Hackers have managed to exploit Orbit Bridge, the cross-chain bridging service of the Orbit Chain protocol, just hours before the new year, making off with a staggering $82 million.
This shocking breach was brought to light on December 31st by a pseudonymous Twitter user known as Kgjr, who raised the alarm regarding significant outflows from the Orbit Chain Bridge protocol.
Subsequently, blockchain investigators Officer CIA and cybersecurity firm Cyvers corroborated these findings.
Based on data from the blockchain analytics platform Arkham Intelligence, the hackers successfully siphoned off a grand total of $81.68 million.
This sum was divided among five separate transactions, involving $30 million in Tether, $10 million in USD Coin, $21.7 million in Ether, $9.8 million in Wrapped Bitcoin (WBTC), and $10 million worth of the algorithmic stablecoin DAI, all of which were swiftly moved to new wallets.
The Orbit Chain protocol is closely intertwined with the Klaytn network (KLAY), a modular layer-1 blockchain.
READ MORE: Bitcoin ETF Race Heats Up as Top Contenders Submit Final Applications
Notably, Klaytn’s block explorer indicates that eight of the highest-valued assets on the Klaytn network are actually wrapped assets that rely on the Orbit Bridge for cross-chain transfers.
Despite the gravity of the situation, the exact nature of the exploit remains shrouded in mystery. Attempts to solicit comments from Orbit Chain and Klaytn regarding this incident yielded no immediate response, leaving the crypto community in suspense.
Orbit Chain, which was launched in South Korea in 2018, is a versatile multi-asset blockchain primarily designed for facilitating cross-chain transfers across various decentralized networks.
Its typical use case involves the seamless transfer of assets between EVM-compatible networks and the Klaytn network.
It is crucial to distinguish Orbit Chain from another cross-chain bridging protocol called Orbiter Finance, which shares a somewhat similar name but operates independently.
As the crypto space grapples with the fallout from this high-profile breach, security measures and risk assessments across the ecosystem are expected to be scrutinized and enhanced.