🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
Cetus suffered an attack with a loss of $230 million, and $162 million of the stolen funds have been frozen.
Gate News bot message, according to the analysis report released by the Slow Mist team, the Cetus protocol was attacked, with the attacker exploiting the overflow detection flaw in the checked_shlw function to carry out the attack.
The attacker first borrowed haSUI through a flash loan, and then exploited a system vulnerability to exchange a large amount of liquidity using only 1 token. This attack caused a loss of approximately $230 million, involving various digital assets such as SUI, vSUI, and USDC.
The attacker transferred part of the funds to an EVM address via the Sui Bridge and deposited $10 million in assets into Suilend. Currently, the SUI Foundation has frozen $162 million of the stolen funds. Cetus has completed the vulnerability fix, and the SlowMist team recommends that developers strictly verify the boundary conditions of mathematical functions.
Source: Wu Says
Original link