Poolz suffers from arithmetic overflow attack, losing $665,000.

robot
Abstract generation in progress

Poolz Suffers from Arithmetic Overflow Vulnerability Attack, Resulting in Losses of Approximately $665,000

Recently, an attack on Poolz has attracted widespread attention in the cryptocurrency community. According to on-chain monitoring data, the attack occurred on March 15, 2023, involving multiple chains including Ethereum, BNB Chain, and Polygon. This attack resulted in losses of various tokens, with a total value of approximately $665,000.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately 665K USD!

An attacker exploited an arithmetic overflow vulnerability in the Poolz smart contract. Specifically, the issue lies in the getArraySum function within the CreateMassPools function. This function, when calculating the number of tokens, results in a mismatch between the actual number of tokens transferred and the recorded amount due to the overflow problem.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

The attack process is roughly as follows:

  1. The attacker first exchanged some MNZ tokens on a decentralized exchange.

  2. Then the CreateMassPools function was called. This function was supposed to allow users to create liquidity pools in bulk and provide initial liquidity.

  3. During the CreatePool process, due to the overflow issue of the getArraySum function, an attacker only needs to transfer 1 token, but the system records a value that is far greater than the actual amount.

  4. Finally, the attacker withdrew tokens far exceeding the actual amount deposited through the withdraw function, thereby completing the attack.

Poolz suffered an attack due to an arithmetic overflow issue, resulting in a loss of approximately $665K!

This incident once again highlights the importance and potential risks of arithmetic operations in smart contracts. To prevent similar issues, developers should consider using newer versions of the Solidity compiler, which automatically perform overflow checks. For projects using older versions of Solidity, it is recommended to use OpenZeppelin's SafeMath library to handle integer operations and avoid overflow risks.

This event reminds us that security should always be the primary consideration in blockchain and smart contract development. Regular code audits, using verified libraries, and implementing comprehensive security measures are crucial for protecting user assets and maintaining the project's reputation.

Poolz suffered an attack due to an arithmetic overflow issue, losing approximately $665K!

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 2
  • Share
Comment
0/400
GweiTooHighvip
· 08-01 23:00
It's an overflow again. There are still projects making such a basic mistake.
View OriginalReply0
bridge_anxietyvip
· 08-01 22:58
This old project also has vulnerabilities? It's hard to hold on.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)