Suspect in $190M Nomad hack to be extradited to the US: Report

by

A Russian-Israeli citizen allegedly involved in the $190 million Nomad bridge hack will soon be extradited to the US after he was reportedly arrested at an Israeli airport while boarding a flight to Russia. 

Alexander Gurevich will be investigated for his alleged involvement in several “computer crimes,” including laundering millions of dollars and transferring stolen property allegedly connected to the Nomad Bridge hack in 2022, The Jerusalem Post reported on May 5.

Gurevich returned to Israel from an overseas trip on April 19 but was ordered to appear before the Jerusalem District Court for an extradition hearing soon after, according to the report. 

On April 29, Gurevich changed his name in Israel’s Population Registry to “Alexander Block” and received a passport under that name at Israel’s Ben-Gurion Airport the next day.

He was arrested at the same airport two days later, on May 1, while waiting to board a flight to Russia. 

Gurevich allegedly identified a vulnerability in the Nomad bridge, which he exploited and stole roughly $2.89 million worth of tokens from in August 2022.

Dozens of copycat hackers discovered and capitalized on the security vulnerability soon after, leading to a total loss of $190 million.

Gurevich allegedly reached out to a Nomad executive on Telegram

Prosecutors allege that shortly after the hack, Gurevich messaged Nomad’s chief technology officer, James Prestwich, on Telegram using a fake identity, admitting that he had been “amateurishly” seeking a crypto protocol to exploit.

He allegedly apologized for “the trouble he caused Prestwich and his team” and voluntarily transferred about $162,000 into a recovery wallet the company had set up.

Prestwich told Gurevich that Nomad would pay him 10% of the value of the assets he had stolen, to which Gurevich responded that he would consult his lawyer. However, Nomad never heard back from him after that.

Russia, Israel, Telegram, United States, Hacks
Alleged messages between Gurevich and Nomad’s James Prestwich were shared on X by Israel-based Walla News journalist Yoav Itiel. Source: Yoav Itiel

At some point during the negotiations, Gurevich demanded a reward of $500,000 for identifying the vulnerability.

Related: Do Kwon is in US custody after extradition battle

US federal authorities filed an eight-count indictment against Gurevich in the Northern District of California on Aug. 16, 2023, in addition to obtaining a warrant for his arrest. California is where the team behind the Nomad bridge is based.

The US submitted a formal extradition request in December 2024, the Post noted.

The money laundering charges that Gurevich faces carry a maximum of 20 years, significantly harsher than the penalties he would face in Israel.

Gurevich is believed to have arrived in Israel a few days before the $190 million exploit occurred, prompting Israeli officials to believe he carried out the attack while in Israel.

Magazine: Financial nihilism in crypto is over — It’s time to dream big again