Warning: exif_imagetype(https://www.wjchyr.com/wp-content/uploads/2018/10/hacker2.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.wjchyr.com/wp-includes/functions.php on line 3314

Warning: file_get_contents(https://www.wjchyr.com/wp-content/uploads/2018/10/hacker2.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.wjchyr.com/wp-includes/functions.php on line 3336

Warning: exif_imagetype(https://www.wjchyr.com/wp-content/uploads/2018/10/hacker2.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.wjchyr.com/wp-includes/functions.php on line 3314

Warning: file_get_contents(https://www.wjchyr.com/wp-content/uploads/2018/10/hacker2.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.wjchyr.com/wp-includes/functions.php on line 3336

Ph365 download apk latest version.FG777 update today,Tp777 casino

News

Hackers stole $2B in crypto from cross-chain bridges this year: Chainalysis report discovers top security risks

Attacks on cross-chain bridge protocols account for 69% of total crypto funds stolen this year

Attacks on cross-chain bridge protocols

Hackers stole $2B in crypto from cross-chain bridges this year: Chainalysis report discovers top security risks. Source: shutterstock.com

Cross-chain bridge hacks have brought fraudsters 69% of the total crypto stolen in 2022 so far, amounting to $2 billion in losses, according to a new Chainalysis report. The analytics registered 13 separate token bridge hacks this year — the most recent being the $190 million Nomad Bridge exploit.

Moreover, Q1 2022 saw the largest amount of crypto stolen since 2021, due mainly to the Ronin Bridge Attack in late March, which brought malefactors $624 million in Ether (ETH) and USD Coin (USDC).

Cross-chain bridges are designed to transfer cryptocurrencies from one blockchain network to another. Their vulnerabilities make bridges the focal point of hacker attacks. According to the Chainalysis report, bridge protocols are often targets because they “feature a central storage point of funds that back the ‘bridged’ assets on the receiving blockchain”. Besides, the more value flows through cross-chain bridges, the more attractive they become for hackers.?

In addition, effective bridge design is still an unresolved technical challenge. Some developers have relatively little understanding of security protocols, making their products vulnerable to exploitation by hackers.

The good news is that cross-chain bridge services can leverage the transparency of blockchain technology to investigate the flow of funds and prevent attackers from cashing out their gains. Nevertheless, cryptocurrency services, including bridges, should start investing in security upgrades and training sooner rather than later. In particular, extremely rigorous code audits should become the gold standard of DeFi, both for those building protocols and for the investors evaluating them.

SEE MORE:

Hackers sell the data of millions car owners for crypto

Japan’s new law will allow the seizure of all stolen crypto funds

Hard, but possible: getting back your stolen crypto wallet

Nina Bobro

1604 Posts 0 Comments

https://www.wjchyr.com/

Nina is passionate about financial technologies and environmental issues, reporting on the industry news and the most exciting projects that build their offerings around the intersection of fintech and sustainability.