Poolz suffers from an arithmetic overflow attack, with a loss of $665,000 across multiple chains.

robot
Abstract generation in progress

Poolz suffers from an arithmetic overflow vulnerability attack, resulting in losses of up to $665,000.

Recently, an attack on the cross-chain platform Poolz has attracted industry attention. The attacker exploited an arithmetic overflow vulnerability in the smart contract, successfully stealing a large amount of tokens from multiple networks including Ethereum, BNB Chain, and Polygon, with estimated losses of about $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

According to on-chain data, the attack occurred in the early hours of March 15, 2023. The attackers obtained various tokens, including MEE, ESNC, DON, ASW, KMON, POOLZ, etc. Currently, some of the stolen funds have been exchanged for BNB but have not yet been transferred to other addresses.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

The attacker primarily exploited a vulnerability in the CreateMassPools function of the Poolz smart contract. This function allows users to create liquidity pools in bulk and provide initial liquidity. The issue lies in the getArraySum function, which is used to calculate the amount of tokens being transferred in. The attacker crafted input data in such a way that the cumulative result exceeded the range of uint256 type, causing an overflow that resulted in a return value of 1.

Poolz suffered an attack due to an arithmetic overflow issue, with losses of about $665K!

This arithmetic overflow allows an attacker to record a massive liquidity amount far exceeding the actual quantity in the system by simply transferring 1 token. Subsequently, the attacker easily withdrew a large amount of unauthorized tokens by calling the withdraw function.

To prevent similar incidents from happening again, security experts recommend that developers use a newer version of Solidity for contract compilation, as the new versions automatically perform overflow checks. For projects using older versions of Solidity, it may be worth considering the introduction of OpenZeppelin's SafeMath library to address integer overflow issues.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

This event highlights the importance of security audits for smart contracts once again, especially when dealing with large numerical calculations which require extra caution. For DeFi projects, comprehensive security testing and regular code reviews are key measures to ensure the safety of user funds.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 9
  • Share
Comment
0/400
liquiditea_sippervip
· 07-23 19:26
Another overflow attack, it never ends.
View OriginalReply0
OnchainDetectivevip
· 07-23 18:30
The wallet address for the overflow attack has long had suspicious interaction records. Uh-huh.
View OriginalReply0
MevShadowrangervip
· 07-22 14:54
It's the same old trap of overflow...
View OriginalReply0
LonelyAnchormanvip
· 07-20 20:07
Another old project has gone cold.
View OriginalReply0
WalletDivorcervip
· 07-20 20:06
This is too short, isn't it?
View OriginalReply0
HodlNerdvip
· 07-20 19:59
statistically speaking, these overflow bugs are getting predictable... need better game theory analysis tbh
Reply0
Blockwatcher9000vip
· 07-20 19:56
Is it another overflow vulnerability?
View OriginalReply0
NeverVoteOnDAOvip
· 07-20 19:53
This bug is caught precisely every time.
View OriginalReply0
0xSherlockvip
· 07-20 19:50
Once again being exploited.
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)