TLDR Nemo Protocol’s $2.6 million exploit stemmed from unaudited code and developer errors. The vulnerabilities were introduced in January and led to unauthorized access and fund theft. Nemo has paused operations, patched the issues, and is working on compensating affected users. The attack exploited a flash loan function and query flaw, draining assets from liquidity [...] The post Nemo Protocol Explains $2.6 Million Exploit Caused by Code Vulnerabilities appeared first on CoinCentral.TLDR Nemo Protocol’s $2.6 million exploit stemmed from unaudited code and developer errors. The vulnerabilities were introduced in January and led to unauthorized access and fund theft. Nemo has paused operations, patched the issues, and is working on compensating affected users. The attack exploited a flash loan function and query flaw, draining assets from liquidity [...] The post Nemo Protocol Explains $2.6 Million Exploit Caused by Code Vulnerabilities appeared first on CoinCentral.

Nemo Protocol Explains $2.6 Million Exploit Caused by Code Vulnerabilities

2025/09/11 18:05

TLDR

  • Nemo Protocol’s $2.6 million exploit stemmed from unaudited code and developer errors.
  • The vulnerabilities were introduced in January and led to unauthorized access and fund theft.
  • Nemo has paused operations, patched the issues, and is working on compensating affected users.
  • The attack exploited a flash loan function and query flaw, draining assets from liquidity pools.

Nemo Protocol, a DeFi platform built on the Sui blockchain, has outlined the causes of its $2.6 million exploit earlier this month. The platform revealed in a post-mortem report that the attack was due to two vulnerabilities introduced into its code by a developer and deployed without proper auditing. The breach, which occurred on September 7, exploited flaws that allowed unauthorized access and manipulation of its smart contract.

Vulnerabilities in the Codebase

The Nemo team explained that the exploit stemmed from two primary issues within the code. First, an internal flash loan function was accidentally exposed to the public. Second, a flaw in a query function enabled unauthorized state changes within the contract. These vulnerabilities were introduced in January 2023, after the protocol received an initial audit report from blockchain security firm MoveBit. Despite the warnings, one of Nemo’s developers incorporated new, unaudited features into the codebase and deployed them to the mainnet.

Notably, the governance structure of the protocol relied on a single-signature address for upgrades, which allowed the unvetted code to be deployed. The team acknowledged that this system failed to prevent risky updates from being introduced. Furthermore, despite a security warning from Asymptotic in August regarding a separate vulnerability, the team did not take immediate action to address the issue.

Exploit Mechanics and Fund Movement

The attacker exploited the combination of the flash loan function and the query function vulnerability to manipulate the contract’s internal state. This enabled the unauthorized draining of assets from the SY/PT liquidity pool. The stolen funds were moved from the Sui network to Ethereum via the Wormhole CCTP bridge. As of now, the majority of the stolen assets remain in a single address.

In response to the breach, Nemo Protocol has paused its core functions to prevent further damage. The team has already patched the vulnerabilities and submitted the updated code for an emergency audit. They are working closely with security teams on the Sui blockchain to trace the stolen funds. Furthermore, the team is planning to compensate affected users.

Acknowledging the Failures

Despite multiple audits and safety measures, Nemo acknowledged that it had relied too heavily on past assurances without maintaining rigorous scrutiny at every step. The report stated that the team’s failure to catch these vulnerabilities during the development phase contributed to the exploit.

Nemo Protocol, a yield infrastructure platform, focuses on yield tokenization and aims to improve DeFi interactions. This breach has raised concerns about the platform’s code integrity, but the team is taking steps to address the issues and prevent future attacks.

The post Nemo Protocol Explains $2.6 Million Exploit Caused by Code Vulnerabilities appeared first on CoinCentral.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX presale hits $7.5M with tokens at $0.024 and 30% bonus code BLOCK30, while Solana holds $243 and Avalanche builds a $1B treasury to attract institutions.
Share
Blockchainreporter2025/09/18 01:07
OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

The post OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe appeared on BitcoinEthereumNews.com. The Office of the Comptroller of the Currency (OCC) has confirmed that nine major U.S. banks engaged in debanking practices from 2020 to 2023, restricting access for digital asset firms and other sectors. This marks the first official acknowledgment of these policies, which limited services based on customer types, affecting crypto businesses significantly. OCC report highlights inappropriate distinctions by banks like JPMorgan Chase and Bank of America, targeting crypto and high-risk sectors. Nine banks reviewed showed similar policies restricting customer access without objective risk assessments. Impacted industries include digital asset firms, with potential referrals to the Attorney General for unlawful practices. Discover how major U.S. banks’ debanking policies hit crypto firms hard, per OCC’s 2025 report. Learn the implications for digital assets and what regulators are doing next—stay informed on banking risks today! What Are the OCC’s Findings on Banks Debanking Crypto Firms? Banks debanking crypto firms involves major financial institutions limiting or denying services to digital asset businesses based on perceived risks, as detailed in a recent Office of the Comptroller of the Currency (OCC) report. From 2020 to 2023, nine of the largest U.S. banks implemented policies that required escalated reviews or outright restrictions for certain customers, including those in the crypto sector. This practice, now publicly confirmed, underscores ongoing tensions between traditional banking and emerging digital asset industries. How Did These Debanking Practices Affect Digital Asset Companies? The OCC’s six-page report, released on Wednesday, revealed that institutions such as JPMorgan Chase, Bank of America, Citigroup, Wells Fargo, U.S. Bancorp, Capital One, PNC Financial Services Group, Toronto-Dominion Bank, and Bank of Montreal made distinctions among customers that were deemed inappropriate. For digital asset firms, this meant heightened scrutiny or complete denial of banking services, hindering operations in an already volatile market. The regulator noted that these policies spanned…
Share
BitcoinEthereumNews2025/12/11 11:01