Poolz suffers from an arithmetic overflow attack, losing $665,000.

robot
Abstract generation in progress

Poolz suffers an attack resulting in a loss of approximately $665,000

Recently, an attack on Poolz has garnered widespread attention from the cryptocurrency community. According to on-chain data, the attack occurred on March 15, 2023, involving multiple networks such as Ethereum, BNB Chain, and Polygon. The attackers exploited an arithmetic overflow vulnerability in the smart contract, successfully stealing a large number of tokens with a total value of nearly $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K dollars!

This attack involved multiple tokens, including MEE, ESNC, DON, ASW, KMON, POOLZ, and others. Some of the tokens obtained by the attackers have been exchanged for BNB, but as of now, these funds have not been transferred.

The attack process is mainly divided into three steps:

  1. The attacker first exchanged a certain amount of MNZ tokens through a decentralized exchange.

  2. Subsequently, the attacker called the CreateMassPools function. This function was supposed to allow users to create liquidity pools in bulk and provide initial liquidity. However, due to an arithmetic overflow issue in the getArraySum function, the attacker was able to exploit this vulnerability. Specifically, the _StartAmount array passed by the attacker contained values exceeding the uint256 limit, resulting in an overflow of the accumulated result, with the final return value being 1. This allowed the attacker to record a liquidity far exceeding the actual amount in the system by transferring just 1 token.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

  1. Finally, the attacker completed the entire attack process by calling the withdraw function to extract the tokens.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident once again highlights the importance of smart contract security, especially the caution needed when handling large numerical calculations. To prevent similar issues, developers should consider using newer versions of the Solidity programming language, which automatically perform overflow checks during the compilation process. For projects using older versions of Solidity, it is recommended to adopt the SafeMath library provided by OpenZeppelin to prevent integer overflow issues.

This attack incident reminds us that in the rapidly evolving blockchain field, security is always the primary consideration. Project teams need to continuously review and update their security measures, while users should also remain vigilant and cautiously participate in various DeFi activities.

Poolz was attacked due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Share
Comment
0/400
Degentlemanvip
· 07-29 13:32
Another smart contracts overflow, tsk tsk.
View OriginalReply0
MevTearsvip
· 07-29 09:17
Again being Clip Coupons.
View OriginalReply0
BearMarketSurvivorvip
· 07-29 09:14
Newbie Tutorial on How to Play with Fire - Lesson One
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)