Breaking

Hackers stole $322 million cryptocurrency from the Wormhole Cyberattack

Hackers have exploited a vulnerability to breach the Wormhole cryptocurrency platform and stole $322 million worth of Ether.

The Wormhole Cyberattack incident happened earlier today and has affected Wormhole Portal, a web-based application called as Blockchain bridge, which allows users to convert cryptocurrency from one form to another. The portal employs smart contracts on Ethereum Blockchain to convert one currency to an internal token, which is later converted into another cryptocurrency.

Breaking Down Wormhole Cyberattack

The hackers have exploited the process of currency conversion to manipulate the Wormhole platform making it release excessive Ether(ETH) and Solana(SOL) coins. As per the reports, the attacker has stolen cryptocurrency worth $332.8 million, and have depreciated $294 million because of price fluctuations following news of the hack. As of now there aren’t any details from Wormhole about the incident except a confirmation of the attack but the site is seen in the maintenance mode when this article was written.

Similar attack was seen on another blockchain bridge where threat actors stole $80 million from Qubit France. Another attack targeted Crypto when $300 million was stolen by bypassing two-factor authentication. When Wormhole confirms the amount of funds stolen, this attack will become the largest cryptocurrency hack of this year and second largest hack of decentralized finance platform of all time as per the compiled by the DeFiYield project.

How is Wormhole trying to handle the incident

Tal Be’ery, CTO of ZenGo, a cryptocurrency wallet app mentioned that Wormhole is trying to contact the hackers requesting them to return the stolen funds for $10 million reward as bug bounty. However, as per Uber executive’s statement, these sort of White-hat contract isn’t legal and thus authorities can still charge attackers for their act.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

4 months ago

Patch My PC: Streamlined Software Management for ConfigMgr and Intune

Patch My PC is a widely-used solution that simplifies third-party application management by automating app…

4 months ago

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

4 months ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

5 months ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

6 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

6 months ago