Poolz suffers from arithmetic overflow attack, multi-chain losses amounting to $665,000.

robot
Abstract generation in progress

Poolz suffers from arithmetic overflow attack, resulting in a loss of approximately 665K USD

Recently, an attack on the Poolz platform has attracted widespread attention from the cryptocurrency community. The attacker exploited an arithmetic overflow vulnerability in the smart contract, successfully stealing approximately $665,000 worth of crypto assets from multiple networks including Ethereum, BNB Chain, and Polygon.

According to on-chain data, the attack occurred on March 15, 2023, involving multiple tokens including MEE, ESNC, DON, ASW, KMON, and POOLZ. The attacker cleverly exploited a vulnerability in the CreateMassPools function of the Poolz platform.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The core issue of the attack lies in the getArraySum function. This function was supposed to be used to calculate the initial liquidity when users batch create pools, but due to integer overflow, attackers only needed to transfer a minimal amount of tokens to create pools with a large amount of false liquidity. Subsequently, the attackers withdrew the incorrectly recorded amount of tokens using the withdraw function.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in losses of approximately 665K USD!

Technical analysis shows that the attackers first exchanged a small amount of MNZ tokens through a certain decentralized exchange. Then, they called the vulnerable CreateMassPools function, passing in carefully crafted parameters that caused the _StartAmount array to exceed the maximum value of uint256 during accumulation, resulting in an overflow. This made the system mistakenly believe that the attackers had provided a large amount of liquidity, when in fact only 1 token was transferred.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

To prevent such issues from occurring again, industry experts recommend that developers use newer versions of the Solidity programming language, which automatically perform overflow checks during compilation. For projects using older versions of Solidity, it is advisable to incorporate OpenZeppelin's SafeMath library to handle integer operations, thereby avoiding overflow risks.

This event once again highlights the importance of security audits for smart contracts. With the continuous development of the decentralized finance (DeFi) ecosystem, project teams need to pay more attention to code security, conduct regular security checks, and promptly fix potential vulnerabilities to protect user asset safety.

Poolz suffers an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Repost
  • Share
Comment
0/400
token_therapistvip
· 08-16 08:04
Playing the old trap of overflow again.
View OriginalReply0
faded_wojak.ethvip
· 08-16 07:40
Another one is doomed, sad
View OriginalReply0
LiquidatedTwicevip
· 08-16 07:38
Another smart contracts vulnerability
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)