Poolz was attacked by a Hacker, resulting in a loss of $665,000 across multiple chains.

robot
Abstract generation in progress

Poolz was attacked, resulting in a loss of approximately $665,000

Recently, the Poolz platform experienced a serious security incident, resulting in a loss of approximately $665,000. This attack involved multiple blockchains, including Ethereum, BNB Smart Chain, and Polygon.

The attacker exploited an arithmetic overflow vulnerability in the Poolz contract. Specifically, the issue occurs in the getArraySum function within the CreateMassPools function. This function fails to properly handle large numbers when calculating the token amount, leading to an overflow that allows the attacker to acquire a large number of tokens at a very low cost.

The attack process is roughly as follows:

  1. The attacker first exchanged a small amount of MNZ tokens on a certain DEX.

  2. Then called the vulnerable CreateMassPools function. This function was supposed to allow users to create liquidity pools in bulk and provide initial liquidity.

  3. By carefully crafted parameters, the attacker triggered an integer overflow in the getArraySum function. This caused the system to erroneously believe that the attacker had provided a large amount of tokens, while in fact only a very small amount was transferred.

  4. Finally, the attacker withdrew tokens that did not belong to them through the withdraw function, completing the attack.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident involves multiple tokens, including MEE, ESNC, DON, ASW, KMON, POOLZ, and others. The attacker has converted some of the profits into BNB, but as of the time of reporting, the funds have not yet been withdrawn.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

To prevent similar issues, security experts recommend that developers use newer versions of the Solidity programming language, which automatically perform overflow checks during compilation. For projects using older versions of Solidity, it may be worth considering the use of OpenZeppelin's SafeMath library to prevent integer overflow.

Poolz was attacked due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident underscores the importance of conducting rigorous security audits in smart contract development, especially when dealing with functions that involve significant computations. It also reminds investors and users to be cautious with emerging DeFi projects and to constantly monitor the security status of these projects.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Repost
  • Share
Comment
0/400
ser_we_are_ngmivip
· 11h ago
Another overflow vulnerability, falling endlessly.
View OriginalReply0
BlockchainThinkTankvip
· 11h ago
Based on experience, such overflow vulnerabilities belong to the basic level of the development team. It is recommended to stay away from such projects.
View OriginalReply0
NFTRegretDiaryvip
· 11h ago
Another overflow vulnerability, smart contracts rookies roll out of the arena.
View OriginalReply0
MEVHunterBearishvip
· 11h ago
Got sheared again.
View OriginalReply0
MeltdownSurvivalistvip
· 11h ago
Another hacker has become rich.
View OriginalReply0
MevHuntervip
· 11h ago
Code never lies. This coin is doomed.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)