Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviewsNemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews

Nemo Protocol Issues NEOM Debt Tokens to Compensate $2.6M Exploit Victims

Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7.

The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts.

The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment.

The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization.

Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach.

The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack.

Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe

The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors.

The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation.

MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions.

The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely.

Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission.

The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners.

Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability.

Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise.

The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks.

Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach.

NEOM Recovery Program Offers Market-Based Exit Strategy

The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions.

Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots.

Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims.

External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors.

The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery.

The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability.

The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone.

September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg.

Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917.

The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC.

For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum.

Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures.

The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Gold Hits $3,700 as Sprott’s Wong Says Dollar’s Store-of-Value Crown May Slip

Gold Hits $3,700 as Sprott’s Wong Says Dollar’s Store-of-Value Crown May Slip

The post Gold Hits $3,700 as Sprott’s Wong Says Dollar’s Store-of-Value Crown May Slip appeared on BitcoinEthereumNews.com. Gold is strutting its way into record territory, smashing through $3,700 an ounce Wednesday morning, as Sprott Asset Management strategist Paul Wong says the yellow metal may finally snatch the dollar’s most coveted role: store of value. Wong Warns: Fiscal Dominance Puts U.S. Dollar on Notice, Gold on Top Gold prices eased slightly to $3,678.9 […] Source: https://news.bitcoin.com/gold-hits-3700-as-sprotts-wong-says-dollars-store-of-value-crown-may-slip/
Share
BitcoinEthereumNews2025/09/18 00:33
Will Cardano Reach $10 by 2030? Analysts Break Down ADA’s Growth Cycles

Will Cardano Reach $10 by 2030? Analysts Break Down ADA’s Growth Cycles

The post Will Cardano Reach $10 by 2030? Analysts Break Down ADA’s Growth Cycles appeared first on Coinpedia Fintech News Cardano (ADA) is trading at $0.9024 with a market cap of $32.91 billion. Experts say ADA has the potential to climb much higher, with some placing long-term targets as high as $10. The token continues to benefit from stronger visibility, rising liquidity, and increasing inflows from both institutional and retail markets. Can Cardano Hit $10 …
Share
CoinPedia2025/09/18 17:19
UL Research Institutes’ Chemical Insights Scientist Receives Achievement Award from The Society of Toxicology

UL Research Institutes’ Chemical Insights Scientist Receives Achievement Award from The Society of Toxicology

ATLANTA–(BUSINESS WIRE)–UL Research Institutes’ Chemical Insights scientist Katie Paul Friedman, Ph.D. has received the prestigious 2026 Achievement Award from
Share
AI Journal2026/01/21 03:46