According to PANews, Slow Mist released an analysis of the Cetus theft incident, where attackers crafted parameters carefully to cause an overflow while bypassing detection, exchanging a small amount of token for a large amount of liquidity assets. The attackers exploited the defect in the checked_shlw function to obtain assets such as SUI, vSUI, and USDC at the cost of 1 token. Some funds were transferred across chains to EVM addresses via Sui Bridge, and $10 million in assets were deposited into Suilend. Currently, $162 million of the stolen funds have been frozen by the SUI Foundation. Cetus has fixed the vulnerability, and Slow Mist advises developers to strictly validate the boundary conditions of mathematical functions.