On May 22, 2025, Cetus Protocol, one of the leading DeFi protocols on the Sui network, experienced a targeted exploit that resulted in the loss of approximately $223 million in user funds. In response, Cetus Protocol took immediate action to lock its contract, preventing further theft.
As of the announcement, about $162 million of the compromised funds have been successfully paused. While the root cause was traced to a flaw in a math library used by Cetus, not in the Sui blockchain or the Move programming language, the scale of the attack has raised urgent concerns around protocol-level security and ecosystem-wide resilience.
In response, Sui Foundation has announced a comprehensive security push aimed at reinforcing protections for both developers and users building on the network. An important aspect of this initiative is a $10 million commitment towards audits, bug bounty programs, formal verification, and broader security infrastructure. The aim is not just recovery, but long-term structural reinforcement.
The Cetus Incident: What Went Wrong
The attacker leveraged a flaw in the inter_mate open-source library — specifically, a misinterpretation in overflow handling using the left-shift operation. By exploiting this bug, the attacker was able to manipulate the pool’s tick and liquidity parameters to inject artificial liquidity and drain reserves across multiple iterations.
This was not a failure of the Sui network or Move itself, but a stark reminder that even carefully audited contracts can fall victim to overlooked logic in third-party dependencies.
Key timestamps from the incident response illustrate a swift and coordinated effort
- Anomaly detection and escalation occurred within minutes of the exploit.
- Core pool contracts were disabled less than 30 minutes after the attack began.
- Sui validators acted quickly to freeze the attacker’s addresses, pausing over $160M of stolen assets.
- Efforts to recover the remainder continue, involving both technical containment and legal negotiations.
Strengthening Sui’s Security Infrastructure
In the days following the exploit, Sui Foundation made it clear that mitigating the impact is not enough — proactive security must be woven deeper into the ecosystem’s design.Their $10 million initiative will support:
- Independent audits for projects building on Sui, both pre- and post-deployment.
- Expanded bug bounty programs, incentivizing responsible disclosure of vulnerabilities.
- Formal verification efforts, leveraging the precision of Move for stronger guarantees.
- Real-time monitoring tools, such as integrations with platforms like Blockaid for proactive threat detection.
- Validator-level controls, allowing coordinated action during high-risk incidents.
Additionally, Sui intends to work closely with developers to refine best practices around third-party library use, improve test coverage, and publish ongoing metrics to hold contributors accountable to security standards.
Cetus’ Recovery Plan
Cetus has outlined its own roadmap to restoration. Among the immediate steps:
- Re-auditing and validating all smart contracts before reactivating CLMM pools.
- Rolling out TVL-based audit schedules to match security reviews with ecosystem growth.
- Enhanced rate-limiting on asset flows and improved risk configurations.
A recovery vote is underway within the validator community that could enable rapid restoration of frozen assets to affected users. Meanwhile, legal avenues remain open, and the attacker has been given a final opportunity to return funds under white-hat terms.
Cetus’ reflection on the incident is clear: despite multiple rounds of audits and a history of investing in safeguards, the incident has exposed blind spots. The protocol has committed to more rigorous internal controls and greater transparency going forward — acknowledging that protocol security requires vigilance from the entire ecosystem.
This moment represents a critical test — not just of technical resilience, but of how an ecosystem responds under pressure. The Sui Foundation’s decision to allocate $10 million to harden the network sends a strong signal: security is not a feature to be added later, but a responsibility to be continuously upheld.
With coordinated recovery underway, upgraded practices being deployed, and the broader community actively engaged, the Sui ecosystem is positioning itself to emerge stronger. While no system can entirely prevent human error, how an ecosystem learns, adapts, and builds from adversity is what ultimately defines its long-term viability.