Harmony One Sinks By 12 Following 100M Horizon Bridge Attack
With hacks and attacks taking
FBI links Lazarus Group to Harmony’s $100M bridge attack
With hacks and attacks taking the front stage, a part of the Harmony network was exploited. The Horizon Bridge to the Harmony layer-1 chain underwent a massive attack
Harmony’s Horizon Bridge Exploit: A Crypto Money Laundering
Hackers have stolen
Hackers have stolen $100 million in cryptocurrency from Horizon, a so-called blockchain bridge developed by crypto start-up Harmony. Bridges allow users to transfer
Harmony [ONE] sinks by 12% following $100M Horizon Bridge
Harmony Ropes in FBI After Losing $100M in Exploit; ONE
Our incident response team has
Summary of the Horizon Bridge Incident - Announcements
Our incident response team has discovered evidence that private keys were compromised, leading to the breach of the Horizon bridge. Funds were stolen on the Ethereum
The Harmony Horizon Bridge Hack - elliptic.co
On Friday
Harmony’s Horizon Bridge Hack. On Thursday, J
On Friday, June 24, the Harmony Bridge was attacked, and altcoins to the tune of $100 million were swapped for ETH and siphoned. This was announced in their official blog
After successfully compromising private keys and stealing funds on the Ethereum side of the Horizon bridge, the attackers proceeded to execute a well-orchestrated exploit scenario. Here
Through our investigation
Harmony's Horizon Bridge Attack: How $100M was Siphoned
Hackers steal $100 million in crypto from Harmony's Horizon bridge
“Through our investigation, we were able to confirm that the Lazarus Group (also known as APT38) cyber actors associated with the DPRK, are responsible for the theft of
Horizon Bridge
Horizon Bridge: the cryptoasset bridge which connects the Harmony blockchain with Ethereum and Binance Smart Chain, allowing users to transfer tokens seamlessly between the three
The attack adds to this year's litany of exploits targeting bridges, which allow users to move tokens between blockchains, taking the total lost to more than $1 billion in 2025
We believe the attacker (s) 1) employed a phishing schemes to trick at least one software developer to install malicious software on their laptop, that 2) enabled the