Super Sushi Samurai Token Crashes by 99% After Critical Exploit

News Room
By News Room 3 Min Read

Last updated:

| 1 min read

The Super Sushi Samurai (SSS) game experienced a catastrophic security breach, resulting in a 99.9% drop in its token value.

A double-spending glitch was exploited within the game, leading to unauthorized withdrawals totaling $4.8 million from its liquidity pools. This vulnerability, identified in the project’s smart contracts, allowed users to manipulate their token balances.

“We have been exploited, it’s mint related. We are still looking into the code. Tokens were minted and sold into the LP,” Super Sushi Samurai stated on social media.

Double-Spending Glitch with $4.8 Million Loss


According to a Yuga Labs solidity and backend developer “Coffee,” the liquidity pool on the Blast network was depleted due to a flaw in their token contract that caused users’ balances to double when they transferred their entire balance to themselves.

“The order of operations decrements the balance for ‘from’ and then sets the balance for ‘to,’” said Coffee. “If these are the same address, the ‘toBalance’ does not take into affect the decrement of ‘amount’ and just overwrites the balance with the initial balance + transferred amount.”

“Attacker was able to get 1310 ETH from the LP by doubling their balance repeatedly and then selling it all,” said Coffee.

Statistics on CoinGecko showed that the trading price of SSS tokens has plunged over 99.9% since the discovery of the glitch.

On-chain Message Says It’s “White Hat Rescue”


However, an on-chain message claimed that the exploit was initiated by a white hat.

“Hi team, this is a whitehat rescue hack. Let’s work on reimbursing the users. Please reach out via Blockchain chat from the SSS deployer…” the message reads.

The SSS Team has then responded to the message, saying, “Hello white hat, we have reached out to you on Blockscan. Thank you for cooperating with us.”



Read the full article here

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *