• Ar
  • Es
Al Mayadeen English

Slogan

  • News
    • Politics
    • Economy
    • Sports
    • Arts&Culture
    • Health
    • Miscellaneous
    • Technology
    • Environment
  • Articles
    • Opinion
    • Analysis
    • Blog
    • Feature
  • Videos
  • Infographs
  • In Pictures
  • • LIVE
News
  • Politics
  • Economy
  • Sports
  • Arts&Culture
  • Health
  • Miscellaneous
  • Technology
  • Environment
Articles
  • Opinion
  • Analysis
  • Blog
  • Feature
Videos
Infographs
In Pictures
  1. Home
  2. News
  3. US & Canada
  4. How hackers take advantage of the 'Bridge' problem
US & Canada

How hackers take advantage of the 'Bridge' problem

  • By Al Mayadeen net
  • Source: Agencies
  • 3 Apr 2022 15:57

Hackers stole $540 million worth of Etherum and USDC stabelcoin this week, according to cryptocurrency network Ronin. 

  • Why hackers take advantage of the
    How hackers take advantage of the "Bridge" problem

Hackers stole $540 million worth of Etherum and USDC stabelcoin this week, according to cryptocurrency network Ronin. 

The theft is one of the largest in bitcoin history, and hackers stole from a service called the Ronin Bridge. Successful assaults against "blockchain bridges" have become increasingly common in recent years, and the situation with Ronin is a stark reminder of the problem's severity.

Blockchain bridges, often referred to as network bridges, are methods that enable users to transfer digital assets from one blockchain to another. Because cryptocurrencies are often walled and incompatible—you can't make a transaction on the Bitcoin blockchain using Dogecoins—"bridges" have emerged as a critical tool, if not a missing link, in the cryptocurrency economy.

Bridge services "wrap" cryptocurrencies in order to convert them from one form of coin to another. As a result, if you go to a bridge to utilize another currency, such as Bitcoin (BTC), the bridge will spit out wrapped bitcoins (WBTC). It functions similarly to a gift card or a check in that it represents stored value in a flexible alternate format. Bridges require a cryptocurrency coin reserve to underwrite all of those wrapped coins, and that hoard is a prime target for hackers.

James Prestwich, who studies and develops cross-chain communication protocols, stated that “any capital on-chain is subject to attack 24/7/365, so bridges will always be a popular target,” adding that "Bridges will continue to grow because people will always want the opportunity to join new ecosystems. Over time, we’ll professionalize, develop best practices, and there will be more people capable of building and analyzing bridge code. Bridges are new enough that there are very few experts.”

In addition to the Ronin theft, hackers took around $80 million in bitcoin from Qubit Bridge at the end of January, approximately $320 million from Wormhole Bridge at the beginning of February, and $4.2 million from Meter.io Bridge a few days later. Last August, the Poly Network bridge had $611 million in cryptocurrency stolen from it before the attacker returned the funds a few days later. All of these attacks used software weaknesses to siphon cash, but the Ronin Bridge assault had a unique flaw.

Ronin was developed by the Vietnamese company Sky Mavis, which develops the popular NFT-based video game Axie Infinity. In this specific bridge hack, hackers used social engineering and tricked their way into accessing the private encryption keys to verify transactions. The keys were set up in a less than rigorous manner, which made their withdrawals successful.

In its statement regarding the incident, Ronin stated that the company is "not immune to exploitation, and this attack has reinforced the importance of prioritizing security, remaining vigilant, and mitigating all threats."

The breach was discovered the same day, but "validator nodes" were compromised on March 23. 173,600 Ethereum and 25.5 million USDC were stolen. Ronin Bridge has been out of service since with users unable to perform transactions.

  • Blockchain
  • Hacking
  • hackers

Trending Now

All
US intelligence community discovered "hundreds" of classified NATO documents for sale on the dark web

NATO classified documents sold on dark web after Portuguese EMGFA hack

Most Read

US dollar may lose status as global reserve currency: Yellen

US dollar may lose status as global reserve currency: Yellen

  • US & Canada
  • 22 Mar
Ukrainian President Volodymyr Zelensky speaks at a press conference on 25, February, 2022. (AFP)

Kiev unable to launch counteroffensive: Zelensky

  • Europe
  • 25 Mar
Europe's move has only increased Putin’s esteem outside the West -- but estimation of Europe’s political nous and understanding of Russia, however, is sharply diminished.

Lawfare Comes into Fashion: The New Geo-political ‘Rack’

  • Analysis
  • 25 Mar
Crewmen enter Bradley fighting vehicles at a US military base at an undisclosed location in Northeastern Syria, on November 11, 2019 (AP)

US occupation bases under fire in Syria for second day in a row

  • MENA
  • 24 Mar

Read this

All
Mounted police disperse anti-government protesters in 'Tel Aviv', occupied Palestine, March 27, 2023 (AP)
US & Canada

IOF separating protesters, Netanyahu supporters to curb clashes

  • 28 Mar
File photo of United Nations Security Council meeting. (AFP)
Europe

UNSC fails to adopt Russian draft calling for Nord Stream probe

  • 28 Mar
.
Palestine

Report shows settlers' trust in Israeli institutions hits record low

  • Today
Ukrainian soldiers ride atop a British-supplied APC on the frontline in Bakhmut, Donetsk region, Sunday, March 26, 2023 (AP Photo/Libkos)
Europe

Biden to escalate in Ukraine: NYT

  • 28 Mar
Al Mayadeen English

Al Mayadeen is an Arab Independent Media Satellite Channel.

All Rights Reserved

  • Privacy Policy
  • About Us
  • Contact Us
  • Authors
Android
iOS