Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviewsNemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7. The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts. The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment. The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization. Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach. The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack. Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors. The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation. MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions. The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely. Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission. The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners. Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability. Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise. The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks. Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach. NEOM Recovery Program Offers Market-Based Exit Strategy The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions. Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots. Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims. External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors. The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery. The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability. The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone. September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg. Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917. The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC. For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum. Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures. The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews

Nemo Protocol Issues NEOM Debt Tokens to Compensate $2.6M Exploit Victims

2025/09/15 17:28
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Nemo Protocol launched its NEOM debt token program to compensate victims of a $2.6 million exploit that devastated the Sui-based DeFi platform on September 7.

The protocol will issue one NEOM token for every dollar lost, allowing users to claim debt tokens while migrating remaining assets to secure multi-audited contracts.

The hack originated from a rogue developer who secretly deployed unaudited code containing critical vulnerabilities, bypassing internal review processes through single-signature deployment.

The attacker exploited flash loan functions incorrectly exposed as public and query functions that could modify contract state without authorization.

Nemo’s total value locked collapsed from $6.3 million to $1.57 million as users withdrew over $3.8 million worth of USDC and SUI tokens following the breach.

The exploit occurred during one of crypto’s worst security days in 2025, coinciding with SwissBorg’s $41.5 million SOL hack and the Yala stablecoin depeg attack.

Rogue Developer’s Secret Code Deployment Triggers Security Catastrophe

The post-mortem investigation revealed systematic security failures dating to January 2025 when the unnamed developer submitted code containing unaudited features to MoveBit auditors.

The developer failed to highlight new additions while mixing previously audited fixes with unreviewed functionality, creating a compromised foundation.

MoveBit issued its final audit report based on incomplete information, as the developer used unauthorized smart contract versions.

The team deployed contract version 0xcf34 using a single-signature address 0xf55c, rather than audit-confirmed hashes, thereby circumventing established review protocols entirely.

Asymptotic team identified the critical C-2 vulnerability in August, warning that functions could modify code without permission.

The developer dismissed severity concerns and failed to implement necessary fixes despite available support from security partners.

Attack execution began at 16:00 UTC on September 7 with hackers leveraging the flash loan function and a known query vulnerability.

Detection occurred thirty minutes later when YT yields displayed over 30x returns, indicating system compromise.

The developer drew inspiration from Aave and Uniswap protocols to maximize composability through flash loan capabilities, but critically underestimated security risks.

Functions designed for read-only purposes contained write capabilities, creating the primary attack vector that enabled the devastating breach.

NEOM Recovery Program Offers Market-Based Exit Strategy

The three-step recovery program begins with asset migration, allowing users to transfer residual value from compromised pools to new secure contracts through one-click actions.

Users simultaneously receive NEOM debt tokens pegged 1:1 to their USD losses determined by pre-hack snapshots.

Nemo will inject value into NEOM through a multi-tiered redemption waterfall model, with recovered hacker funds forming the primary source for proportional claims.

External capital injections, such as liquidity loans and strategic investments, will provide secondary support as confidence anchors.

The protocol established immediate AMM liquidity pools with significant depth on major Sui DEXs, creating instant market-based exit paths for users prioritizing liquidity over long-term recovery.

The NEOM/USDC trading pair enables market pricing based on perceived recovery timelines and protocol success probability.

The hack contributes to 2025’s devastating DeFi security crisis, with over $2.37 billion lost across 121 incidents during the first half alone.

September emerged as particularly destructive with SwissBorg’s SOL compromise, npm supply chain attacks affecting billions of downloads, and the Yala stablecoin losing its dollar peg.

Particularly, the Yala stablecoin (YU) attack, which happened this weekend, saw YU lose its dollar peg following a protocol attack that sent the Bitcoin-native over-collateralized stablecoin crashing to $0.2074 before recovering to $0.917.

The suspected attacker minted 120 million YU tokens on Polygon and sold 7.71 million across Ethereum and Solana for 7.7 million USDC.

For Nemo Protocol, stolen assets totaling $2.59 million moved through sophisticated laundering operations via Wormhole CCTP before final aggregation on Ethereum.

Security teams established monitoring protocols for holding addresses while coordinating with centralized exchanges on potential asset freezing measures.

The protocol implemented emergency incremental audits with Asymptotic while planning additional independent security firm reviews.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Coinbase Urges Treasury to Clarify GENIUS Act Implementation

Coinbase Urges Treasury to Clarify GENIUS Act Implementation

The post Coinbase Urges Treasury to Clarify GENIUS Act Implementation appeared on BitcoinEthereumNews.com. Coinbase has called on the U.S. Treasury Department to provide clearer guidance on the implementation of the GENIUS Act, warning that excessive regulation could undermine innovation and weaken the country’s position as a global leader in digital finance. Source: Coinbase In an official statement, Coinbase’s Director of Policy, Faryar Shirzad, said that new rules should “ensure the competitiveness of U.S. stablecoins and create conditions for their global adoption as a payment instrument.” The exchange cautioned the Treasury against introducing restrictions not explicitly outlined in the law, urging policymakers to focus on innovation rather than limitation. Coinbase’s Recommendations for the GENIUS Framework In its response, Coinbase proposed several key adjustments to the regulatory framework. It suggested that non-financial software developers, blockchain validators, and open protocols be excluded from GENIUS compliance requirements. The company also argued that the ban on interest payments should apply only to stablecoin issuers, not to exchanges or intermediaries offering bonus programs or loyalty rewards. Coinbase emphasized that rewards from third parties should not be considered a violation, warning that a broad definition of “interest” could distort the intent of the legislation. The firm additionally proposed that payment stablecoins be treated as cash equivalents for accounting and tax purposes — a move it said would “reflect their real-world use as stable digital currencies.” The GENIUS Act and Its Impact Signed into law in July 2025, the GENIUS Act marked the first comprehensive federal regulation of the U.S. stablecoin market. The law requires that all stablecoins be fully backed by liquid assets, mandates annual audits for issuers, and sets rules for foreign-issued tokens operating in the U.S. market. Coinbase urged regulators to uphold Congress’s original intent, emphasizing that effective policy should allow innovation to grow within the framework of the law, not in defiance of it. Not all lawmakers…
Share
BitcoinEthereumNews2025/11/07 02:16
Q2 Market Insights: Bitcoin regains dominance in risk-averse environment, ETFs remain critical to market structure

Q2 Market Insights: Bitcoin regains dominance in risk-averse environment, ETFs remain critical to market structure

The market will show a downward trend in the short term, and then rebound and set new highs in the second half of the year.
Share
PANews2025/04/28 19:40
Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols

Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols

BitcoinWorld Critical USDT0 Response to Drift Hack Exposes Stark Contrast in Stablecoin Security Protocols In a decisive security move that highlights evolving
Share
bitcoinworld2026/04/02 17:15

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!