Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviewsNemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews

Nemo Protocol Issues NEOM Debt Tokens to Compensate $2.6M Exploit Victims

Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7.

The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts.

The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment.

The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization.

Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach.

The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack.

Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe

The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors.

The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation.

MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions.

The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely.

Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission.

The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners.

Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability.

Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise.

The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks.

Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach.

NEOM Recovery Program Offers Market-Based Exit Strategy

The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions.

Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots.

Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims.

External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors.

The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery.

The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability.

The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone.

September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg.

Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917.

The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC.

For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum.

Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures.

The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Wealthfront Corporation (WLTH) Shareholders Who Lost Money – Contact Law Offices of Howard G. Smith About Securities Fraud Investigation

Wealthfront Corporation (WLTH) Shareholders Who Lost Money – Contact Law Offices of Howard G. Smith About Securities Fraud Investigation

BENSALEM, Pa.–(BUSINESS WIRE)–Law Offices of Howard G. Smith announces an investigation on behalf of Wealthfront Corporation (“Wealthfront” or the “Company”) (NASDAQ
Share
AI Journal2026/01/21 05:30
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32
VIRGINIA BEACH’S LANDSTOWN COMMONS ACQUIRED FOR $102 MILLION BY AN AFFILIATE OF YALE REALTY SERVICES CORP.

VIRGINIA BEACH’S LANDSTOWN COMMONS ACQUIRED FOR $102 MILLION BY AN AFFILIATE OF YALE REALTY SERVICES CORP.

First-in-Class Retail Plaza, Located in Prime Area Appeals with Demographic Diversity, High Employment Rate, Military and Vacation Population WHITE PLAINS, N.Y.,
Share
AI Journal2026/01/21 05:28