Poolz suffers from an arithmetic overflow attack, losing $665,000.

robot
Abstract generation in progress

Poolz suffered an arithmetic overflow attack, resulting in a loss of approximately $665,000.

Recently, the Poolz project on the Ethereum, Binance, and Polygon networks was attacked by hackers, resulting in significant losses. According to on-chain data, the attack occurred on March 15, 2023, involving multiple tokens with a total value of approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of about $665K!

The attacker exploited an arithmetic overflow vulnerability in the Poolz contract to carry out this attack. The main issue occurred in the CreateMassPools function, which allows users to create liquidity pools in bulk and provide initial liquidity. By carefully crafting the input parameters, the attacker caused the getArraySum function to overflow, resulting in a massive value being recorded in the system with only 1 token being transferred in.

Poolz was attacked due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The attack process is as follows:

  1. The attacker first exchanged some MNZ tokens through a decentralized exchange.

  2. Then call the CreateMassPools function, utilizing the vulnerability in the getArraySum function within it. This function returns 1 due to overflow when summing the user input _StartAmount array, while the actual recorded value is a number far greater than this.

  3. Finally, the attacker completed the entire attack process by calling the withdraw function to extract funds.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident once again highlights the seriousness of arithmetic overflow issues in smart contracts. To prevent similar problems, developers should consider using newer versions of the Solidity compiler, which automatically perform overflow checks during the compilation process. For projects using earlier versions of Solidity, third-party security libraries can be utilized to address integer overflow issues.

This attack also reminds us that when dealing with smart contracts that involve a large amount of computation, we must be especially cautious and ensure that all possible edge cases are properly handled. At the same time, conducting regular security audits and implementing bug bounty programs are also effective measures to ensure project safety.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Share
Comment
0/400
LazyDevMinervip
· 07-14 00:24
Hundreds of thousands, water, water.
View OriginalReply0
TokenGuruvip
· 07-12 10:21
Oh no, the old project has also collapsed. Stop transferring money quickly. Don't enter a position by charging coins.
View OriginalReply0
just_another_walletvip
· 07-12 03:38
Another flip happened, sigh.
View OriginalReply0
TokenomicsTherapistvip
· 07-12 03:28
Another unprofessional project is doomed.
View OriginalReply0
FlashLoanLordvip
· 07-12 03:28
Let me help you with the pot.
View OriginalReply0
ForumMiningMastervip
· 07-12 03:20
There are pitfalls in smart contracts every day!
View OriginalReply0
LiquidityWhisperervip
· 07-12 03:14
Another project has Rug Pulled.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)