Poolz suffers an arithmetic overflow vulnerability attack, resulting in a loss of $665,000.

robot
Abstract generation in progress

Poolz suffers from an arithmetic overflow vulnerability attack, resulting in losses of approximately $665,000.

Recently, an attack on the Poolz platform has drawn attention in the industry. According to on-chain monitoring data, the attack occurred on March 15, 2023, involving multiple networks including Ethereum, BNB Chain, and Polygon. The attacker exploited an arithmetic overflow vulnerability in the smart contract to successfully steal a large amount of tokens, with a total value of approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

The attacker cleverly manipulated the CreateMassPools function, exploiting the integer overflow issue in the getArraySum function. Specifically, the attacker constructed a special input array that caused the cumulative result to exceed the range of uint256, resulting in a return value of 1 from the function. However, the contract still used the original _StartAmount value when recording the pool attributes, leading to significant financial losses.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

The stolen assets include various ERC-20 tokens, such as MEE, ESNC, DON, ASW, KMON, POOLZ, etc. The attacker has exchanged some of the profited tokens for BNB, but so far, these funds have not been transferred out of the attacker's address.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident once again highlights the importance of security audits for smart contracts. To prevent similar arithmetic overflow issues, professionals recommend that developers use newer versions of the Solidity programming language, as these versions automatically perform overflow checks during compilation. For projects using older versions of Solidity, it may be advisable to incorporate OpenZeppelin's SafeMath library to enhance the security of the contracts.

This attack incident reminds us that while blockchain technology is rapidly developing, security issues should always be taken seriously. Development teams should place greater emphasis on contract audits and implement comprehensive security measures to protect user assets from similar attacks.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
DuckFluffvip
· 08-17 19:51
It's not the first time suffering, is it?
View OriginalReply0
WinterWarmthCatvip
· 08-14 22:23
Another overflow... Was this code audit in vain?
View OriginalReply0
NFTragedyvip
· 08-14 22:20
Hurry up with this wave! 665,000 has disappeared in a day.
View OriginalReply0
AirdropSkepticvip
· 08-14 22:15
With this little money, how can you even dare to blackmail? No wonder people say that layer2 has poor security.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)