Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

AI-powered financial scams swamp social media

August 22, 2025

VPNs With “No Logging Policy” You Can Use on Linux

August 22, 2025

Data Integrity: The Key to Trust in AI Systems

August 22, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»Israel arrests new suspect behind Nomad Bridge $190M crypto hack
Cyber Security

Israel arrests new suspect behind Nomad Bridge $190M crypto hack

MichaBy MichaMay 18, 2025No Comments4 Mins Read
Israel arrests new suspect behind Nomad Bridge 0M crypto hack


Introduction

In a significant turn of events in the world of cybersecurity, Alexander Gurevich, an American-Israeli national, has been arrested in Israel for his alleged role in the staggering $190 million Nomad Bridge hack. This incident is a stark reminder of vulnerabilities in decentralized finance (DeFi) systems, showcasing how even minor flaws can lead to massive financial losses. Discover the details surrounding this case and what it means for the future of blockchain security.

Understanding the Nomad Bridge Hack

The Nomad Bridge serves as a cross-chain communication standard, enabling users to seamlessly transfer assets between various blockchain networks. On August 1, 2022, a critical vulnerability was exploited within its Replica smart contract, specifically the ‘process() function’. This flaw permitted any message with a valid root hash to be accepted, bypassing essential verification processes. As the method was discovered by one hacker, it quickly proliferated among other attackers, leading to a swift and chaotic decentralized looting.

The Vulnerability and Its Exploitation

According to TRM Labs, the vulnerability was alarmingly simple to exploit, which drew in numerous individuals lacking advanced hacking skills. Even seasoned cybercriminals from North Korea reportedly participated in this significant breach. While Gurevich did not create the exploit code, he allegedly played a central role in facilitating the laundering of the stolen funds.

Evidence shows that wallets associated with Gurevich received stolen assets just hours after the bridge was drained. This suggests intricate coordination with the initial attackers, allowing Gurevich to leverage various blockchain networks seamlessly.

Gurevich’s Money Laundering Tactics

Gurevich utilized multiple techniques to obscure the origins of the stolen funds. This included:

  • Chain-Hopping: Transferring tokens across different blockchains.
  • Tornado Cash: Employing this privacy-focused mixer to further disguise transaction trails.
  • Non-Custodial Exchanges: Using decentralized platforms for converting cryptocurrencies to fiat.

Moreover, he accessed offshore accounts connected to shell companies and utilized brokers that do not require Know Your Customer (KYC) verification to facilitate his cash-out strategy.

Insights from Blockchain Forensics

Despite attempts to mask his identity, blockchain transaction analysis proved effective in tracing the funds back to Gurevich. This case highlights the importance of transparency within blockchain operations and serves as a potent reminder of the need for rigorous security measures in DeFi projects.

Caught Among Others: The Broader Picture

Gurevich’s arrest was not an isolated incident. On May 1, 2023, another suspect, a Russian-Israeli national, was apprehended at Ben Gurion Airport while attempting to escape under a different identity. This individual was also implicated in exploiting the Nomad Bridge, reinforcing the notion that this breach attracted numerous cybercriminals.

Additional Context: Communication With Nomad

According to reports from the Jerusalem Post, Gurevich reached out to Nomad’s Chief Technology Officer on August 4, 2022, acknowledging his probing for vulnerabilities. In a striking twist, he initially sought a reward of $500,000 for identifying the very flaw he later exploited.

What This Means for Cybersecurity in DeFi

The Nomad Bridge exploit serves as a critical cautionary tale for the decentralized finance sector. It underscores the need for robust cybersecurity frameworks that can preemptively identify and mitigate vulnerabilities. As blockchain technology continues to evolve, so does the sophistication of cyber threats, making constant vigilance paramount.

FAQ

Question 1: What was the significance of the Nomad Bridge hack?

The Nomad Bridge hack is considered one of the largest exploits in DeFi history, resulting in the loss of over $190 million due to a critical vulnerability in its smart contract.

Question 2: How was Alexander Gurevich identified and arrested?

Blockchain intelligence provided by TRM Labs was instrumental in tracing Gurevich’s activities, leading to his arrest after extensive coordination between international law enforcement agencies such as the DOJ, FBI, and Interpol.

Question 3: What steps should DeFi platforms take to protect against such attacks?

DeFi platforms should implement rigorous security audits, adopt best practices in smart contract development, and invest in real-time monitoring systems to detect and address vulnerabilities proactively.

In summary, Gurevich’s arrest serves as a pivotal case study in the fight against cybercrime in the blockchain and DeFi sectors, emphasizing the importance of continuous improvement in cybersecurity measures.



Read the original article

0 Like this
190M arrests Bridge Crypto Hack Israel Nomad suspect
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleWhat Is a Planetary Alignment and How Do You Watch It?
Next Article Microsoft’s Satya Nadella is choosing chatbots over podcasts

Related Posts

Cyber Security

AI-powered financial scams swamp social media

August 22, 2025
Cyber Security

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

August 22, 2025
Cyber Security

How Countries Can Collaborate To Combat Cybercrime

August 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.