{"id":9031,"date":"2025-05-27T16:53:26","date_gmt":"2025-05-27T16:53:26","guid":{"rendered":"https:\/\/cryptonewsdesk.com\/?p=9031"},"modified":"2025-05-27T16:53:27","modified_gmt":"2025-05-27T16:53:27","slug":"cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability","status":"publish","type":"post","link":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/","title":{"rendered":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability"},"content":{"rendered":"\n<p><strong>Cetus<\/strong>, a major decentralized exchange (DEX) operating on the <strong>Sui blockchain<\/strong>, has released a detailed post-mortem report following a devastating <strong>$223 million exploit<\/strong> that occurred on <strong>May 22<\/strong>. The attack targeted Cetus\u2019 <strong>concentrated liquidity market maker (CLMM) pools<\/strong>, exposing a critical vulnerability in its smart contract infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exploit Rooted in Third-Party Code Error<\/h3>\n\n\n\n<p>According to Cetus\u2019 <strong>incident report published on May 26<\/strong>, the exploit was triggered by a <strong>bug in an open-source library<\/strong> used in the platform\u2019s smart contracts. The vulnerability stemmed from a <strong>faulty overflow check<\/strong>\u2014specifically, an error in how the code validated large numerical values using a <strong>left-shift operation<\/strong>, allowing malicious actors to manipulate the protocol\u2019s liquidity logic.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThis issue has nothing to do with the MAX_U64 arithmetic bug flagged in previous audits,\u201d Cetus clarified. \u201cThe root cause was a faulty left-shift overflow check that incorrectly validated values beyond safe limits.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>The attacker leveraged <strong>flash swaps<\/strong>, a feature allowing users to borrow tokens without upfront capital, provided the loan is repaid within the same transaction. This tool was used to manipulate pool prices and inject fake liquidity using a small number of tokens. The attacker then siphoned out large amounts of real tokens over several rounds.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quick Action Minimizes Damage<\/h3>\n\n\n\n<p>Cetus\u2019 security systems detected abnormal activity within <strong>10 minutes<\/strong> of the exploit. The team immediately paused trading and contacted <strong>Sui validators<\/strong>, who subsequently froze the attacker\u2019s wallets on the network\u2014an unprecedented move that successfully <strong>locked approximately $162 million<\/strong> of the stolen funds. However, the remainder of the funds was quickly bridged to Ethereum, placing them out of reach.<\/p>\n\n\n\n<p>The total value locked (TVL) across the Sui network plummeted from <strong>$2.13 billion to $1.92 billion<\/strong> following the exploit. Cetus\u2019 native token, <strong>CETUS<\/strong>, dropped <strong>40%<\/strong>, and the shockwaves briefly caused <strong>USDC<\/strong> on Sui to <strong>lose its dollar peg<\/strong> due to a temporary liquidity crunch.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Roadmap for Recovery<\/h3>\n\n\n\n<p>In the wake of the exploit, Cetus has pledged to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Re-audit all smart contracts<\/strong> with improved security standards<\/li>\n\n\n\n<li>Enhance real-time <strong>monitoring and anomaly detection<\/strong> systems<\/li>\n\n\n\n<li>Develop a <strong>liquidity recovery plan<\/strong> with ecosystem partners<\/li>\n\n\n\n<li>Coordinate with Sui validators on <strong>on-chain votes to assist users<\/strong> in recovering lost assets<\/li>\n<\/ul>\n\n\n\n<p>The platform has also offered a <strong>$6 million \u201cwhite hat\u201d bounty<\/strong> to the attacker. Under the proposal, the hacker would return the funds, keep the bounty, and avoid legal prosecution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Community Reaction: Security vs. Decentralization<\/h3>\n\n\n\n<p>While many applauded the rapid response from the <strong>Sui validator community<\/strong>, others expressed concern over the centralized power implied by the ability to freeze wallets. The debate highlights the ongoing tension in DeFi between <strong>security interventions<\/strong> and <strong>decentralized principles<\/strong>.<\/p>\n\n\n\n<p>The Cetus hack underscores the critical importance of secure smart contract architecture and highlights vulnerabilities that can arise even from <strong>third-party code dependencies<\/strong>. As Cetus and the broader Sui ecosystem move into recovery mode, the event may serve as a catalyst for stronger cross-platform security standards and a reevaluation of trust models within DeFi.<\/p>\n\n\n\n<p><em>Disclaimer: This article is for informational purposes only and does not constitute financial or legal advice.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cetus, a major decentralized exchange (DEX) operating on the Sui blockchain, has released a detailed post-mortem report following a devastating $223 million exploit that occurred on May 22. The attack targeted Cetus\u2019 concentrated liquidity market maker (CLMM) pools, exposing a critical vulnerability in its smart contract infrastructure. Exploit Rooted in Third-Party Code Error According to&#8230;<\/p>\n","protected":false},"author":3,"featured_media":9032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[73,63],"tags":[1070,667,603],"class_list":["post-9031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","category-crypto-news","tag-cetus","tag-decentralization","tag-dex"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News<\/title>\n<meta name=\"description\" content=\"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News\" \/>\n<meta property=\"og:description\" content=\"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Crypto News\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-27T16:53:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T16:53:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Digital Vibe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Vibe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/\"},\"author\":{\"name\":\"Digital Vibe\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#\\\/schema\\\/person\\\/56afc0b5a42e13762ccad410f131f96a\"},\"headline\":\"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability\",\"datePublished\":\"2025-05-27T16:53:26+00:00\",\"dateModified\":\"2025-05-27T16:53:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/\"},\"wordCount\":506,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/101-7.png\",\"keywords\":[\"cetus\",\"decentralization\",\"DEX\"],\"articleSection\":[\"Blockchain\",\"Crypto News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/\",\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/\",\"name\":\"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/101-7.png\",\"datePublished\":\"2025-05-27T16:53:26+00:00\",\"dateModified\":\"2025-05-27T16:53:27+00:00\",\"description\":\"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/101-7.png\",\"contentUrl\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/101-7.png\",\"width\":1920,\"height\":1080,\"caption\":\"Cetus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/2025\\\/05\\\/27\\\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cryptonewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/\",\"name\":\"Crypto News\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cryptonewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#organization\",\"name\":\"Crypto News\",\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Crypto-NEWS.png\",\"contentUrl\":\"https:\\\/\\\/cryptonewsdesk.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Crypto-NEWS.png\",\"width\":500,\"height\":500,\"caption\":\"Crypto News\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/crypto-news-desk\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cryptonewsdesk.com\\\/#\\\/schema\\\/person\\\/56afc0b5a42e13762ccad410f131f96a\",\"name\":\"Digital Vibe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g\",\"caption\":\"Digital Vibe\"},\"url\":\"https:\\\/\\\/cryptonewsdesk.com\\\/index.php\\\/author\\\/digital-vibe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News","description":"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News","og_description":"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.","og_url":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/","og_site_name":"Crypto News","article_published_time":"2025-05-27T16:53:26+00:00","article_modified_time":"2025-05-27T16:53:27+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7-1024x576.png","type":"image\/png"}],"author":"Digital Vibe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Digital Vibe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#article","isPartOf":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/"},"author":{"name":"Digital Vibe","@id":"https:\/\/cryptonewsdesk.com\/#\/schema\/person\/56afc0b5a42e13762ccad410f131f96a"},"headline":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability","datePublished":"2025-05-27T16:53:26+00:00","dateModified":"2025-05-27T16:53:27+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/"},"wordCount":506,"commentCount":0,"publisher":{"@id":"https:\/\/cryptonewsdesk.com\/#organization"},"image":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7.png","keywords":["cetus","decentralization","DEX"],"articleSection":["Blockchain","Crypto News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/","url":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/","name":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability - Crypto News","isPartOf":{"@id":"https:\/\/cryptonewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7.png","datePublished":"2025-05-27T16:53:26+00:00","dateModified":"2025-05-27T16:53:27+00:00","description":"Cetus DEX reveals details of a $223M exploit caused by a third-party code vulnerability. The Sui-based platform halted trading, froze attacker wallets, and launched recovery efforts, raising critical questions about DeFi security and decentralization.","breadcrumb":{"@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#primaryimage","url":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7.png","contentUrl":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/05\/101-7.png","width":1920,"height":1080,"caption":"Cetus"},{"@type":"BreadcrumbList","@id":"https:\/\/cryptonewsdesk.com\/index.php\/2025\/05\/27\/cetus-dex-publishes-post-mortem-on-223m-exploit-blames-third-party-code-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptonewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Cetus DEX Publishes Post-Mortem on $223M Exploit, Blames Third-Party Code Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/cryptonewsdesk.com\/#website","url":"https:\/\/cryptonewsdesk.com\/","name":"Crypto News","description":"","publisher":{"@id":"https:\/\/cryptonewsdesk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptonewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cryptonewsdesk.com\/#organization","name":"Crypto News","url":"https:\/\/cryptonewsdesk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonewsdesk.com\/#\/schema\/logo\/image\/","url":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/04\/Crypto-NEWS.png","contentUrl":"https:\/\/cryptonewsdesk.com\/wp-content\/uploads\/2025\/04\/Crypto-NEWS.png","width":500,"height":500,"caption":"Crypto News"},"image":{"@id":"https:\/\/cryptonewsdesk.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/crypto-news-desk"]},{"@type":"Person","@id":"https:\/\/cryptonewsdesk.com\/#\/schema\/person\/56afc0b5a42e13762ccad410f131f96a","name":"Digital Vibe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37e93c2e55bfd306b5f3247c0ce7dba6687533106a6330857687e3dcd20fc018?s=96&d=mm&r=g","caption":"Digital Vibe"},"url":"https:\/\/cryptonewsdesk.com\/index.php\/author\/digital-vibe\/"}]}},"_links":{"self":[{"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/9031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=9031"}],"version-history":[{"count":1,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/9031\/revisions"}],"predecessor-version":[{"id":9033,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/9031\/revisions\/9033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/media\/9032"}],"wp:attachment":[{"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=9031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=9031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptonewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=9031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}