• Latest
  • Trending
Cryptocurrency theft Digital Currency

Cybercrime Ravages Cryptocurrencies

August 22, 2022
Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

September 5, 2025
Meta Brings Back Facebook Poke with Emojis and Streaks

Meta Brings Back Facebook Poke with Emojis and Streaks

September 5, 2025
Know why they’re calling: Truecaller launches AI-powered insights

Know why they’re calling: Truecaller launches AI-powered insights

September 5, 2025
Visa harnesses local partnerships to launch Visa Pay in DR Congo

Visa harnesses local partnerships to launch Visa Pay in DR Congo

September 5, 2025
Betika denies recent reports of security breach

Betika denies recent reports of security breach

September 5, 2025
10 things you can actually buy with crypto in Africa

10 things you can actually buy with crypto in Africa

September 5, 2025
CBE seals deal with Botim to enhance remittance services for Ethiopians living in UAE

CBE seals deal with Botim to enhance remittance services for Ethiopians living in UAE

September 5, 2025
Nigeria Senate, SIBAN push for crypto regulation to boost digital economy

Nigeria Senate, SIBAN push for crypto regulation to boost digital economy

September 5, 2025
Mamo Mihretu Resigns as Governor of Ethiopia’s Central Bank

Mamo Mihretu Resigns as Governor of Ethiopia’s Central Bank

September 5, 2025
Paratus Group introduces first private mobile network using LTE and 5G in Namibia

Paratus Group introduces first private mobile network using LTE and 5G in Namibia

September 5, 2025
Your one-stop tech hub! Get the latest updates on AI, cybersecurity, fintech, and emerging technologies.
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Cryptocurrency Bitcoin

Cybercrime Ravages Cryptocurrencies

Okunloye Abiodun Segun by Okunloye Abiodun Segun
August 22, 2022
146 4
0
Cryptocurrency theft Digital Currency
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

While cryptocurrencies gained popularity over the years, hackers have specifically targeted it to exploit weaknesses in crypto-transactions. Chainalysis, a company that analyzes blockchains, has published research that shows that about $2 billion worth of cryptocurrency was stolen in 13 separate hacks on cross-chain bridges.

The company said that most of the $2 billion had been stolen this year, with 69 percent of the cash stolen in 2022 so far coming from attacks on bridges. It was also said that the theft could make people less likely to trust blockchain technology.

Cryptocurrency allows users to take back control of their finances by letting them act as their own bank while using third-party wallet providers. However, cybercriminals have taken advantage of this third party over the last few years. 

The research said, “As more value flows through cross-chain bridges, they become more attractive targets for hackers.” Even more troubling is that bridges are now a top target for North Korean-linked hackers, who — according to our estimates — have stolen approximately $1 billion worth of cryptocurrency so far this year, entirely from bridges and other DeFi protocols.

RelatedPosts

South Korea’s crypto data-sharing deal: What it means for Africa

South Africa’s payment reform opens doors for stablecoins, blockchain innovation

Why fintechs like OPay and Moniepoint outpace traditional banks—and lessons from blockchain

For perspective, South Korea’s government-run statistical agency estimates the country earned $89m from official exports in 2020. The good news is that these services can take steps to protect themselves. And in the event of a hack, they can leverage the transparency of blockchain technology to investigate the flow of funds and ideally prevent attackers from cashing out their ill-gotten gains.

Bridge Hacking Could Lead to a Loss

Cross-chain bridges were made because it was hard for different blockchains to work together, a problem that needed to be fixed. In the white paper, a “cross-chain bridge” describes how a user moves digital assets from one blockchain to another. It was said that these bridges are attractive targets because they often have a central location where the funds that back the assets that are “bridged” on the receiving blockchain are kept.

This year has devastated crypto investors as hacks and scams struck record highs. Because hackers have found a very effective way to contact people, specifically through bridges.

Blockchain bridges are becoming increasingly popular as a means of transaction for cryptocurrency users. These bridges flimsily connect networks to allow for quick token swaps. But by using them, people who like cryptocurrencies avoid a centralized exchange and use a system that is insecure.

In an interview, Tom Robinson, co-founder and chief scientist at blockchain analytics firm Elliptic, said, “Blockchain bridges have become the low-hanging fruit for cyber-criminals, with billions of dollars’ worth of crypto assets locked within them.” “These bridges have been breached by hackers in various ways, suggesting that their level of security has not kept pace with the value of assets they hold.

Considering how recent this problem is, the frequency with which bridges are being exploited is terrifying.

Toncoin Cryptocurrency Payments are Now Available on Telegram 

How The Bridge Works in Crytocurrency Transactions

A piece of software called a bridge enables users to send tokens from one blockchain network and receive them on another. The distributed ledger technologies that support different cryptocurrencies are known as blockchains.

When an investor wants to move tokens from one blockchain to another, for example, by sending ether from Ethereum to the Solana network, they must first deposit the tokens into a smart contract. A smart contract is a piece of code stored on a blockchain, making it possible for agreements to be carried out automatically without human intervention.

After that, the cryptocurrency is “minted” on a new blockchain in the form of a wrapped token, representing a claim on the original ether coins. This claim may then be used to purchase further ether coins. After that, the token will be able to be traded on the new network. Investors who use Ethereum, which is renowned for unexpected jumps in transaction fees and higher wait times when the network is congested.

Read Also: The Explosive Growth of Blockchain Funding and Cryptocurrency in Africa

The Bridge Hack

CNBC explained that “the vulnerability of bridges can be traced in part to sloppy engineering.”

It also says that the attack on Harmony’s Horizon bridge was possible because the minimum number of validators needed to approve a transaction was low. Hackers only had to get into two of the five accounts for them to be able to take funds out of the compromised accounts.

Ronin was involved in a circumstance that was very similar. Hackers only needed to convince five of the nine validators on the network to give up their private keys to access the encrypted data that was locked up in the system.

In the case of Nomad, the bridge made it much easier for hackers to change the system. Attackers could put any amount of money into the system and then take money out, even if there weren’t enough assets in the bridge to cover the amount of money they put in. They didn’t need to know how to code, and others copied them. This led to the eighth-largest crypto heist in the industry’s history, according to Elliptic.

Tags: CryptocurrencyCybercrimeHackingtheft
Okunloye Abiodun Segun

Okunloye Abiodun Segun

A vibrant writer saddled with the chore of Informing the world with words.

No Result
View All Result

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business

Follow Us:

  • facebook
  • instagram
  • Twitter(X)
  • Linkedin
  • YouTube
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Techpression.com -Techpression Media Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression.com -Techpression Media Limited

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.