<p style="float:right; margin:0 0 10px 15px; width:240px;"><img src="https://images.cointelegraph.com/im...kM2UtODU2Ni03NWUzLTlkNmYtMGU0NWYzYWQ1NWQz.jpg"></p><p><p style="float:right; margin:0 0 10px 15px; width:240px;"><img src="https://images.cointelegraph.com/im...kM2UtODU2Ni03NWUzLTlkNmYtMGU0NWYzYWQ1NWQz.jpg" alt="Suspect in $190M Nomad hack to be extradited to the US: Report"></p><p>A Russian-Israeli citizen allegedly involved in the $190 million Nomad bridge hack will soon be extradited to the US after he was reportedly arrested at an Israeli airport while boarding a flight to Russia. <p>Alexander Gurevich will be investigated for his alleged involvement in several “computer crimes,” including laundering millions of dollars and transferring stolen property allegedly connected to the Nomad Bridge hack in 2022, The Jerusalem Post <a data-ct-non-breakable="null" href="https://www.jpost.com/israel-news/article-852464" rel="null" target="null" text="null" title="null">reported</a> on May 5.</p><p>Gurevich returned to Israel from an overseas trip on April 19 but was ordered to appear before the Jerusalem District Court for an extradition hearing soon after, according to the report. </p><p>On April 29, Gurevich changed his name in Israel’s Population Registry to “Alexander Block” and received a passport under that name at Israel’s Ben-Gurion Airport the next day.</p><p>He was arrested at the same airport two days later, on May 1, while waiting to board a flight to Russia. </p><p>Gurevich allegedly identified a vulnerability in the Nomad bridge, which he exploited and stole roughly $2.89 million worth of tokens from in August 2022.</p><p><a data-ct-non-breakable="null" href="https://cointelegraph.com/news/88-of-nomad-bridge-exploiters-were-copycats-report" rel="null" target="null" text="null" title="https://cointelegraph.com/news/88-of-nomad-bridge-exploiters-were-copycats-report">Dozens of copycat hackers</a> discovered and capitalized on the security vulnerability soon after, leading to a <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/nomad-token-bridge-drained-of-190m-in-funds-in-security-exploit" rel="null" target="null" text="null" title="https://cointelegraph.com/news/nomad-token-bridge-drained-of-190m-in-funds-in-security-exploit">total loss of $190 million</a>.</p><h2>Gurevich allegedly reached out to a Nomad executive on Telegram</h2><p>Prosecutors allege that shortly after the hack, Gurevich messaged Nomad’s chief technology officer, James Prestwich, on Telegram using a fake identity, admitting that he had been “amateurishly” seeking a crypto protocol to exploit.</p><p>He allegedly apologized for “the trouble he caused Prestwich and his team” and voluntarily transferred about $162,000 into a <a data-ct-non-breakable="null" href="https://cointelegraph.com/learn/articles/how-to-recover-a-crypto-wallet" rel="null" target="null" text="null" title="null">recovery wallet</a> the company had set up.</p><p>Prestwich told Gurevich that Nomad would pay him 10% of the value of the assets he had stolen, to which Gurevich responded that he would consult his lawyer. However, Nomad never heard back from him after that.</p><figure><img alt="Russia, Israel, Telegram, United States, Hacks" src="https://s3.cointelegraph.com/uploads/2025-05/0196a3f8-5b2a-7890-b6cb-752c5880bc3d" title=""><figcaption style="text-align: center;"><em>Alleged messages between Gurevich and Nomad’s James Prestwich were shared on X by Israel-based Walla News journalist Yoav Itiel. Source: </em><a data-ct-non-breakable="null" href="https://x.com/yoavetiel/status/1918585913451438175" rel="null" target="null" text="null" title="https://x.com/yoavetiel/status/1918585913451438175"><em>Yoav Itiel</em></a></figcaption></figure><p><br>At some point during the negotiations, Gurevich demanded a reward of $500,000 for identifying the vulnerability.</p><p><em><strong>Related: </strong></em><a data-ct-non-breakable="null" href="https://cointelegraph.com/news/do-kwon-united-states-custody-extradition-montenegro" rel="null" target="null" text="null" title="null"><em><strong>Do Kwon is in US custody after extradition battle</strong></em></a></p><p>US federal authorities filed an eight-count indictment against Gurevich in the Northern District of California on Aug. 16, 2023, in addition to obtaining a warrant for his arrest. California is where the team behind the Nomad bridge is based.</p><p>The US submitted a <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/india-arrest-aleksej-besciokov-garantex" rel="null" target="null" text="null" title="null">formal extradition request</a> in December 2024, the Post noted.</p><p>The <a data-ct-non-breakable="null" href="https://cointelegraph.com/explained/crypto-and-money-laundering-what-you-need-to-know" rel="null" target="null" text="null" title="null">money laundering</a> charges that Gurevich faces carry a maximum of 20 years, significantly harsher than what he would face in Israel.</p><p>Gurevich is believed to have arrived in Israel a few days before the $190 million exploit occurred, prompting Israeli officials to believe he <a data-ct-non-breakable="null" href="https://cointelegraph.com/news/aussies-revealed-as-prime-targets-of-israel-crypto-scam-syndicate" rel="null" target="null" text="null" title="null">carried out the attack while in Israel.</a></p><p><em><strong>Magazine: </strong></em><a data-ct-non-breakable="null" href="https://cointelegraph.com/magazine/financial-nihilism-crypto-over-dream-big-again/" rel="null" target="null" text="null" title="null"><em><strong>Financial nihilism in crypto is over — It’s time to dream big again</strong></em></a></p><template data-name="subscription_form" data-type="markets_outlook" label="Subscription Form: Markets Outlook"></template></p>
</p>
A Russian-Israeli citizen allegedly involved in the $190 million Nomad bridge hack will soon be extradited to the US after he was reportedly arrested at an Israeli airport while boarding a flight to Russia.
Alexander Gurevich will be investigated for his alleged involvement in several “computer crimes,” including laundering millions of dollars and transferring stolen property allegedly connected to the Nomad Bridge hack in 2022, The Jerusalem Post reported on May 5.
Gurevich returned to Israel from an overseas trip on April 19 but was ordered to appear before the Jerusalem District Court for an extradition hearing soon after, according to the report.
On April 29, Gurevich changed his name in Israel’s Population Registry to “Alexander Block” and received a passport under that name at Israel’s Ben-Gurion Airport the next day.
He was arrested at the same airport two days later, on May 1, while waiting to board a flight to Russia.
Gurevich allegedly identified a vulnerability in the Nomad bridge, which he exploited and stole roughly $2.89 million worth of tokens from in August 2022.
Dozens of copycat hackers discovered and capitalized on the security vulnerability soon after, leading to a total loss of $190 million.
Prosecutors allege that shortly after the hack, Gurevich messaged Nomad’s chief technology officer, James Prestwich, on Telegram using a fake identity, admitting that he had been “amateurishly” seeking a crypto protocol to exploit.
He allegedly apologized for “the trouble he caused Prestwich and his team” and voluntarily transferred about $162,000 into a recovery wallet the company had set up.
Prestwich told Gurevich that Nomad would pay him 10% of the value of the assets he had stolen, to which Gurevich responded that he would consult his lawyer. However, Nomad never heard back from him after that.
At some point during the negotiations, Gurevich demanded a reward of $500,000 for identifying the vulnerability.
Related: Do Kwon is in US custody after extradition battle
US federal authorities filed an eight-count indictment against Gurevich in the Northern District of California on Aug. 16, 2023, in addition to obtaining a warrant for his arrest. California is where the team behind the Nomad bridge is based.
The US submitted a formal extradition request in December 2024, the Post noted.
The money laundering charges that Gurevich faces carry a maximum of 20 years, significantly harsher than what he would face in Israel.
Gurevich is believed to have arrived in Israel a few days before the $190 million exploit occurred, prompting Israeli officials to believe he carried out the attack while in Israel.
Magazine: Financial nihilism in crypto is over — It’s time to dream big again
Continue reading...
</p>


A Russian-Israeli citizen allegedly involved in the $190 million Nomad bridge hack will soon be extradited to the US after he was reportedly arrested at an Israeli airport while boarding a flight to Russia.
Alexander Gurevich will be investigated for his alleged involvement in several “computer crimes,” including laundering millions of dollars and transferring stolen property allegedly connected to the Nomad Bridge hack in 2022, The Jerusalem Post reported on May 5.
Gurevich returned to Israel from an overseas trip on April 19 but was ordered to appear before the Jerusalem District Court for an extradition hearing soon after, according to the report.
On April 29, Gurevich changed his name in Israel’s Population Registry to “Alexander Block” and received a passport under that name at Israel’s Ben-Gurion Airport the next day.
He was arrested at the same airport two days later, on May 1, while waiting to board a flight to Russia.
Gurevich allegedly identified a vulnerability in the Nomad bridge, which he exploited and stole roughly $2.89 million worth of tokens from in August 2022.
Dozens of copycat hackers discovered and capitalized on the security vulnerability soon after, leading to a total loss of $190 million.
Gurevich allegedly reached out to a Nomad executive on Telegram
Prosecutors allege that shortly after the hack, Gurevich messaged Nomad’s chief technology officer, James Prestwich, on Telegram using a fake identity, admitting that he had been “amateurishly” seeking a crypto protocol to exploit.
He allegedly apologized for “the trouble he caused Prestwich and his team” and voluntarily transferred about $162,000 into a recovery wallet the company had set up.
Prestwich told Gurevich that Nomad would pay him 10% of the value of the assets he had stolen, to which Gurevich responded that he would consult his lawyer. However, Nomad never heard back from him after that.
Alleged messages between Gurevich and Nomad’s James Prestwich were shared on X by Israel-based Walla News journalist Yoav Itiel. Source: Yoav Itiel
At some point during the negotiations, Gurevich demanded a reward of $500,000 for identifying the vulnerability.
Related: Do Kwon is in US custody after extradition battle
US federal authorities filed an eight-count indictment against Gurevich in the Northern District of California on Aug. 16, 2023, in addition to obtaining a warrant for his arrest. California is where the team behind the Nomad bridge is based.
The US submitted a formal extradition request in December 2024, the Post noted.
The money laundering charges that Gurevich faces carry a maximum of 20 years, significantly harsher than what he would face in Israel.
Gurevich is believed to have arrived in Israel a few days before the $190 million exploit occurred, prompting Israeli officials to believe he carried out the attack while in Israel.
Magazine: Financial nihilism in crypto is over — It’s time to dream big again
Continue reading...