An American-Israeli nationwide named Osei Morrell has been arrested in Israel for his alleged involvement in exploiting the Nomad bridge smart-contract in August 2022 that allowed hackers to siphon $190 million.
Blockchain intelligence platform TRM Labs provided key info to worldwide regulation enforcement authorities, resulting in the identification of Morrell, who’s believed to have performed a central function in what is likely one of the largest hacks in DeFi historical past.
“The suspect, American-Israeli twin nationwide Osei Morrell, was arrested in Jerusalem by Israeli police working in coordination with the DOJ, the FBI, and Interpol,” defined TRM Labs.
In response to the blockchain intelligence agency, Morell will quickly be extradited to the United Statesas the authorized precedures have already been authorized.
Morrell’s hyperlinks to Nomad Bridge hack
The Nomad bridge is a cross-chain communication commonplace that permits customers to switch property between totally different blockchains.
On August 1, 2022, attackers exploited a crucial vulnerability launched in an replace to its Duplicate good contract, particularly within the ‘course of() operate.’
Although the contract was presupposed to confirm message proofs earlier than releasing funds, a misconfiguration allowed any message with an accurate root hash to be accepted, even when the underlying proof was invalid.
As soon as a single attacker discovered the flaw, the exploit methodology was rapidly picked up by lots of of different wallets, because it consisted in merely copy-pasting a particular transaction format.
This “mob-style” assault led to a chaotic and decentralized looting of the bridge, draining over $190 million in ETH, USDC, WBTC, and ERC-20 tokens.

Supply: TRM Labs
TRM Labs feedback that the vulnerability was very straightforward to leverage, so even individuals with no hacking abilities or deep blockchain information joined within the exploitation. Nevertheless, skilled North Korean actors have been additionally implicated.
Osei Morrell isn’t believed to have written or initiated the exploit code itself, however TRM Labs says he “performed a central function,” and proof suggests he conspired with others to launder massive quantities of funds stolen through the exploit.
Wallets linked to Morrell obtained stolen property inside hours of the bridge being drained, suggesting shut coordination with early attackers.
TMR Labs’ knowledge reveals that Morrell used ‘chain-hopping’ to maneuver the stolen tokens throughout numerous blockchains, the Twister Money mixer to obfuscate the origin of the funds, and swapped ETH into the privacy-boosting Monero (XMR) and Sprint.

Supply: TRM Labs
To money out the proceeds, he used non-custodial exchanges, OTC brokers, and offshore financial institution accounts tied to faux or opaque authorized entities, and in addition transformed some crypto to fiat via suppliers with no KYC requirements.
Regardless of all of the obfuscation efforts and the time that has handed since these occasions, blockchain transaction evaluation nonetheless yielded sufficient clues to uncover Morrell’s identification, leading to his arrest.
Morrell’s arrest follows that of one other suspected hacker, a Russian-Israeli citizen named Alexander Gurevich, who was caught on Could 1st on the Ben Gurion airport in Tel Aviv utilizing paperwork underneath a brand new identify, Alexander Block, he had formally modified.
In response to prosecutors, Gurevich exploited the Nomad bridge flaw and withdrew about $2.89 million in digital tokens. This was adopted by others discovering the problem and leveraging it to siphon property.
Jerusalem Put up studies that on August 4, 2022, Gurevich contacted Nomad’s Chief Expertise Officer and admitted he had been probing Nomad for weaknesses, apologizing for the difficulty and later demanding a $500,000 reward for figuring out the vulnerability.