Home TECH Crypto Hackers Steal $100 Million from Harmony’s Horizon Bridge

Crypto Hackers Steal $100 Million from Harmony’s Horizon Bridge

by Numan
0 comment
harmony

A group of crypto hackers has targeted the Horizon Bridge, which connects to the Harmony Layer-1 blockchain, resulting in the theft of $100 million worth of alternative cryptocurrencies that were being traded for ether (ETH).

The Horizon Bridge is an application that enables users to exchange currencies across various blockchain networks, including Ethereum, Binance Smart Chain (BSC), and Harmony. This latest breach raises concerns about the trustworthiness of two of the four multisigs that were designed to secure the bridge, as previously voiced by the community.

Harmony Confirms Attack

On March 26, 2023, Harmony, a blockchain technology company, confirmed that their Horizon Bridge had been attacked by hackers resulting in the theft of $100 million worth of alternative cryptocurrencies. The Horizon Bridge is an application that allows users to exchange currencies across different blockchain networks, including Ethereum, Binance Smart Chain (BSC), and Harmony. The attack has raised concerns about the reliability of the multisig protocols used to secure the bridge, as it is believed that two of the four multisigs may have been compromised.

Harmony has stated that they are conducting a thorough investigation into the incident and have alerted the appropriate authorities. They have also stated that they are taking measures to prevent similar attacks from occurring in the future, including implementing additional security measures for the Horizon Bridge.

banner

The attack on the Horizon Bridge is just one of many recent cyber attacks targeting blockchain networks and digital assets. As the adoption of blockchain technology continues to grow, so does the risk of cyber attacks, making it crucial for companies to prioritize the security of their products and systems. This includes implementing strong security measures and protocols, conducting regular security audits and assessments, and staying up to date on the latest threats and vulnerabilities.

The theft of $100 million worth of cryptocurrencies is a significant loss for Harmony and its users. While cryptocurrencies are often seen as a secure and decentralized alternative to traditional currencies, they are still vulnerable to theft and hacking. It is important for individuals and companies to take necessary precautions when investing in and using cryptocurrencies, such as using hardware wallets and following best practices for securing digital assets.

In summary, the attack on Harmony’s Horizon Bridge highlights the ongoing need for robust security measures and protocols in the blockchain industry. It serves as a reminder of the risks associated with digital assets and the importance of staying vigilant against cyber threats. As the industry continues to evolve and grow, it will be crucial for companies and individuals alike to prioritize the security and protection of their digital assets.

Threats to Crypto’s Multistig Wallet

Multisig (short for multi-signature) wallets are a type of cryptocurrency wallet that require multiple signatures from different users or parties in order to complete a transaction. They are often used as a security measure to protect digital assets from theft or hacking, as they require more than one person to approve a transaction, making it more difficult for a single party to execute fraudulent or unauthorized transactions.

However, even multisig wallets are not immune to threats. One potential threat to multisig wallets is the compromise of one or more of the required signatures. If one of the required signatures is compromised, it could allow an attacker to bypass the multisig protection and execute unauthorized transactions. This could be accomplished through a variety of means, such as social engineering attacks or the use of malware to gain access to the necessary signatures.

Another potential threat to multisig wallets is the compromise of the entire wallet itself. While multisig wallets are generally more secure than single-signature wallets, they are still vulnerable to hacking and cyber attacks. If an attacker is able to gain access to the multisig wallet, they could potentially execute unauthorized transactions or steal the digital assets held within the wallet.

To mitigate these threats, it is important for users of multisig wallets to follow best practices for security and use reputable providers. This includes using strong, unique passwords and two-factor authentication, regularly updating software and firmware, and using reputable providers with a proven track record of security.

Overall, while multisig wallets offer an additional layer of security for digital assets, they are not invulnerable to threats. It is important for users to remain vigilant and take necessary precautions to protect their assets from potential attacks.

The two proposals to compensate hacked wallets

In the context of cryptocurrency, a “hacked wallet” refers to a digital wallet that has been compromised by a cyber attack, resulting in the loss of digital assets such as Bitcoin or Ethereum. When such an event occurs, there may be proposals put forward to compensate those who have suffered losses as a result of the hack.

Two common proposals to compensate hacked wallets are:

  • Hard Fork: A hard fork is a radical change to the rules governing a blockchain network, resulting in the creation of a new blockchain that is incompatible with the old one. In the context of compensating hacked wallets, a hard fork could be used to create a new version of the blockchain in which the stolen funds are returned to their rightful owners. This proposal has been implemented in the past, most notably in the case of the Ethereum hard fork in 2016 following the DAO hack.
  • Token Airdrop: A token airdrop is a distribution of free tokens to a group of users. In the context of compensating hacked wallets, a token airdrop could be used to distribute new tokens to users who have suffered losses as a result of a hack. The new tokens could then be traded for other cryptocurrencies or used within the ecosystem of the blockchain network.

Both of these proposals have their advantages and disadvantages. A hard fork can be a controversial solution, as it essentially involves rewriting the history of the blockchain network, which can be seen as compromising the integrity of the network. Additionally, a hard fork can be difficult to implement and can create confusion among users. A token airdrop, on the other hand, can be a simpler solution, but it may not be as effective at compensating users for their losses.

Ultimately, the decision of how to compensate hacked wallets will depend on the specific circumstances of the hack and the preferences of the community involved. It is important for stakeholders to carefully consider the potential implications of any proposed solutions and to work together to find the best way forward.

About Us

I Techy Mac is the Leading Digital Media Publishing platform, covering various Trending topics related to Startups, Businesses, Digital Marketing, Entertainment, Fashion, Relationship, Sports, Food, Lifestyle, Education, Job and Career, Travel, Gaming, Health, Cryptocurrency etc.

 

Copyright©2022 I Techy Mac – All Right Reserved. Designed and Developed by DSF SEO Company.