Other

Nomad Bridge Exploit ($190M Drained, 'Chaotic' Free-for-All)

πŸ“… 2022-08-01 🏒 Nomad cross-chain bridge
Primary Source β†—

Incident Details

On August 1, 2022, the Nomad cross-chain bridge was drained of approximately $190 million in a chaotic ‘free-for-all’ exploit. A recent routine upgrade had inadvertently set the ’trusted root’ in Nomad’s Replica smart contract to 0x00 (zero bytes) β€” because any message with a zero-byte proof would be treated as valid, it made it trivially easy for anyone to claim false cross-chain messages. The initial exploiter demonstrated the attack, and the transaction was visible on-chain. Within minutes, hundreds of copycat attackers β€” ranging from sophisticated DeFi hackers to opportunistic users who simply copy-pasted the exploit transaction β€” joined in, draining the bridge of essentially all its funds. The incident was notable for its ‘chaotic’ and decentralized nature, as most previous DeFi exploits were carried out by a single sophisticated attacker. Some ‘white hat’ users also drained funds claiming to safeguard them, and Nomad later issued a call for return of funds. Approximately $36 million was eventually returned by white hat rescuers. The bug was introduced in a governance upgrade and had passed an audit β€” demonstrating that even audited upgrades can introduce critical vulnerabilities. Nomad subsequently raised funds to compensate affected users at approximately 18 cents per dollar lost.

Technical Details

Initial Attack Vector
A routine smart contract upgrade introduced a misconfiguration in Nomad's Replica contract β€” setting the 'trusted root' to 0x00, causing the contract to accept any message as valid; once the initial exploit was noticed on-chain, hundreds of copycat exploiters joined to drain the remaining funds
Vendor / Product
Nomad cross-chain bridge
Software Package
Nomad Replica smart contract

Timeline

  1. 2022-08-01 Breach occurred
  2. 2022-08-01 Publicly disclosed