Scallop on Sui hit by flash loan + oracle manipulation, $142K drained

Scallop Protocol on Sui was exploited in a flash loan attack that reportedly cost around $142,000 (150,000 SUI). The attacker combined flash-loan borrowing with an oracle price manipulation to depress SUI/USDC rates, borrow at distorted prices, and repay within the same transaction—keeping the price difference. Key detail: the exploit did not break the protocol’s core contracts. Instead, it targeted a deprecated side contract tied to the sSUI rewards pool. Analysts point to an uninitialized variable (“last_index”) in the older V2 contract (left callable on-chain). When a new account was created, the attacker could claim rewards as if they had been staking since the pool’s start. With the spool index growing to ~1.19B over ~20 months, the attacker’s credits mapped 1:1 to available rewards—draining the pool’s ~150K SUI. On-chain traces indicate the stolen funds were quickly routed through a mixing service similar to Tornado Cash on Sui, complicating recovery. Scallop temporarily paused operations, then unfroze core contracts and resumed deposits/withdrawals, stating user deposits remain safe and the incident is contained to the isolated deprecated rewards contract. Market reaction: the article notes SUI price was not significantly impacted at the time of reporting (up ~2% on the day), with SUI trading around $0.94.
Neutral
虽然本次 Scallop Protocol 的 flash loan 攻击造成约 14.2 万美元损失,但事件被定性为“隔离式”的弃用侧合约漏洞,而非核心合约被攻破。该结构性特征通常会降低对整个协议生态与用户资金面的系统性恐慌。 对交易的直接影响更偏向短期:1)Sui 上的 DeFi 存在“旧合约仍可调用”的合约风险溢价,可能促使部分资金短暂回避同类奖励池/预言机依赖产品;2)若后续披露显示更广泛的 oracle/奖励计算问题,风险将被重新定价。但文章同时提到 SUI 当时价格反应有限(约 +2%),且 Scallop 已暂停后恢复、并强调用户存款安全。 从历史上看,类似“flash loan + oracle 操纵”往往先引发局部代币波动与合约审计情绪,随后市场会在确认损失封闭、可恢复性较高时逐步回归。长期影响取决于是否引发更全面的合约清理/审计加速;若仅为个案,市场多会把冲击限制在具体协议与同类合约架构。