BlockNews
FOLLOW ON X
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • SUI
    • CHAINLINK
    • LITECOIN
  • FINANCE
  • POLITICS
  • MEMECOINS
  • NFT
  • OPINION
No Result
View All Result
BlockNews
Home CRYPTO

Hackers Used the Copycat Method to Steal $88 Million from the Nomad Bridge

BlockNews Team by BlockNews Team
August 15, 2022
in CRYPTO
Share on XShare in TelegramShare on Reddit

On August 1, 2022, the Nomad bridging protocol was rocked by a series of exploits that would later result in a token-stealing spree that totaled $88 million. The exploit exposed 90% of addresses that make up $186 million. This technique happens when the first hack successfully breaches the smart contracts, attracting new hackers and multiplying into new exploits.

According to crypto security professionals, the hackers used a so-called “copycat” scheme.

The Copycat Hack in a Nutshell

Coinbase’s internal investigators and researchers, Heidi Wilder and Peter Kacherginsky, claimed that hundreds of copycats happened when the first batch of hackers discovered the way to steal the money from the bridge.

The copycat hackers used the same code as the two original breachers and became a clustered competition within themselves regarding who could steal the most money from Nomad. They first targeted wrapped Bitcoin, then the stablecoin USDC, and the wrapped ETH. These tokens had the highest volumes, making them the perfect chance for the first hackers to attack.

The Whitehats Arrive

Miraculously, on August 9, 49% of the stolen tokens were returned. The stolen wBTC and wETH were converted into USDC and USDT thanks to some white hat hackers disguising themselves as copycat attackers.

The first three returned addresses claimed back their money through Tornado Cash.

Last August 7, the US Treasury sanctioned USDC and ETH addresses associated with the protocol.

The Nomad Bridge hack is one of the worst exploits of the year but not as large as the Wormhole Bridge heist of February 2022 and the Ronin

Bridge attack of March 2022. The Wormhole Bridge saw a $250 million loss while the Ronin Bridge lost $540 million, making these the most malicious digital breaches of the year.

Analysts and the blockchain community have criticized cross-chain bridges for their centralization,
making the point that it defeats the point of cryptocurrency. The centralized hub makes it a target-rich
environment for hackers.

Disclaimer: BlockNews provides independent reporting on crypto, blockchain, and digital finance. All content is for informational purposes only and does not constitute financial advice. Readers should do their own research before making investment decisions. Some articles may use AI tools to assist in drafting, but every piece is reviewed and edited by our editorial team of experienced crypto writers and analysts before publication.
Tags: cryptoHacknomad
TweetShareShare
BlockNews Team

BlockNews Team

DON'T MISS THESE! HOT OFF THE PRESS

The FBI Just Showed Up to a Bitcoin Conference and Actually Said Nice Things
BITCOIN

The FBI Just Showed Up to a Bitcoin Conference and Actually Said Nice Things

April 28, 2026
Jack Dorsey’s Block Is Sitting on $2.2 Billion in Bitcoin and Wants Everyone to Know It
BITCOIN

Jack Dorsey’s Block Is Sitting on $2.2 Billion in Bitcoin and Wants Everyone to Know It

April 28, 2026
Litecoin Recovers After Network Disruption – Here Is Why This Crypto Setup Still Holds
CRYPTO

Litecoin Recovers After Network Disruption – Here Is Why This Crypto Setup Still Holds

April 27, 2026
Chainlink Expands Into Real-World Systems – Here Is Why This Crypto Setup Could Break Out
BUSINESS

Chainlink Expands Into Real-World Systems – Here Is Why This Crypto Setup Could Break Out

April 27, 2026
Justin Sun Pushes TRON Toward Quantum Security – Here Is What This Means for Crypto
CRYPTO

Justin Sun Pushes TRON Toward Quantum Security – Here Is What This Means for Crypto

April 27, 2026
DOGE Listed on Xetra by 21Shares – Here Is What This Means for Crypto Investors
CRYPTO

DOGE Listed on Xetra by 21Shares – Here Is What This Means for Crypto Investors

April 27, 2026
Load More

Related News

The FBI Just Showed Up to a Bitcoin Conference and Actually Said Nice Things

The FBI Just Showed Up to a Bitcoin Conference and Actually Said Nice Things

April 28, 2026
Jack Dorsey’s Block Is Sitting on $2.2 Billion in Bitcoin and Wants Everyone to Know It

Jack Dorsey’s Block Is Sitting on $2.2 Billion in Bitcoin and Wants Everyone to Know It

April 28, 2026
Ray Dalio Just Told the Next Fed Chair to Keep His Hands Off the Rate Button

Ray Dalio Just Told the Next Fed Chair to Keep His Hands Off the Rate Button

April 28, 2026
Litecoin Recovers After Network Disruption – Here Is Why This Crypto Setup Still Holds

Litecoin Recovers After Network Disruption – Here Is Why This Crypto Setup Still Holds

April 27, 2026
Chainlink Expands Into Real-World Systems – Here Is Why This Crypto Setup Could Break Out

Chainlink Expands Into Real-World Systems – Here Is Why This Crypto Setup Could Break Out

April 27, 2026
Twitter Telegram Threads

BLOCKNEWS.COM

BlockNews is your premier source for real-time cryptocurrency, blockchain, political and financial market news.

Stay ahead of the herd with BlockNews

RESOURCES

  • About Us
  • Contact Us
  • Editorial Policies
  • Terms and Conditions
  • Privacy Policy
  • Sitemap

DISCLOSURES AND POLICIES

BlockNews provides independent reporting on crypto, blockchain, and digital finance. Content is for informational purposes only and does not constitute financial advice. Sponsored material is always disclosed. By using this site, you agree to our Terms and Conditions and Privacy Policy.

© 2025 BlockNews

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
No Result
View All Result
  • HOME
  • BITCOIN
  • CRYPTO
    • ETHEREUM
    • RIPPLE XRP
    • SOLANA
    • CARDANO
    • BINANCE BNB
    • DOGECOIN
    • TRON
    • LITECOIN
    • CHAINLINK
    • SUI
  • MEMECOINS
  • POLITICS
  • FINANCE
  • NFT
  • DEFI
  • GUIDES

© 2025 BlockNews