<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>cross-chain risk Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/cross-chain-risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/cross-chain-risk/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Mon, 08 Sep 2025 08:07:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>cross-chain risk Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/cross-chain-risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Breaking: Sui-Based DeFi Platform Hacked!</title>
		<link>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/</link>
					<comments>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 08:07:31 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto vulnerability]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[defi platform]]></category>
		<category><![CDATA[Ethereum bridge]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[sui network]]></category>
		<category><![CDATA[USDC theft]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=50434</guid>

					<description><![CDATA[<p>Today, Nemo Protocol, a Sui-based decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain</p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>Today, <strong>Nemo Protocol</strong>, a <a href="https://coinengineer.net/blog/sui-network-announces-and-deletes-robinhood-listing-announcement/"><strong>Sui-based</strong></a> decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain bridges.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Platform users are closely monitoring the situation to secure their assets. The Nemo Protocol team has yet to provide a detailed public statement. Meanwhile, the community seeks clarity on whether the lost funds can be recovered. Security researchers are actively investigating the attack and tracking the attacker’s wallet movements.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <img fetchpriority="high" decoding="async" class="aligncenter wp-image-50435 " src="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg" alt="" width="678" height="428" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-300x189.jpeg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-768x485.jpeg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack.jpeg 1110w" sizes="(max-width: 678px) 100vw, 678px" /></span></p>
<h2><span data-c>Attack Details and Implications for Nemo Protocol</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Nemo Protocol allows users to deposit assets and take positions based on changing interest rates. All operations are automated through smart contracts, making the system fast and efficient. However, even minor coding errors can lead to significant losses. In this case, the attacker exploited a weak point and quickly moved the funds across different networks, evading detection.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The scale of this single attack is concerning. <strong>DeFi hacks</strong> continue to account for a large portion of crypto losses in 2025. Every month, new incidents increase the total loss, with August alone seeing millions of dollars stolen in 16 separate attacks.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Cross-Chain Bridges: Key Vulnerabilities for DeFi</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Cross-chain bridges allow users to transfer assets between different blockchains. While convenient, these bridges concentrate large funds, making them prime targets for hackers. Attackers exploit the complexity of DeFi systems to move stolen assets across multiple networks. Cross-chain vulnerabilities remain one of the biggest security concerns in DeFi.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Developers must prioritize security measures to prevent attacks. Even sophisticated users cannot fully mitigate risks if bridge and contract vulnerabilities exist.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Ethereum Pectra Update Contains a Critical Vulnerability!</title>
		<link>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/</link>
					<comments>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 16:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[EIP-7702]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Ethereum upgrade]]></category>
		<category><![CDATA[hardware wallet]]></category>
		<category><![CDATA[multisig wallet]]></category>
		<category><![CDATA[offchain signature]]></category>
		<category><![CDATA[Pectra]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[signature delegation]]></category>
		<category><![CDATA[smart contract]]></category>
		<category><![CDATA[wallet security]]></category>
		<category><![CDATA[Web3 threat]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42132</guid>

					<description><![CDATA[<p>In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, Pectra, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector. One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful</p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3574" data-end="3821">In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, <strong data-start="3688" data-end="3698">Pectra</strong>, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector.</p>
<p class="" data-start="3823" data-end="4015">One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful enough to hand over control of your funds — no onchain transaction required.</p>
<h2 data-start="4017" data-end="4065">EIP-7702: The Risky New Delegation Mechanism</h2>
<p class="" data-start="4067" data-end="4257">Activated on May 7, 2025, Pectra’s centerpiece <strong data-start="4114" data-end="4126">EIP-7702</strong> introduces a transaction type called SetCode, which allows users to <strong data-start="4195" data-end="4232">delegate control of their wallets</strong> via a simple signature.</p>
<p class="" data-start="4259" data-end="4509"><strong data-start="4259" data-end="4273">Arda Usman</strong>, a Solidity smart contract auditor, confirmed: <em>“An attacker can use this offchain signature to install malicious code into an externally owned account (EOA) and move ETH or tokens — without the user ever signing a transaction.”</em></p>
<p class="" data-start="4511" data-end="4633">This feature effectively transforms user wallets into smart contracts, opening the door to silent yet devastating attacks.</p>
<p data-start="4511" data-end="4633"><img decoding="async" class="aligncenter wp-image-155606 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1024x504.webp" alt="ethereum" width="734" height="361" /></p>
<h2 data-start="4635" data-end="4685">A Stealth Threat Via Innocent-Looking Messages</h2>
<p class="" data-start="4687" data-end="4918"><strong data-start="4687" data-end="4705">Yehor Rudytsia</strong>, an onchain researcher at Hacken, emphasized that this transaction type allows arbitrary code to be installed in wallets. Previously, such a change required an actual transaction; now, only a signature is enough.</p>
<hr />
<p data-start="4920" data-end="5136"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="4920" data-end="5136">This shift means phishing attempts, fake DApps, or Discord scams can now result in complete wallet takeovers. <em>“We believe this will become the most common attack vector following the Pectra upgrade,”</em> Rudytsia warned.</p>
<p class="" data-start="5138" data-end="5243">Wallet applications that fail to correctly interpret transaction type <strong data-start="5208" data-end="5216">0x04</strong> are especially vulnerable.</p>
<p data-start="5138" data-end="5243"><img decoding="async" class="aligncenter wp-image-155608 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1-1024x728.webp" alt="ethereum" width="739" height="525" /></p>
<h2 data-start="5245" data-end="5288">Hardware Wallets Are Not Immune Anymore</h2>
<p class="" data-start="5290" data-end="5526">The once-clear distinction between hot and cold wallets is fading. Rudytsia highlighted that <strong data-start="5383" data-end="5403">hardware wallets</strong> are now just as vulnerable if users unknowingly sign malicious messages: <em>“Once signed, all funds can be gone in a moment.”</em></p>
<p class="" data-start="5528" data-end="5555">To stay safe, users should:</p>
<ul>
<li data-start="5559" data-end="5608">Never sign messages they do not fully understand.</li>
<li data-start="5611" data-end="5685">Look out for delegation requests, especially those involving nonce values.</li>
<li data-start="5688" data-end="5782">Be aware that some delegation signatures can be replayed on <strong data-start="5748" data-end="5781">any Ethereum-compatible chain</strong>.</li>
</ul>
<p class="" data-start="5784" data-end="5934">While multisig wallets offer more robust protection, single-key wallets — including hardware ones — must adopt new safeguards to prevent exploitation.</p>
<hr />
<p data-start="5784" data-end="5934"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
