{"id":33123,"date":"2022-08-11T02:03:24","date_gmt":"2022-08-11T06:03:24","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=33123"},"modified":"2022-08-11T02:03:28","modified_gmt":"2022-08-11T06:03:28","slug":"report-identifies-88-of-nomad-bridge-exploiters-as-copycats","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/report-identifies-88-of-nomad-bridge-exploiters-as-copycats\/","title":{"rendered":"Report identifies 88% of Nomad Bridge exploiters as &#8220;copycats&#8221;"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">The target token, token amount, and recipient addresses were changed, but the copycats utilized the same code as the original hackers.<\/h5>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-1024x596.jpg\" alt=\"Report identifies 88% of Nomad Bridge exploiters as &quot;copycats&quot;\" class=\"wp-image-33127\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-1024x596.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-300x175.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-768x447.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-150x87.jpg 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-750x437.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4-1140x664.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4.jpg 1264w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Report identifies 88% of Nomad Bridge exploiters as &#8220;copycats&#8221;<\/figcaption><\/figure>\n\n\n\n<p>According to a fresh study, nearly 90% of the addresses involved in the $186 million <a href=\"https:\/\/coinscreed.com\/staging\/the-biggest-crypto-heists-of-all-time-ranked.html\" target=\"_blank\" rel=\"noreferrer noopener\">Nomad Bridge heist<\/a> last week have been identified as &#8220;copycats,&#8221; who stole $88 million worth of tokens on August 1.<\/p>\n\n\n\n<p>Peter Kacherginsky, Coinbase's principal blockchain threat intelligence researcher, and Heidi Wilder, a senior associate of the special investigations team, confirmed in a blog post on August 10 that hundreds of &#8220;copycats&#8221; joined the party after the initial hackers figured out how to steal money in the bridge hack on August 1.<\/p>\n\n\n\n<p>Security researchers claim that the &#8220;copycat&#8221; technique was a version of the first vulnerability, which made use of a flaw in <a href=\"https:\/\/www.google.com\/search?q=Report+identifies+88%25+of+Nomad+Bridge+exploiters+as+%22copycats%22&oq=Report+identifies+88%25+of+Nomad+Bridge+exploiters+as+%22copycats%22&aqs=chrome..69i57.936j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">Nomad's smart contract<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/p>\n\n\n\n<p> to let users withdraw money from the bridge that wasn't actually theirs.<\/p>\n\n\n\n<p>The same code was then replicated by the imitators, but they changed the recipient addresses, target token, and token amount.<\/p>\n\n\n\n<p>Although the initial two hackers were the most successful (in terms of the total amount of money they were able to steal), once the method was discovered by copycats, it became a race among all parties to steal as much money as they could.<\/p>\n\n\n\n<p>The initial hackers first attacked the Bridge's <a href=\"https:\/\/coinscreed.com\/staging\/celsius-transfers-wbtc-worth-529m-to-ftx-exchange.html\" target=\"_blank\" rel=\"noreferrer noopener\">wrapped-Bitcoin (wBTC),<\/a> then USD Coin (USDC), and wrapped-ETH, according to the Coinbase analysts (wETH).<\/p>\n\n\n\n<p>It made sense for the original hackers to extract these tokens first because they were concentrated in the Nomad Bridge in the highest amounts\u2014wBTC, USDC, and wETH.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-white-hat-actions\">White-hat actions<\/h2>\n\n\n\n<p>Surprisingly, the return on Nomad Bridge's request for stolen assets was 17% (as of August 9), with the majority of those tokens being in the form of USDC (30.2%), Tether (USDT) (15.5%), and wBTC (14.0 percent ).<\/p>\n\n\n\n<p>The fact that the bulk of the monies was returned in the form of USDC and USDT shows that the majority of the funds were from white-hat &#8220;copycats,&#8221; as the original hackers mostly exploited wBTC and wETH.<\/p>\n\n\n\n<p>As of August 9, over 49% of the cash that was misused has already been transferred from each of the recipient's addresses.<\/p>\n\n\n\n<p>The first three recipient addresses were funded via Tornado Cash, an Ethereum-based technology that enables anonymous transactions, according to Coinbase's report. All USDC and ETH addresses connected to the protocol were blacklisted by the US Treasury on Monday.<\/p>\n\n\n\n<p>Following the $250 million Wormhole Bridge attack in February and the $540 million Ronin Bridge hack in March, the Nomad Bridge hack has grown to become the fourth <a href=\"https:\/\/coinscreed.com\/staging\/nomad-announces-10-bounty-to-hackers-following-recent-hack.html\" target=\"_blank\" rel=\"noreferrer noopener\">largest DeFi hack<\/a> ever and the third largest in 2022. These cross-chain bridges have been criticized for being overly centralized, which makes them a prime target for attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The target token, token amount, and recipient addresses were changed, but the copycats utilized the same code as the original hackers. According to a fresh study, nearly 90% of the addresses involved in the $186 million Nomad Bridge heist last week have been identified as &#8220;copycats,&#8221; who stole $88 million worth of tokens on August [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":33127,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[11074],"class_list":["post-33123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-nomad-bridge"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/6XZLTT3QH5ANVBA4YHZ7MQE4R4.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/33123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=33123"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/33123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/33127"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=33123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=33123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=33123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}