Al Mayadeen English

  • Ar
  • Es
  • x
Al Mayadeen English

Slogan

  • News
    • Politics
    • Economy
    • Sports
    • Arts&Culture
    • Health
    • Miscellaneous
    • Technology
    • Environment
  • Articles
    • Opinion
    • Analysis
    • Blog
    • Features
  • Videos
    • NewsFeed
    • Video Features
    • Explainers
    • TV
    • Digital Series
  • Infographs
  • In Pictures
  • • LIVE
News
  • Politics
  • Economy
  • Sports
  • Arts&Culture
  • Health
  • Miscellaneous
  • Technology
  • Environment
Articles
  • Opinion
  • Analysis
  • Blog
  • Features
Videos
  • NewsFeed
  • Video Features
  • Explainers
  • TV
  • Digital Series
Infographs
In Pictures
  • Africa
  • Asia
  • Asia-Pacific
  • Europe
  • Latin America
  • MENA
  • Palestine
  • US & Canada
BREAKING
Al Mayadeen's Beirut Bureau Chief Roni Alfa: This Israeli aggression says that issue of negotiating with Lebanon is not on table, and that "Israel" will not abide by Resolution 1701.
Al Mayadeen's correspondent: Preliminary casualty toll of Israeli aggression on Southern Suburb of Beirut now at one martyr, 21 wounded.
Ammar: Palestinian experience shows that settlements and talk of peace cannot emanate from enemy that blatantly declares its intent to expand.
Ammar: Unfortunately, enemy is emboldened to commit its aggression by voices within Lebanon that have turned themselves into tools that support its aggression.
Ammar: We are in a full-fledged battle with enemy, and walk at a different pace; we will set the time [for a response].
Ammar: Resistance dealing with utmost wisdom, patience, and will confront this enemy at appropriate time.
Ammar: Any attack on Lebanon is violation of red lines, this aggression is part and parcel of entity which targets Lebanon's dignity, sovereignty, and security of citizens.
Lebanese MP Ali Ammar from attack site: Israeli aggression has attacked entirety of Lebanon since Washington-sponsored ceasefire.
Israeli media citing senior US official: We were not informed prior to strike, but as it was underway.
Israeli media: US had been informed of planned escalation against Lebanon.

How hackers take advantage of the 'Bridge' problem

  • By Al Mayadeen net
  • Source: Agencies
  • 3 Apr 2022 15:57
3 Min Read

Hackers stole $540 million worth of Etherum and USDC stabelcoin this week, according to cryptocurrency network Ronin. 

  • x
  • Why hackers take advantage of the
    How hackers take advantage of the "Bridge" problem

Hackers stole $540 million worth of Etherum and USDC stabelcoin this week, according to cryptocurrency network Ronin. 

The theft is one of the largest in bitcoin history, and hackers stole from a service called the Ronin Bridge. Successful assaults against "blockchain bridges" have become increasingly common in recent years, and the situation with Ronin is a stark reminder of the problem's severity.

Blockchain bridges, often referred to as network bridges, are methods that enable users to transfer digital assets from one blockchain to another. Because cryptocurrencies are often walled and incompatible—you can't make a transaction on the Bitcoin blockchain using Dogecoins—"bridges" have emerged as a critical tool, if not a missing link, in the cryptocurrency economy.

Bridge services "wrap" cryptocurrencies in order to convert them from one form of coin to another. As a result, if you go to a bridge to utilize another currency, such as Bitcoin (BTC), the bridge will spit out wrapped bitcoins (WBTC). It functions similarly to a gift card or a check in that it represents stored value in a flexible alternate format. Bridges require a cryptocurrency coin reserve to underwrite all of those wrapped coins, and that hoard is a prime target for hackers.

James Prestwich, who studies and develops cross-chain communication protocols, stated that “any capital on-chain is subject to attack 24/7/365, so bridges will always be a popular target,” adding that "Bridges will continue to grow because people will always want the opportunity to join new ecosystems. Over time, we’ll professionalize, develop best practices, and there will be more people capable of building and analyzing bridge code. Bridges are new enough that there are very few experts.”

In addition to the Ronin theft, hackers took around $80 million in bitcoin from Qubit Bridge at the end of January, approximately $320 million from Wormhole Bridge at the beginning of February, and $4.2 million from Meter.io Bridge a few days later. Last August, the Poly Network bridge had $611 million in cryptocurrency stolen from it before the attacker returned the funds a few days later. All of these attacks used software weaknesses to siphon cash, but the Ronin Bridge assault had a unique flaw.

Ronin was developed by the Vietnamese company Sky Mavis, which develops the popular NFT-based video game Axie Infinity. In this specific bridge hack, hackers used social engineering and tricked their way into accessing the private encryption keys to verify transactions. The keys were set up in a less than rigorous manner, which made their withdrawals successful.

In its statement regarding the incident, Ronin stated that the company is "not immune to exploitation, and this attack has reinforced the importance of prioritizing security, remaining vigilant, and mitigating all threats."

The breach was discovered the same day, but "validator nodes" were compromised on March 23. 173,600 Ethereum and 25.5 million USDC were stolen. Ronin Bridge has been out of service since with users unable to perform transactions.

  • Blockchain
  • Hacking
  • hackers

Most Read

Inside the Epstein-Rothschild web behind 'Israel’s' spy tech empire

Inside the Epstein-Rothschild web behind 'Israel’s' spy tech empire

  • Politics
  • 19 Nov 2025
Hamas fighters stand in formation as they prepare for the ceremony of Israeli captive hand over to the Red Cross in Nuseirat, central Gaza Strip, Feb. 22, 2025. (AP)

US plot for Gaza in shambles amid continued popular support for Hamas

  • Politics
  • 17 Nov 2025
Democracy at the civilizational crossroads: Critical analysis of bourgeois Democracy, its alternatives

Democracy at the civilizational crossroads: Critical analysis of bourgeois Democracy, its alternatives

  • Analysis
  • 19 Nov 2025
US readies covert, military measures to oust Maduro: NYT

US signs off on covert CIA operations inside Venezuela: NYT

  • Politics
  • 19 Nov 2025

Coverage

All
In Five

Read Next

All
This undated photo, released by Hezbollah Military Media on Sunday, Nov. 23, 2025, shows Hezbollah senior commander Haytham Ali Tabtabai "Sayyed Abu Ali." (Hezbollah Military Media vía AP)
Politics

Palestinian factions mourn Hezbollah commander Haitham al-Tabatabai

Hezbollah releases the names of the four martyred with Tabatabai
West Asia

Hezbollah releases the names of the four martyred with Tabatabai

Hezbollah publishes biography of martyred leader Haitham al-Tabatabai
Politics

Hezbollah publishes biography of martyred leader Haitham al-Tabatabai

Hezbollah announces the martyrdom of Haitham al-Tabatabai
West Asia

Hezbollah announces the martyrdom of commander Haitham al-Tabatabai

Al Mayadeen English

Al Mayadeen is an Arab Independent Media Satellite Channel.

All Rights Reserved

  • x
  • Privacy Policy
  • About Us
  • Contact Us
  • Authors
Android
iOS