The Poolz project was attacked, resulting in a loss of $665,000 across multiple chains.

Poolz project suffers an attack, resulting in a loss of approximately $665,000

Recently, a security incident involving multiple blockchains has drawn industry attention. According to on-chain monitoring data, on the early morning of March 15, the Poolz project on the Ethereum, Binance, and Polygon networks was attacked, resulting in a significant loss of tokens, with a total value of approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The attacker exploited an arithmetic overflow vulnerability in the smart contract and successfully extracted multiple tokens from the project, including MEE, ESNC, DON, ASW, KMON, POOLZ, etc. Currently, some of the stolen tokens have been exchanged for BNB, but the funds have not yet been transferred.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The recent attack primarily targeted the CreateMassPools function of the Poolz project. This function was originally designed to batch create liquidity pools and provide initial liquidity. However, due to an integer overflow issue in the getArraySum function, the attacker was able to exploit this vulnerability. By passing in specific parameters, the accumulated result exceeded the range of uint256, causing the function to return a value of 1. This allowed the attacker to record a liquidity amount in the system that was far greater than the actual quantity by only transferring 1 token.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

Subsequently, the attacker called the withdraw function to extract the tokens, completing the entire attack process.

To prevent similar incidents from happening again, industry experts recommend that developers use newer versions of Solidity for compilation, as these versions automatically perform overflow checks. For projects using lower versions of Solidity, it is advisable to consider incorporating OpenZeppelin's SafeMath library to address integer overflow issues.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

This incident reminds us once again that security is crucial in smart contract development. Developers need to pay extra attention to potential arithmetic overflow risks and take necessary precautions. At the same time, conducting regular security audits is also an important means of ensuring project safety.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Repost
  • Share
Comment
0/400
DefiSecurityGuardvip
· 22h ago
Another typical overflow exploit
Reply0
BearEatsAllvip
· 22h ago
Another smart contract has been exploited.
View OriginalReply0
MoonBoi42vip
· 23h ago
Speechless, it's this kind of thing again.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)