Poolz suffers from arithmetic overflow attack, with multi-chain losses nearing $670,000.

robot
Abstract generation in progress

Poolz encounters arithmetic overflow vulnerability attack, resulting in a loss of nearly $670,000

Recently, an attack on the multi-chain Poolz project has attracted widespread attention in the industry. According to on-chain monitoring data, the attack occurred on March 15, 2023, involving multiple public chains such as Ethereum, BNB Chain, and Polygon.

This attack resulted in a large number of tokens being stolen, including tokens from multiple projects such as MEE, ESNC, DON, ASW, KMON, and POOLZ. Preliminary estimates suggest that the total value of the stolen assets is approximately $665,000. Currently, some of the stolen tokens have been exchanged by the attackers for BNB, but they have not yet been transferred out of the addresses controlled by the attackers.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

Analysis shows that this attack primarily exploited an arithmetic overflow vulnerability in the Poolz project's smart contract. The attacker triggered the integer overflow by cleverly constructing input parameters while creating liquidity pools in bulk, thereby achieving the goal of obtaining a large amount of liquidity with a very small number of tokens.

Specifically, the attacker first exchanged a small amount of MNZ tokens on a certain decentralized exchange. Subsequently, the attacker called the CreateMassPools function in the Poolz contract, which allows users to create liquidity pools in bulk and provide initial liquidity. The issue lies in the getArraySum function, which is used to calculate the total amount of initial liquidity provided by the user.

Poolz was attacked due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The attacker carefully constructed an array containing extremely large values as input parameters. When these values were summed, integer overflow occurred, resulting in a huge discrepancy between the actual number of tokens transferred and the recorded number. Ultimately, the attacker only transferred 1 token but recorded a massive liquidity value in the contract.

After completing the above operation, the attacker immediately called the withdraw function to extract funds, easily completing the entire attack process.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

This incident highlights once again the dangers of arithmetic overflow issues in smart contracts. To mitigate similar risks, industry experts recommend that developers use newer versions of the Solidity programming language, which automatically perform overflow checks during the compilation process. For projects using older versions of Solidity, it may be advisable to incorporate mature security libraries such as OpenZeppelin to address integer overflow issues.

This incident reminds us that contract security is always a key issue that cannot be ignored in the blockchain ecosystem. Project teams need to continuously strengthen code audits and security testing, while users should remain vigilant and carefully assess the associated risks when participating in new projects.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Share
Comment
0/400
PositionPhobiavip
· 14h ago
Lost badly, can't even execute a stop loss.
View OriginalReply0
StrawberryIcevip
· 14h ago
So many vulnerabilities, which contract is reliable!
View OriginalReply0
InscriptionGrillervip
· 15h ago
Another beautiful example of zeroing out, always being played for suckers.
View OriginalReply0
SeasonedInvestorvip
· 15h ago
Being sheared again! What contract was tested?
View OriginalReply0
SchrodingersPapervip
· 15h ago
Got sheared again? Still not testing the overflow with contracts! So bad!
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)