<p>Another day, another hack - and another blockchain bridge burned.</p>.<p>When thieves stole an estimated $190 million from US crypto firm Nomad last week, it was the seventh hack of 2022 to target an increasingly important cog in the crypto machine: Blockchain "bridges" - strings of code that help move crypto coins between different applications.</p>.<p>So far this year, hackers have stolen crypto worth some $1.2 billion from bridges, data from London-based blockchain analysis firm Elliptic shows, already more than double last year's total.</p>.<p><strong>Also Read—<a href="http://www.deccanherald.com/business/ed-conducts-raids-on-director-of-wazirx-crypto-exchange-freezes-assets-worth-rs-64-cr-1133390.html" target="_blank">ED conducts raids on director of WazirX crypto exchange, freezes assets worth Rs 64 cr</a></strong></p>.<p>"This is a war where the cybersecurity firm or the project can't be a winner," said Ronghui Hu, a professor of computer science at Columbia University in New York and co-founder of cybersecurity firm CertiK.</p>.<p>"We have to protect so many projects. For them (hackers) when they look at one project and there's no bugs, they can simply move on to the next one, until they find a one weak point."</p>.<p>At present, most digital tokens run on their own unique blockchain, essentially a public digital ledger that records crypto transactions. That risks projects using these coins becoming siloed, reducing their prospects for wide use.</p>.<p>Blockchain bridges aim to tear down these walls. Backers say they will play a fundamental role in "Web3" - the much-hyped vision of a digital future where crypto's enmeshed in online life and commerce.</p>.<p>Yet bridges can be the weakest link.</p>.<p><strong>Also Read—<a href="http://www.deccanherald.com/business/business-news/crypto-lender-celsiuss-bankruptcy-devastates-clients-1131675.html" target="_blank">Crypto lender Celsius's bankruptcy devastates clients</a></strong></p>.<p>The Nomad hack was the eighth-biggest crypto theft on record. Other thefts from bridges this year include a $615 million heist at Ronin, used in a popular online game, and a $320 million theft at Wormhole, used in so-called decentralised finance applications.</p>.<p>"Blockchain bridges are the most fertile ground for new vulnerabilities," said Steve Bassi, co-founder and CEO of malware detector PolySwarm.</p>.<p><strong>Achillies Heel</strong></p>.<p>Nomad and others companies that make blockchain bridge software have attracted backing.</p>.<p>Just five days before it was hacked, San Francisco-based Nomad said it had raised $22.4 million from investors including major exchange Coinbase Global. Nomad CEO and co-founder Pranay Mohan called its security model the "gold standard."</p>.<p>Nomad did not respond to requests for comment.</p>.<p>It has said it is working with law enforcement agencies and a blockchain analysis firm to track the stolen funds. Late last week, it announced a bounty of up to 10 per cent for the return of funds hacked from the bridge. It said on Saturday it had recovered over $32 million of the hacked funds so far.</p>.<p>"The most important thing in crypto is community, and our number one goal is restoring bridged user funds," Mohan said. "We will treat any party who returns 90 per cent or more of exploited funds as a white hats. We will not prosecute white hats," he said, referring to so-called ethical hackers.</p>.<p>Several cyber security and blockchain experts told <em>Reuters</em> that the complexity of bridges meant they could represent an Achilles' heel for projects and applications that used them.</p>.<p>"A reason why hackers have targeted these cross-chain bridges of late is because of the immense technical sophistication involved in creating these kinds of services," said Ganesh Swami, CEO of blockchain data firm Covalent in Vancouver, which had some crypto stored on Nomad's bridge when it was hacked.</p>.<p>For instance, some bridges create versions of crypto coins that make them compatible with different blockchains, holding the original coins in reserve. Others rely on smart contracts, complex covenants that execute deals automatically.</p>.<p>The code involved in all of these can contain bugs or other flaws, potentially leaving the door ajar for hackers.</p>.<p><strong>Bug Bounties</strong></p>.<p>So how best to address the problem?</p>.<p>Some experts say audits of smart contracts could help to guard against cyber thefts, as well as "bug bounty" programmes that incentivise open-sourced reviews of smart contract code.</p>.<p>Others call for less concentration of control of the bridges by individual companies, something they say could bolster resiliency and transparency of code.</p>.<p>"Cross-chain bridges are an attractive target for hackers because they often leverage a centralized infrastructure, most of which lock up assets," said Victor Young, founder and chief architect at US blockchain firm Analog.</p>
<p>Another day, another hack - and another blockchain bridge burned.</p>.<p>When thieves stole an estimated $190 million from US crypto firm Nomad last week, it was the seventh hack of 2022 to target an increasingly important cog in the crypto machine: Blockchain "bridges" - strings of code that help move crypto coins between different applications.</p>.<p>So far this year, hackers have stolen crypto worth some $1.2 billion from bridges, data from London-based blockchain analysis firm Elliptic shows, already more than double last year's total.</p>.<p><strong>Also Read—<a href="http://www.deccanherald.com/business/ed-conducts-raids-on-director-of-wazirx-crypto-exchange-freezes-assets-worth-rs-64-cr-1133390.html" target="_blank">ED conducts raids on director of WazirX crypto exchange, freezes assets worth Rs 64 cr</a></strong></p>.<p>"This is a war where the cybersecurity firm or the project can't be a winner," said Ronghui Hu, a professor of computer science at Columbia University in New York and co-founder of cybersecurity firm CertiK.</p>.<p>"We have to protect so many projects. For them (hackers) when they look at one project and there's no bugs, they can simply move on to the next one, until they find a one weak point."</p>.<p>At present, most digital tokens run on their own unique blockchain, essentially a public digital ledger that records crypto transactions. That risks projects using these coins becoming siloed, reducing their prospects for wide use.</p>.<p>Blockchain bridges aim to tear down these walls. Backers say they will play a fundamental role in "Web3" - the much-hyped vision of a digital future where crypto's enmeshed in online life and commerce.</p>.<p>Yet bridges can be the weakest link.</p>.<p><strong>Also Read—<a href="http://www.deccanherald.com/business/business-news/crypto-lender-celsiuss-bankruptcy-devastates-clients-1131675.html" target="_blank">Crypto lender Celsius's bankruptcy devastates clients</a></strong></p>.<p>The Nomad hack was the eighth-biggest crypto theft on record. Other thefts from bridges this year include a $615 million heist at Ronin, used in a popular online game, and a $320 million theft at Wormhole, used in so-called decentralised finance applications.</p>.<p>"Blockchain bridges are the most fertile ground for new vulnerabilities," said Steve Bassi, co-founder and CEO of malware detector PolySwarm.</p>.<p><strong>Achillies Heel</strong></p>.<p>Nomad and others companies that make blockchain bridge software have attracted backing.</p>.<p>Just five days before it was hacked, San Francisco-based Nomad said it had raised $22.4 million from investors including major exchange Coinbase Global. Nomad CEO and co-founder Pranay Mohan called its security model the "gold standard."</p>.<p>Nomad did not respond to requests for comment.</p>.<p>It has said it is working with law enforcement agencies and a blockchain analysis firm to track the stolen funds. Late last week, it announced a bounty of up to 10 per cent for the return of funds hacked from the bridge. It said on Saturday it had recovered over $32 million of the hacked funds so far.</p>.<p>"The most important thing in crypto is community, and our number one goal is restoring bridged user funds," Mohan said. "We will treat any party who returns 90 per cent or more of exploited funds as a white hats. We will not prosecute white hats," he said, referring to so-called ethical hackers.</p>.<p>Several cyber security and blockchain experts told <em>Reuters</em> that the complexity of bridges meant they could represent an Achilles' heel for projects and applications that used them.</p>.<p>"A reason why hackers have targeted these cross-chain bridges of late is because of the immense technical sophistication involved in creating these kinds of services," said Ganesh Swami, CEO of blockchain data firm Covalent in Vancouver, which had some crypto stored on Nomad's bridge when it was hacked.</p>.<p>For instance, some bridges create versions of crypto coins that make them compatible with different blockchains, holding the original coins in reserve. Others rely on smart contracts, complex covenants that execute deals automatically.</p>.<p>The code involved in all of these can contain bugs or other flaws, potentially leaving the door ajar for hackers.</p>.<p><strong>Bug Bounties</strong></p>.<p>So how best to address the problem?</p>.<p>Some experts say audits of smart contracts could help to guard against cyber thefts, as well as "bug bounty" programmes that incentivise open-sourced reviews of smart contract code.</p>.<p>Others call for less concentration of control of the bridges by individual companies, something they say could bolster resiliency and transparency of code.</p>.<p>"Cross-chain bridges are an attractive target for hackers because they often leverage a centralized infrastructure, most of which lock up assets," said Victor Young, founder and chief architect at US blockchain firm Analog.</p>