Nemo Protocol Hacked for $2.4M, Funds Bridged to Ethereum


0

Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!

Key Notes

  • Nemo Protocol was hacked.
  • The attacker has already bridged the funds to Ethereum.
  • The protocol didn’t officially post any data about the suspicious movements.

Nemo Protocol, a yield trading protocol based on the Sui SUI $3.41 24h volatility: 0.8% Market cap: $12.18 B Vol. 24h: $729.40 M network, saw a massive exploit early in the morning on Sept. 8.

According to the on-chain security firm PeckShield, hackers drained $2.4 million in USDC USDC $1.00 24h volatility: 0.0% Market cap: $72.60 B Vol. 24h: $7.83 B from the trading protocol.

The attackers soon started moving the stolen USDC from the Arbitrum network and swapped to DAI DAI $1.00 24h volatility: 0.0% Market cap: $4.48 B Vol. 24h: $80.47 M and Ethereum ETH $4 290 24h volatility: 0.2% Market cap: $518.00 B Vol. 24h: $17.43 B . The reason behind the swaps is that Circle, the firm behind the second-largest stablecoin, can freeze the assets — this would’ve left the fraudulent actors with no usable money on the blockchain.

With decentralized assets like DAI or ETH, this is no longer possible.

Hiding behind Maintenance

While Nemo still hasn’t shared the news with its community, many users have been complaining about the company’s maintenance notice.

One of its users posted on X that Nemo hinted at an ongoing maintenance on Sept. 8 and 9 on its Discord “a few hours before they went down.”

The user hinted that the website is “wipe of info.”

Nemo Protocol website showing front-end upgrade notice | Source: app.nemoprotocol.com/market

Data from DefiLlama also shows a $5.3 million decline in Nemo Protocol’s total value locked.

Nemo was the third victim in the industry to lose millions to hackers this month. September kicked off with the $2 million OlaXBT hack, followed by the $8.4 million Bunni protocol exploit. According to a Coinspeaker report, crypto-related hacks have been consistently rising over the past three months. In August alone, hackers stole over $163 million from multiple platforms and companies in the space.

next

Disclaimer: Coinspeaker is committed to providing unbiased and transparent reporting. This article aims to deliver accurate and timely information but should not be taken as financial or investment advice. Since market conditions can change rapidly, we encourage you to verify information on your own and consult with a professional before making any decisions based on this content.

Cryptocurrency News, Cybersecurity News, News, Technology News
Wahid Pessarlay

Wahid has been analyzing and reporting on the latest trends in the decentralized ecosystem since 2019. He has over 4,000 articles to his name and his work has been featured on some of the leading outlets including Yahoo Finance, Investing.com, Cointelegraph, and Benzinga. Other than reporting, Wahid likes to connect the dots between DeFi and macro on his newsletter, On-chain Monk.

Wahid Pessarlay on X



Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!

Don’t miss the Buzz!

We don’t spam! Read our privacy policy for more info.

🤞 Don’t miss the Buzz!

We don’t spam! Read more in our privacy policy


Like it? Share with your friends!

0

0 Comments

Your email address will not be published. Required fields are marked *