Breaking

Hackers stole $322 million cryptocurrency from the Wormhole Cyberattack

Hackers have exploited a vulnerability to breach the Wormhole cryptocurrency platform and stole $322 million worth of Ether.

The Wormhole Cyberattack incident happened earlier today and has affected Wormhole Portal, a web-based application called as Blockchain bridge, which allows users to convert cryptocurrency from one form to another. The portal employs smart contracts on Ethereum Blockchain to convert one currency to an internal token, which is later converted into another cryptocurrency.

Breaking Down Wormhole Cyberattack

The hackers have exploited the process of currency conversion to manipulate the Wormhole platform making it release excessive Ether(ETH) and Solana(SOL) coins. As per the reports, the attacker has stolen cryptocurrency worth $332.8 million, and have depreciated $294 million because of price fluctuations following news of the hack. As of now there aren’t any details from Wormhole about the incident except a confirmation of the attack but the site is seen in the maintenance mode when this article was written.

Similar attack was seen on another blockchain bridge where threat actors stole $80 million from Qubit France. Another attack targeted Crypto when $300 million was stolen by bypassing two-factor authentication. When Wormhole confirms the amount of funds stolen, this attack will become the largest cryptocurrency hack of this year and second largest hack of decentralized finance platform of all time as per the compiled by the DeFiYield project.

How is Wormhole trying to handle the incident

Tal Be’ery, CTO of ZenGo, a cryptocurrency wallet app mentioned that Wormhole is trying to contact the hackers requesting them to return the stolen funds for $10 million reward as bug bounty. However, as per Uber executive’s statement, these sort of White-hat contract isn’t legal and thus authorities can still charge attackers for their act.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago