White hat: I returned most of the stolen Nomad funds and all I got was this s...

White hat: I returned most of the stolen Nomad funds and all I got was this s...

Metagame's founder, who's behind the NFT offering said he has no idea whether it'll actually incentivize hackers to return funds, but it'll "be cool if it does!" Hackers behind the $190 million Nomad Bridge are now being incentivized with "whitehat" themed non-fungible tokens (NFTs) if they return nearly all of the funds they stole from the protocol at the start of this month. The exclusive NFT, which simply depicts a white wizard’s hat, is being offered by NFT firm Metagame and can be minted by those that return at least 90% of their stolen funds to Nomad.1/ Our friends at @metagame....


Related News

Nomad announces $190 million bounty for lost funds from recent hack

Nomad announced that it’s offering up to a 10% bounty to return funds stolen from the recent hack on the Nomad bridge on Aug. 2. Nomad announced a bounty of up to 10% for the return of the stolen funds from the Nomad bridge. In a website announcement and tweet, the company publicly provided a wallet address for sending the funds. The bounty is applicable to anyone who comes forward from now on or already returned funds. At the time of writing, Nomad recovered more than $20 million. The Nomad token bridge suffered a massive hack on Aug. 2. This incident was among the largest in the history....

White hat hackers have returned $32.6M worth of tokens to Nomad bridge

The cross-chain bridge was drained of its assets in less than three hours. Mere hours after the Nomad token bridge published an Ethereum wallet address last week for the return of funds following a $190 million hack, whitehat hackers have since returned approximately $32.6 million worth of funds. The vast majority of funds consisted of stablecoins USD Coin (USDC), Tether (USDT) and Frax, along with altcoins. According to research published by Paul Hoffman of BestBrokers, the vulnerability of the Nomad protocol was highlighted in Nomad's recent audit by Quantstamp on June 6 and was deemed....

Crema hacker returns $8M, keeps $1.6M in deal with protocol

The Crema Finance team awarded the hacker who made off with nearly $10 million in funds from the protocol 16.7% of the stolen funds as a white hat bounty. The hacker who exploited Solana-based liquidity protocol Crema Finance on July 2 returned most of the funds but was allowed to keep $1.6 million as a white hat bounty.The bounty, 45,455 Solana (SOL), is worth a generous 16.7% of the $9.6 million Crema lost initially, which forced the protocol to suspend services. Crema’s team began an investigation to identify the hacker by tracking their Discord handle and tracing the original gas....

$2B in crypto stolen from cross-chain bridges this year: Chainalysis

The $190 million Nomad Bridge exploit is just the latest out of 13 separate bridge attacks in 2022 so far. Cross-chain bridge hacks have accounted for 69% of the total crypto stolen in 2022, amounting to $2 billion in losses, according to a new report. The report comes from blockchain analytics firm Chainalysis on Aug. 2, noting there have been 13 separate token bridge hacks this year — the most recent being the $190 million Nomad Bridge exploit.Q1 2022 was by far the quarter that saw the most amount of crypto stolen since 2021, due mainly to the Ronin Bridge Attack in late March, which....

Cross-Chain Bridge Nomad Loses $190 Million Making It 2022’s Third-Largest Cr...

On Monday, the cross-chain token bridge Nomad was attacked and hackers managed to siphon $190 million from the protocol, draining a great majority of the funds. The Nomad cross-chain bridge attack was the third-biggest crypto heist of 2022, and the ninth largest of all time. Nomad Cross-Chain Bridge Exploited for $190 Million Cross-chain bridges in the world of decentralized finance (defi) just can’t catch a break no matter how long they have been running and even after the bridges have been audited. On August 1, 2022, the cross-chain bridge Nomad suffered an attack that....