Binance Square

CetusRecovery

1,912 προβολές
6 άτομα συμμετέχουν στη συζήτηση
AmmerAhmed
--
#Cetus #CetusRecovery can anyone have any updated news about cetus price will it recover? i am worried about its delisting will binance delist it? anyone news update kidly confirm
#Cetus #CetusRecovery
can anyone have any updated news about cetus price
will it recover?
i am worried about its delisting
will binance delist it?

anyone news update
kidly confirm
PL-DSW-Gregor-Śląsk:
dlaczego wycofania? ty poważnie? nie panikuj. AIXBT swego czasu też padł ofiarą hakerów i ??? dziś +20% trzeba mieć rozłożony portfel. i nie padac panice
$CETUS Market Watch Eyes on the Bounce❓ {future}(CETUSUSDT) Hey crypto fam‼️ CETUS has been making some noise lately, and not all of it good after the recent $260M hack, the token took a big hit. But guess what? Smart traders are already eyeing a potential bounce. 💁🏻Entry Zone: $0.12570– sweet spot for the dip buyers 🎯Profit Target: $0.1350/0.14 – not greedy, just realistic 🚷Stop Loss: $0.1200 – manage that risk, always‼️ Despite the recent breach, CETUS is showing signs of stabilization. If support holds around $0.1215, a short-term reversal could be on the table. Watch for volume spikes and any ecosystem recovery news. Buy trade here💁🏻$CETUS #Cetus #CetusEcosystem #CetusRecovery
$CETUS Market Watch Eyes on the Bounce❓

Hey crypto fam‼️
CETUS has been making some noise lately, and not all of it good after the recent $260M hack, the token took a big hit. But guess what? Smart traders are already eyeing a potential bounce.

💁🏻Entry Zone: $0.12570– sweet spot for the dip buyers

🎯Profit Target: $0.1350/0.14 – not greedy, just realistic

🚷Stop Loss: $0.1200 – manage that risk, always‼️

Despite the recent breach, CETUS is showing signs of stabilization. If support holds around $0.1215, a short-term reversal could be on the table. Watch for volume spikes and any ecosystem recovery news.

Buy trade here💁🏻$CETUS

#Cetus #CetusEcosystem #CetusRecovery
🚨 UPDATE: Cetus released a community update, saying its aggregator service is already online. Recovery is underway via legal and on chain efforts. #Cetus #CetusRecovery
🚨 UPDATE: Cetus released a community update, saying its aggregator service is already online.

Recovery is underway via legal and on chain efforts.

#Cetus #CetusRecovery
On Wednesday, the $SUI validator community acted swiftly to freeze $162M in stolen funds. Here's how it unfolded: Validators have config files that can block transactions from specific addresses. Each validator decides independently whether to block an address, and can reverse the action at any time. Over one-third of validators (by stake) chose to block two addresses linked to the attack — effectively freezing the funds. This isn’t unique to Sui; any network validator can do the same to manage risk or comply with legal obligations. Thanks to quick action, a portion of the funds — valued at $162M — was frozen before the attacker could bridge them out. Freezing is a temporary defense to slow attacks and give victims a chance to respond. That’s exactly what happened in the Cetus exploit. Unfortunately, the attacker hasn’t replied to outreach from the team. Today, Cetus proposed a community vote on a protocol upgrade to return the frozen funds — no chain rollback, no transaction reversals. Given the circumstances, we support a community vote under two conditions: 1. We’ll stay neutral and abstain from voting. Our role is to design a fair, transparent process that reflects the community’s voice. 2. Cetus must commit all its resources to fully recover and return funds to its customers. More details and code coming soon. #SuiNetwork #CryptoSecurity #DecentralizedGovernance #CetusRecovery #TrumpTariffs
On Wednesday, the $SUI validator community acted swiftly to freeze $162M in stolen funds. Here's how it unfolded:

Validators have config files that can block transactions from specific addresses.

Each validator decides independently whether to block an address, and can reverse the action at any time.

Over one-third of validators (by stake) chose to block two addresses linked to the attack — effectively freezing the funds.

This isn’t unique to Sui; any network validator can do the same to manage risk or comply with legal obligations.

Thanks to quick action, a portion of the funds — valued at $162M — was frozen before the attacker could bridge them out.

Freezing is a temporary defense to slow attacks and give victims a chance to respond. That’s exactly what happened in the Cetus exploit. Unfortunately, the attacker hasn’t replied to outreach from the team.

Today, Cetus proposed a community vote on a protocol upgrade to return the frozen funds — no chain rollback, no transaction reversals. Given the circumstances, we support a community vote under two conditions:

1. We’ll stay neutral and abstain from voting. Our role is to design a fair, transparent process that reflects the community’s voice.

2. Cetus must commit all its resources to fully recover and return funds to its customers.

More details and code coming soon.

#SuiNetwork #CryptoSecurity #DecentralizedGovernance #CetusRecovery #TrumpTariffs
Cetus $230M Hack: How a Math Bug Led to Massive LossesAccording to Odaily, a deep analysis by SlowMist has uncovered how a hacker stole $230 million from Cetus by exploiting a math overflow vulnerability in the get_delta_a function. The flaw bypassed a protection mechanism (checked_shlw), letting the attacker manipulate parameters and trick the system into miscalculating token values. Example : Imagine a smart contract says: “You give me 1 haSUI, I give you 1,000,000 USDT.” Due to an overflow bug in the math calculation, the attacker made it seem like they only needed 1 token to receive millions in liquidity. In reality, they should have needed a huge amount. By carefully choosing the inputs, the attacker got billions in value almost for free. Takeaway: This is a powerful reminder that even a tiny math error in a smart contract can lead to massive losses. Overflow vulnerabilities must be taken seriously. Every calculation needs proper limits, validation, and safe coding practices to avoid this kind of disaster. Source: Binance square. #TrumpTariffs #HackingAlert #CetusRecovery #Cetus

Cetus $230M Hack: How a Math Bug Led to Massive Losses

According to Odaily, a deep analysis by SlowMist has uncovered how a hacker stole $230 million from Cetus by exploiting a math overflow vulnerability in the get_delta_a function. The flaw bypassed a protection mechanism (checked_shlw), letting the attacker manipulate parameters and trick the system into miscalculating token values.
Example :
Imagine a smart contract says:
“You give me 1 haSUI, I give you 1,000,000 USDT.”
Due to an overflow bug in the math calculation, the attacker made it seem like they only needed 1 token to receive millions in liquidity. In reality, they should have needed a huge amount. By carefully choosing the inputs, the attacker got billions in value almost for free.
Takeaway:
This is a powerful reminder that even a tiny math error in a smart contract can lead to massive losses. Overflow vulnerabilities must be taken seriously. Every calculation needs proper limits, validation, and safe coding practices to avoid this kind of disaster.
Source: Binance square.
#TrumpTariffs #HackingAlert #CetusRecovery #Cetus
Συνδεθείτε για να εξερευνήσετε περισσότερα περιεχόμενα
Εξερευνήστε τα τελευταία νέα για τα κρύπτο
⚡️ Συμμετέχετε στις πιο πρόσφατες συζητήσεις για τα κρύπτο
💬 Αλληλεπιδράστε με τους αγαπημένους σας δημιουργούς
👍 Απολαύστε περιεχόμενο που σας ενδιαφέρει
Διεύθυνση email/αριθμός τηλεφώνου