Blockchain

Jump Trading Backstops Wormhole’s $320M Exploit Loss

After one of the most devastating exploits in crypto history, the parent company for a popular cross-blockchain bridge has reportedly stepped in to backstop funds – a move that may have prevented widespread damage in the Solana decentralized finance (DeFi) ecosystem.

On Wednesday night, the Wormhole bridge suffered an exploit to its Solana-Ethereum bridge, with an attacker fraudulently minting 120,000 ether (ETH) worth over $320 million. The attacker moved the majority of the funds to the Ethereum main chain, while keeping 40,000 wrapped ETH on Solana and trading portions of that ether for other assets.

On Thursday, three people familiar with the matter confirmed to CoinDesk that Jump Trading is responsible for replenishing the lost ETH. After publication of this article, Jump confirmed the move in a tweet:

The unbacked ETH briefly appeared as if it might lead to chaos across popular Solana platforms. Blockchain bridges often work by locking an asset into a smart contract and issuing a parallel, “wrapped” asset on another chain. Because the exploit minted wrapped ETH, it left Wormhole’s real ETH reserves unbacked.

Step Finance co-founder George Harrap told CoinDesk on Wednesday that a number of Solana-based protocols that accept ETH as collateral could become insolvent due to the exploit.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

1 semaine ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

1 semaine ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

2 semaines ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

2 semaines ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

2 semaines ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.