 13:34:47
综合导航
成功
标题:Lily Liu is a guest in OKX live broadcast room: Sharing Solana ecosystem narrative, core competitiveness, and talent phi Bee Network
简介:What a surprise! On the evening of June 16, Solana Foundatio
-
2026-03-02 12:47:08
综合导航
成功
标题:거산고구마 상품 후기 달콤하고 쫀득해요
简介:거산고구마 자연 그대로의 달콤함, 신선한 맛으로 고객 만족이 높아요
-
2026-03-02 12:28:05
综合导航
成功
标题:Lademöglichkeiten
简介:Entdecken Sie alle Lademöglichkeiten für Smartphones und Lap
-
2026-03-02 12:29:47
综合导航
成功
标题:Cabo de USB-C para MagSafe 3 (2m) - Azul-céu - Apple (BR)
简介:O cabo de dois metros tem design trançado resistente e conec
-
2026-03-02 21:04:11
综合导航
成功
标题:暴君乖乖小姐姐宠你最新章节_第72章 是你自己跑回来的第1页_暴君乖乖小姐姐宠你免费阅读_恋上你看书网
简介:第72章 是你自己跑回来的第1页_暴君乖乖小姐姐宠你_沐沉沉_恋上你看书网
-
2026-03-02 22:17:27
综合导航
成功
标题:Disc Pool 2 Player 2 Games Online - 4J.Com
简介:There are 564 games related to Disc Pool 2 Player 2 on 4J.co
-
2026-03-02 14:46:15
教育培训
成功
标题:西安游记作文合集五篇
简介:在日常生活或是工作学习中,说到作文,大家肯定都不陌生吧,作文根据写作时限的不同可以分为限时作文和非限时作文。你知道作文怎
-
2026-03-02 12:33:32
图片素材
成功
标题:二年级书信作文1500字 二年级1500字书信作文大全-作文网
简介:作文网优秀二年级书信1500字作文大全,包含二年级书信1500字作文素材,二年级书信1500字作文题目、美文范文,作文网
-
2026-03-02 11:48:55
综合导航
成功
标题:PDF: Seguridad y Salud en el trabajo PwC Colombia
简介:Descarga nuestra Políticas HSEQ. Procuramos el mejoramiento
-
2026-03-02 13:33:13
综合导航
成功
标题:data analysis Bee Network
简介:世界最大のWeb3ポータルサイト。.