On Wednesday, the
$SUI validator community acted swiftly to freeze $162M in stolen funds. Here's how it unfolded:
Validators have config files that can block transactions from specific addresses.
Each validator decides independently whether to block an address, and can reverse the action at any time.
Over one-third of validators (by stake) chose to block two addresses linked to the attack — effectively freezing the funds.
This isn’t unique to Sui; any network validator can do the same to manage risk or comply with legal obligations.
Thanks to quick action, a portion of the funds — valued at $162M — was frozen before the attacker could bridge them out.
Freezing is a temporary defense to slow attacks and give victims a chance to respond. That’s exactly what happened in the Cetus exploit. Unfortunately, the attacker hasn’t replied to outreach from the team.
Today, Cetus proposed a community vote on a protocol upgrade to return the frozen funds — no chain rollback, no transaction reversals. Given the circumstances, we support a community vote under two conditions:
1. We’ll stay neutral and abstain from voting. Our role is to design a fair, transparent process that reflects the community’s voice.
2. Cetus must commit all its resources to fully recover and return funds to its customers.
More details and code coming soon.
#SuiNetwork #CryptoSecurity #DecentralizedGovernance #CetusRecovery #TrumpTariffs