According to PANews, Slow Mist released an analysis of the Cetus theft incident, where attackers carefully crafted parameters to cause an overflow while bypassing detection, exchanging a small amount of tokens for a large amount of liquidity assets. The attackers exploited a flaw in the checked_shlw function to acquire assets such as SUI, vSUI, and USDC at the cost of just 1 token. Some of the funds were cross-chained to an EVM address through Sui Bridge and deposited into Suilend, amounting to 10 million USD. Currently, 162 million USD of stolen funds have been frozen by the SUI Foundation. Cetus has fixed the vulnerability, and Slow Mist recommends that developers rigorously verify the boundary conditions of mathematical functions.