Poolz platform was attacked by hackers, $665,000 worth of tokens were stolen.

robot
Abstract generation in progress

Poolz platform was attacked, resulting in a loss of approximately $665,000.

On March 15th, the Poolz platform on Ethereum, Binance Smart Chain, and Polygon networks was attacked by hackers in the early morning. According to data platform monitoring, this attack resulted in the theft of various tokens, including MEE, ESNC, DON, ASW, KMON, and POOLZ, with a total value of approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

The attacker exploited an arithmetic overflow vulnerability in the Poolz platform's smart contract. Specifically, the issue lies in the getArraySum function within the CreateMassPools function. This function does not properly handle the overflow situation that may occur when adding large numbers while calculating the initial liquidity for users creating pools in bulk.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

The attack process is as follows:

  1. The attacker first exchanged some MNZ tokens at a certain decentralized exchange.

  2. Subsequently, the CreateMassPools function was called with carefully crafted parameters, causing the getArraySum function to return an overflow value. This resulted in the recorded liquidity amount in the system being far greater than the actual number of tokens transferred in.

  3. Finally, the attacker extracted tokens far exceeding the actual amount deposited through the withdraw function, completing the attack.

Poolz suffered an attack due to arithmetic overflow issues, resulting in a loss of approximately 665K USD!

This incident once again highlights the importance of correctly handling integer operations in smart contract development. To prevent similar issues, developers should consider using a newer version of the Solidity compiler, which has a built-in overflow check mechanism. For projects using earlier versions of Solidity, third-party security libraries can be adopted to mitigate the risk of integer overflow.

Currently, the stolen funds have not been fully transferred, and some have been exchanged for BNB. Relevant parties are conducting further investigations and tracking. This incident reminds DeFi project teams to pay more attention to the security of smart contracts, conduct regular code audits, and take necessary security measures to protect user assets.

Poolz suffered an attack due to arithmetic overflow issues, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Share
Comment
0/400
ApeWithAPlanvip
· 07-24 16:17
Beware of smart contracts, there are many traps.
View OriginalReply0
BTCBeliefStationvip
· 07-23 08:49
Has the contract been reviewed before going live?
View OriginalReply0
CryptoMotivatorvip
· 07-23 08:48
Can this contract audit be saved?
View OriginalReply0
zkProofInThePuddingvip
· 07-23 08:44
It's a bit tragic.
View OriginalReply0
MEVVictimAlliancevip
· 07-23 08:38
Have you been sheared for rice again? Show off.
View OriginalReply0
BearMarketMonkvip
· 07-23 08:38
Suckers are once again undergoing a wave of cleansing; the market cycle is nothing more than this.
View OriginalReply0
NotFinancialAdvicevip
· 07-23 08:24
Another contract vulnerability~
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)