Poolz protocol suffers from arithmetic overflow attack, resulting in a loss of $665,000.

Poolz protocol encounters arithmetic overflow attack, resulting in a loss of approximately $665,000

Recently, an attack on the Poolz protocol has attracted industry attention. According to on-chain data, the attack occurred on March 15, 2023, involving multiple networks such as Ethereum, BNB Chain, and Polygon. The attacker successfully exploited an arithmetic overflow vulnerability in the smart contract, stealing a large amount of tokens worth approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The attacker mainly targeted the CreateMassPools function of the Poolz protocol. This function was originally intended to allow users to create liquidity pools in bulk and provide initial liquidity. However, due to an arithmetic overflow issue in the getArraySum function, the attacker was able to exploit this vulnerability.

Poolz suffered an attack due to arithmetic overflow issues, resulting in a loss of approximately 665K USD!

Specifically, the attacker passes in a specific _StartAmount array that causes the cumulative result to exceed the maximum value of uint256, resulting in an overflow where the return value is 1. This allows the attacker to record a deposit amount far exceeding the actual amount in the system by transferring just 1 token. Subsequently, the attacker can use the withdraw function to extract these non-existent tokens.

Poolz suffered an attack due to arithmetic overflow issues, resulting in a loss of approximately 665K USD!

This incident involves multiple tokens, including MEE, ESNC, DON, ASW, KMON, POOLZ, etc. The attacker has exchanged some of the profited tokens for BNB, but as of the time of reporting, these funds have not yet been transferred out of the attacker's address.

To prevent similar issues from occurring again, industry experts recommend that developers take the following measures:

  1. Use a newer version of the Solidity compiler, which automatically performs overflow checks during the compilation process.

  2. For projects using lower versions of Solidity, consider introducing OpenZeppelin's SafeMath library to address integer overflow issues.

  3. Strengthen code auditing, with particular attention to functions and operations that may cause arithmetic overflow.

  4. Conduct regular security assessments and vulnerability scans, and promptly fix any identified issues.

Poolz was attacked due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

This incident serves as a reminder to blockchain project developers and users that security should always be the primary consideration in the rapidly evolving cryptocurrency ecosystem. For investors, it is also important to remain vigilant and pay attention to the security and technical strength of the projects.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 2
  • Share
Comment
0/400
MetaNomadvip
· 07-28 09:58
There are a lot of vulnerabilities, and we can barely keep up with the audits.
View OriginalReply0
GasWastervip
· 07-28 09:45
660,000 still have the nerve to come out as a hacker? Noob hacker
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)