cryptonews
2025-09-15 09:28:23

Nemo Protocol Issues NEOM Debt Tokens to Compensate $2.6M Exploit Victims

Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Official Update: Following the September 8 security incident, Nemo Protocol has finalized a comprehensive compensation plan. We remain committed to transparency and accountability. We are deeply grateful to our community and partners for their trust and support, and we will… pic.twitter.com/OWDIG5PSyA — Nemo (@nemoprotocol) September 15, 2025 Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. @nemoprotocol blames $2.6M exploit on rogue developer who deployed unaudited code with flash loan vulnerabilities, bypassing reviews. #Sui #Crypto #hack https://t.co/lZctUh16tY — Cryptonews.com (@cryptonews) September 11, 2025 The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads , and the Yala stablecoin losing its dollar peg. The Yala stablecoin ($YU), a Bitcoin-native over-collateralized stablecoin backed by Polychain, lost its dollar peg after a protocol attack sent $YU crashing to $0.2074. #Stablecoin #Bitcoin https://t.co/RxbGVEG6Ba — Cryptonews.com (@cryptonews) September 14, 2025 Particularly, the Yala stablecoin (YU) attack , which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews. The post Nemo Protocol Issues NEOM Debt Tokens to Compensate $2.6M Exploit Victims appeared first on Cryptonews .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.