According to PANews, Slow Fog released an analysis of the Cetus theft incident, where attackers carefully crafted parameters to cause an overflow while bypassing detection, exchanging a minimal token amount for substantial liquidity assets. The attackers exploited the checked_shlw function flaw to obtain assets such as SUI, vSUI, and USDC at the cost of just one token. Some funds were cross-chain transferred to an EVM address via the Sui Bridge and deposited into Suilend with assets of $10 million. Currently, $162 million of the stolen funds have been frozen by the SUI Foundation. Cetus has fixed the vulnerability, and Slow Fog advises developers to rigorously validate boundary conditions of mathematical functions.