Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Using MITRE D3FEND to strengthen you home network

September 8, 2025

Speed Isn’t Everything When Buying SSDs

September 8, 2025

Debian 13.1 Released With An Initial Batch Of Fixes

September 8, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»Hacker steals $223 million in Cetus Protocol cryptocurrency heist
Cyber Security

Hacker steals $223 million in Cetus Protocol cryptocurrency heist

MichaBy MichaMay 25, 2025No Comments4 Mins Read
Hacker steals 3 million in Cetus Protocol cryptocurrency heist


Cetus Protocol Hack: A Deep Dive into the $223 Million Cyber Heist

The recent cyber theft of $223 million from the decentralized exchange Cetus Protocol has sent shockwaves through the cryptocurrency community. As the platform offers a $5 million bounty for information leading to the hacker’s arrest, many are left to ponder the implications of this breach. This article explores the details of the incident, the vulnerabilities exploited, and what this means for the future of decentralized finance (DeFi) security.

An Overview of Cetus Protocol

Cetus Protocol operates as a decentralized exchange (DEX) and liquidity protocol on the Sui and Aptos blockchains. Utilizing a Concentrated Liquidity Market Maker (CLMM) model, it allows liquidity providers to deploy assets within specific price ranges, enhancing capital efficiency. As of May 2025, Cetus Protocol has achieved a staggering total trading volume of $57 billion, with over 15 million accounts executing 144 million trades.

The Cyber Theft: What Happened?

The breach occurred yesterday, prompting immediate action from the Cetus Protocol team, who paused their smart contracts to investigate the incident further. After confirming the loss, they reported that $162 million of the compromised funds had been successfully paused. This quick reaction reflects a growing need for vigilance in the DeFi sector, where cyber security remains paramount.

Initial Findings and Exploit Details

Cetus Protocol identified the attack’s root cause as a vulnerable package, although they have yet to disclose further details. In a statement, the team noted: “We identified the root cause of the exploit and fixed the related package. We have also informed ecosystem builders as quickly as possible to prevent further attacks.” The platform is actively cooperating with third parties to trace and potentially freeze the stolen funds. Notably, the Ethereum wallet address for the hacker has been identified, and law enforcement has been alerted.

Legal and Financial Measures

In response to the breach, Cetus Protocol offered the hacker a unique “whitehat settlement,” promising not to pursue legal action if the stolen funds are returned. This move underscores the need for ethical behavior even in the world of crypto. Additionally, to encourage whistleblowers, the project announced a $5 million bounty for information leading to the identifications and arrest of the attacker.

Blockchain Insights from Elliptic

According to blockchain analytics firm Elliptic, the exploit may have stemmed from a flaw in the automated market maker (AMM) logic. This vulnerability could potentially facilitate pool price manipulation and enable flash loan-style attacks. Their ongoing analysis examines the hacker’s attempts to move ill-gotten gains, including swapping USDT for USDC and facilitating cross-chain transactions from Sui to Ethereum.

Immediate Cyber Security Recommendations for DeFi Projects

Following the theft at Cetus Protocol, several critical security measures emerge for DeFi projects:

  • Regular audits: Conducting frequent security audits can identify vulnerabilities before they are exploited by malicious actors.
  • Enhancing smart contract security: Employing robust coding practices can minimize the risk of vulnerabilities in smart contracts, which are often targeted.
  • Incident response strategies: Having a predefined incident response plan can significantly reduce the response time in the event of a security breach.

Conclusion: The Growing Importance of Cyber Security in DeFi

The hack of Cetus Protocol highlights not only the vulnerabilities that exist within decentralized finance platforms but also the critical importance of implementing robust cyber security measures. As cryptocurrencies and decentralized exchanges continue to gain traction, the threat landscape will likely evolve, requiring rigorous defenses. Projects must prioritize security to preserve trust and stability within the DeFi ecosystem.

FAQ

Question 1: What measures is Cetus Protocol taking post-hack?

Cetus Protocol has paused its operations for investigation and is collaborating with law enforcement while offering a reward for information leading to the hacker’s arrest.

Question 2: What is a ‘whitehat settlement’?

A ‘whitehat settlement’ is an offer made to a hacker allowing them to return stolen funds without fear of legal repercussions, aiming for a resolution rather than prosecution.

Question 3: What vulnerabilities should DeFi projects be aware of?

DeFi projects must vigilantly check for flaws in automated market makers (AMMs), smart contract vulnerabilities, and potential ways to manipulate prices. Regular audits and updating security protocols are essential.



Read the original article

0 Like this
Cetus cryptocurrency Hacker heist million Protocol Steals
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleOracle has reportedly placed an order for $40 billion in Nvidia AI GPUs for a new OpenAI data center
Next Article How to clear cache and temp files in Linux to speed up your system fast

Related Posts

Cyber Security

Murky Panda hackers exploit cloud trust to hack downstream customers

August 24, 2025
Cyber Security

AI-powered financial scams swamp social media

August 22, 2025
Cyber Security

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.