Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»$223M Exploit Halts Cetus Protocol: Here’s What We Know So Far

    $223M Exploit Halts Cetus Protocol: Here’s What We Know So Far

    May 23, 2025

    Cetus Protocol, DeFi Hack, DeFi, Decentralized Finance, Cetus

    In the ever-volatile world of decentralized finance (DeFi), yet another major exploit has shaken investor confidence—this time with a staggering $223 million theft from Cetus Protocol, a key player in the Sui blockchain ecosystem.

    On May 22, Cetus announced an emergency pause of its smart contract following the detection of “an incident” impacting the protocol. Within hours, the scope of the breach became alarmingly clear: attackers had siphoned off roughly $223 million in digital assets. While the team acted swiftly to lock down the contract and halt further losses, the damage had already been done.

    “We took immediate action to lock our contract preventing further theft of funds,” the protocol posted on X.

    Swift Response Halts $162M Mid-Exploit

    The rapid response wasn’t just damage control—it prevented further catastrophe. Cetus confirmed that $162 million of the stolen assets were successfully paused, likely through disabling or restricting access to impacted contracts and freezing certain token transfers.

    The team also activated an ecosystem-wide alert, working closely with the Sui Foundation, associated builders, and blockchain security researchers to trace the stolen assets and mitigate collateral risks to other protocols operating within the Sui ecosystem.

    Root Cause Identified and Patched

    In a follow-up statement, Cetus confirmed it had identified the root cause of the exploit and patched the vulnerable package. It did not, however, disclose the technical details of the vulnerability.  Notably, they acted quickly to inform other developers and ecosystem partners, reducing the risk of similar exploits elsewhere.

    “We informed ecosystem builders as fast as we could with help from ecosystem members to prevent other teams being affected,” Cetus stated.

    This level of collaboration speaks to the maturing security response of newer blockchain ecosystems like Sui, which—despite still being in the early innings of adoption—are working to build reputational resilience in the face of inevitable technical setbacks.

    Law Enforcement and White Hat Negotiations

    In a move that’s becoming increasingly common in DeFi exploits, Cetus has identified the Ethereum wallet address linked to the attacker and is attempting to negotiate a whitehat settlement.

    The offer: return the funds in exchange for immunity from legal prosecution.

    “We have offered a time-sensitive whitehat settlement in exchange for the outstanding balance. Should the hacker accept our terms, we would also refrain from pursuing further legal action.”

    Cetus even made the negotiation offer public, sharing links on-chain:

    • SuiVision Whitehat Offer

    • Etherscan Transaction Log

    Simultaneously, Cetus has brought in anti-cybercrime organizations to assist with fund tracing and law enforcement engagement, in case negotiations fail and a legal path becomes inevitable.

    Also read: Morpho App Vulnerability Triggers $2.6M Incident, Funds Later Returned by White Hat

    Community Reactions and Market Fallout

    While the crypto market has largely learned to absorb shock from exploits of this magnitude, sentiment around newer Layer 1 ecosystems like Sui has taken a hit. Community members on social media praised the speed of the response, but many also questioned the underlying security audit processes that failed to catch such a high-impact vulnerability.

    As DeFi matures, the industry is being forced to reckon with an uncomfortable truth: innovative code doesn’t always mean secure code.

    Also read: Abracadabra Cyberattack: How Hackers Drained $13M from DeFi Platform

    What’s Next for Cetus Protocol?

    The protocol has promised a full post-mortem report once the investigation is complete, and all eyes are now on how much of the $223 million will be recovered—or lost forever.

    In the meantime, Cetus says its highest priority is fund recovery and is keeping communication channels open for updates. While the full impact remains to be seen, this breach is a stark reminder that even in the most promising ecosystems, one exploit can undo months of growth and trust.

    For investors, developers, and DeFi platforms alike, the Cetus incident underscores a critical mantra in web3: move fast, but patch faster.

    This is a developing story. The Cyber Express will continue to monitor and update as more details emerge.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article3AM ransomware attack poses as a call from IT support to compromise networks
    Next Article U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Rejoice, PC gamers: this Steam feature just got a massive update — here’s how to use it and how it works

    News & Updates

    CVE-2024-11142 – Gosoft Software Proticaret E-Commerce CSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-30418 – NI Circuit Design Suite SymbolEditor Out-of-Bounds Write Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47181 – Microsoft Edge Link Following Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-20988 – Qualcomm Fingerprint Trustlet OOB Read Vulnerability

    June 4, 2025

    CVE ID : CVE-2025-20988

    Published : June 4, 2025, 5:15 a.m. | 2 hours, 18 minutes ago

    Description : Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.

    Severity: 5.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-47952 – Traefik Path Traversal Vulnerability

    May 30, 2025

    CVE-2025-6545 – Apache PBKDF2 Signature Spoofing Vulnerability

    June 23, 2025

    The Last Letter from the Hills: Part 2 – The Monsoon of Memories

    June 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.