wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2022\/08\/02\/nomad-chaotic-exploit-crypto\/<\/a><\/br> Cross-chain messaging protocol Nomad has become the target of crypto\u2019s latest nine-figure attack after hackers abused a \u201cchaotic\u201d security exploit to steal almost $200 million in digital assets.<\/p>\n Nomad, a token bridge that allows users to send and receive tokens between Avalanche (AVAX), Ethereum (ETH), Evmos (EVMOS), Moonbeam (GLMR) and Milkomeda C1 blockchains, was attacked on Monday, with hackers draining almost all of the protocol\u2019s funds.<\/p>\n Approximately $190.7 million in crypto was stolen from the bridge, according to decentralized finance tracking platform DeFi Llama<\/a>, which shows that the current total value locked \u2014 the amount of user funds deposited in a DeFi protocol \u2014 is less than $12,000 at the time of writing.<\/p>\n Nomad has yet to confirm how hackers were able to steal the funds. But according to samczsun<\/a>, the head of security at web3 investment firm Paradigm<\/a>, a recent update to one of Nomad\u2019s smart contracts made it easy for users to spoof transactions. This meant that when a user transferred funds from one blockchain to another, Nomad allegedly never checked the amount, enabling the user to withdraw funds that didn\u2019t belong to them. For example, a user could send 1 ETH, then manually call the smart contract on the other blockchain to receive 100 ETH. Blockchain audit company Zellic also came to<\/a> the same conclusion.<\/p>\n \u201cIt\u2019s like using a checkbook to withdraw funds from a bank, and the bank doesn\u2019t verify if we actually hold enough money,\u201d Adrian Hetman, tech lead of the triaging team at web3 bug bounty program Immunefi, told TechCrunch. \u201cThey only care that the check itself looks valid.\u201d<\/p>\n
\nHackers abuse \u2018chaotic\u2019 Nomad exploit to drain almost $200M in crypto<\/br>
\n2023-01-20 22:24:13<\/br><\/p>\n