Advertisement
New Zealand markets close in 2 hours 37 minutes
  • NZX 50

    11,764.99
    -71.05 (-0.60%)
     
  • NZD/USD

    0.5857
    -0.0049 (-0.83%)
     
  • NZD/EUR

    0.5515
    -0.0030 (-0.54%)
     
  • ALL ORDS

    7,786.40
    -112.50 (-1.42%)
     
  • ASX 200

    7,532.50
    -109.60 (-1.43%)
     
  • OIL

    85.59
    +2.86 (+3.46%)
     
  • GOLD

    2,425.60
    +27.60 (+1.15%)
     
  • NASDAQ

    17,394.31
    -99.31 (-0.57%)
     
  • FTSE

    7,877.05
    +29.06 (+0.37%)
     
  • Dow Jones

    37,775.38
    +22.07 (+0.06%)
     
  • DAX

    17,837.40
    +67.38 (+0.38%)
     
  • Hang Seng

    16,240.66
    -145.21 (-0.89%)
     
  • NIKKEI 225

    36,877.54
    -1,202.16 (-3.16%)
     
  • NZD/JPY

    90.0470
    -1.2070 (-1.32%)
     

'Copycats' Stole $88M During Nomad Exploit by Copying Attacker's Code: Coinbase

Some 88% of the exploiters behind Nomad’s bridge attack were likely those who merely copied the key attacker’s code and executed their own attack, new research from crypto exchange Coinbase (COIN) estimated this week.

Nomad, a cross-chain bridge that allowed users to send and receive tokens between different blockchains, was exploited in early August for over $190 million, or about the entirety of its token reserves.

The Coinbase research shows some 88% of all addresses that conducted the exploit were identified as “copycats” that together stole about $88 million in tokens from the bridge.

“The majority of copycats used a variation of the original exploit by simply modifying targeted tokens, amounts and recipient addresses,” Coinbase researchers said.

ADVERTISEMENT

“While the majority of valuable tokens were claimed by just two of the original exploiters’ addresses, hundreds of others were able to claim part of the bridge’s holdings,” the researchers added.

Nomad did not return requests for comment at press time.

Two addresses stole a majority of the funds from Nomad amid
Two addresses stole a majority of the funds from Nomad amid

On Twitter, Paradigm researcher @samczsun explained that a recent update of one of Nomad’s smart contracts made it easy for users to spoof transactions, as previously reported.

This meant users were able to withdraw money from the Nomad bridge that didn’t actually belong to them. And unlike some bridge attacks, where a single culprit is behind the entire exploit, the Nomad attack was a free-for-all.

“... [Y]ou didn't need to know about Solidity or Merkle Trees or anything like that. All you had to do was find a transaction that worked, find/replace the other person's address with yours, and then re-broadcast it,” @samczsun said in a tweet in early August.

Such a scenario allowed early observers of the exploit to merely copy the attacker’s code, add their addresses and broadcast the changed code to the network in order to steal funds from Nomad.

This also caused the original exploiters “to compete against hundreds of copycats” for their attack, the Coinbase researchers pointed out.

Meanwhile, Nomad is currently working with security agencies and ethical hackers to recover part of the stolen funds and launched a bounty program last week. Over $25 million in funds have been returned as of Aug. 10, but most of it remains missing.