Company Details
illusoryio
3
34
513
illusory.io
0
ILL_1233454
In-progress

Illusory Company CyberSecurity Posture
illusory.ioIllusory makes it easier to scrape online data and perform automated tasks without getting blocked or detected. Train AI language models, conduct market research, or run mission-critical operations with our powerful, bare metal mobile proxies.
Company Details
illusoryio
3
34
513
illusory.io
0
ILL_1233454
In-progress
Between 700 and 749

Illusory Global Score (TPRM)XXXX

Description: **FTC Orders Nomad to Return Stolen Funds and Reform Security After $186M Crypto Hack** The Federal Trade Commission (FTC) has reached a settlement with **Illusory Systems (operating as Nomad)**, requiring the company to return recovered funds to victims and implement sweeping cybersecurity reforms. The order follows a **2022 breach** in which hackers exploited a vulnerability in Nomad’s **Token Bridge**—a smart contract solution designed to transfer cryptocurrency across blockchains—stealing **$186 million** from users. The FTC’s investigation found that Nomad **misrepresented its security practices**, advertising its platform as “high security” and “security first” while failing to implement basic safeguards. In **June 2022**, the company deployed **untested code** after a security audit, leaving a critical flaw unaddressed. By **July 2022**, attackers exploited the vulnerability, draining user funds. White hat hackers later secured **$37 million** of the stolen assets, which Nomad is now required to return. The FTC’s complaint highlighted **systemic security failures**, including: - **Inadequate testing**: Most pre-deployment checks focused on functionality, not security. - **Lack of safeguards**: No automated fraud monitoring, circuit breakers, or kill switches to halt suspicious transactions. - **Delayed response**: The breach was detected via **social media**, not internal systems, and engineers scrambled to respond—including relaying code fixes mid-flight. - **Ignored warnings**: Months before the hack, an engineer warned leadership about weak testing practices, citing a prior incident where untested code caused losses. Nomad also **overrode internal efforts to reimburse users** after a separate bug in its web interface led to losses, with executives reportedly stating the platform offered “no guarantees of safety.” Under the settlement, Nomad must **develop a comprehensive cybersecurity program**, address flaws identified by the FTC, and submit to **third-party assessments**. The case underscores the FTC’s stance that companies must **deliver on security promises**—or face enforcement action.


Illusory has 11.11% more incidents than the average of same-industry companies with at least one recorded incident.
Illusory has 28.21% more incidents than the average of all companies with at least one recorded incident.
Illusory reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Illusory cyber incidents detection timeline including parent company and subsidiaries

Illusory makes it easier to scrape online data and perform automated tasks without getting blocked or detected. Train AI language models, conduct market research, or run mission-critical operations with our powerful, bare metal mobile proxies.

Thirteen-time Webby award-winning Freelancer is the world’s largest freelancing and crowdsourcing marketplace by total number of users and projects posted. More than 80 million registered users have posted over 25 million projects and contests to date in over 3,000 areas as diverse as website develo

We're a global technology group focused on innovation and collaboration to create a better future for all. Since 1976, we've been pioneering new technologies and expanding our reach to more people and places. Today, we provide services to over 163 million customers across 16 countries in the Middle
At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre

IndiaMART is India's largest online B2B marketplace, connecting buyers with suppliers across a wide array of industries. IndiaMART provides a platform for Small & Medium Enterprises (SMEs), large enterprises, and individual buyers, helping them access diverse portfolios of quality products. Since

As a leading internet technology company based in China, NetEase, Inc. (NASDAQ: NTES and HKEX:9999, "NetEase") provides premium online services centered around content creation. With extensive offerings across its expanding gaming ecosystem, NetEase develops and operates some of China's most popula

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar

At Myntra, we don’t just follow fashion - we define it. As India's leading fashion, lifestyle, and beauty destination, we bring together the best of style, technology, and innovation to create a seamless shopping experience for our customers. With a commitment to empowering self-expression, we cura
As the world’s leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europe’s largest tech platforms, we enable ambitious talent to deliver solutions

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot
.png)
The company was charged with materially misrepresenting the cybersecurity of its Token Bridge software as executives failed to implement...
Blockchain infrastructure company Illusory Systems Inc. will return money to customers affected by a 2022 hack in which cyber criminals...
Significant cyber events exposed the failure of fragmented security tools and established that point solutions can no longer protect against...
In 2026, the allure of digital convenience has reached unprecedented heights — but so has the anxiety surrounding personal data.
A sophisticated phishing campaign is currently exploiting a subtle typographical illusion to deceive users into surrendering sensitive login...
For decades, satellite communications systems operated under a comforting illusion: that their physical distance from terrestrial networks...
Immersive, the leader in cyber resilience, is revealing a widening gap between confidence and capability in cybersecurity.
AI was the constant background hum at the OWASP Global AppSec conference last week, but the scene-stealer was a keynote talk telling us that...
When Jaguar Land Rover's (JLR) production lines came to a halt on August 31, 2025, it signaled one of the most severe cyber attacks in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Illusory is https://illusory.io.
According to Rankiteo, Illusory’s AI-generated cybersecurity score is 742, reflecting their Moderate security posture.
According to Rankiteo, Illusory currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Illusory is not certified under SOC 2 Type 1.
According to Rankiteo, Illusory does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Illusory is not listed as GDPR compliant.
According to Rankiteo, Illusory does not currently maintain PCI DSS compliance.
According to Rankiteo, Illusory is not compliant with HIPAA regulations.
According to Rankiteo,Illusory is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Illusory operates primarily in the Technology, Information and Internet industry.
Illusory employs approximately 3 people worldwide.
Illusory presently has no subsidiaries across any sectors.
Illusory’s official LinkedIn profile has approximately 34 followers.
Illusory is classified under the NAICS code 513, which corresponds to Others.
No, Illusory does not have a profile on Crunchbase.
Yes, Illusory maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/illusoryio.
As of December 18, 2025, Rankiteo reports that Illusory has experienced 1 cybersecurity incidents.
Illusory has an estimated 13,246 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Total Financial Loss: The total financial loss from these incidents is estimated to be $186 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, but delayed and chaotic, and containment measures with shut down the bridge after assets were drained, and remediation measures with implementation of a comprehensive cybersecurity plan as part of ftc settlement, and recovery measures with return of $37 million safeguarded by white hat hackers to users, and enhanced monitoring with required as part of ftc settlement..
Title: Nomad Token Bridge Hack
Description: Hackers exploited a vulnerability in Illusory Systems' (Nomad) Token Bridge cryptocurrency smart contract solution, leading to the theft of $186 million in cryptocurrency funds from users. The FTC settlement requires the company to return recovered funds to victims and implement security reforms.
Date Detected: July 2022
Date Publicly Disclosed: July 2022
Type: Data Breach, Cryptocurrency Theft
Attack Vector: Exploitation of a software vulnerability in smart contracts
Vulnerability Exploited: Inadequately tested code in Token Bridge smart contracts
Threat Actor: Malicious hackers
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Financial Loss: $186 million
Data Compromised: Cryptocurrency funds
Systems Affected: Token Bridge smart contracts, cryptocurrency wallets
Operational Impact: Token Bridge was emptied of assets; delayed response due to lack of automated monitoring
Brand Reputation Impact: Significant damage due to misrepresentation of security capabilities
Legal Liabilities: FTC settlement, potential fines, and regulatory actions
Payment Information Risk: Cryptocurrency funds at risk
Average Financial Loss: The average financial loss per incident is $186.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Cryptocurrency funds.

Entity Name: Illusory Systems (Nomad)
Entity Type: Cryptocurrency company
Industry: Blockchain, FinTech
Customers Affected: Users of Token Bridge smart contracts

Incident Response Plan Activated: Yes, but delayed and chaotic
Containment Measures: Shut down the bridge after assets were drained
Remediation Measures: Implementation of a comprehensive cybersecurity plan as part of FTC settlement
Recovery Measures: Return of $37 million safeguarded by white hat hackers to users
Enhanced Monitoring: Required as part of FTC settlement
Incident Response Plan: The company's incident response plan is described as Yes, but delayed and chaotic.

Type of Data Compromised: Cryptocurrency funds
Sensitivity of Data: High (financial assets)
Data Exfiltration: Yes, $186 million stolen
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implementation of a comprehensive cybersecurity plan as part of FTC settlement.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by shut down the bridge after assets were drained.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Return of $37 million safeguarded by white hat hackers to users.

Regulations Violated: FTC Act (unfair or deceptive practices)
Legal Actions: FTC settlement requiring security reforms and fund return
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through FTC settlement requiring security reforms and fund return.

Lessons Learned: Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.

Recommendations: Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff, and avoid misrepresenting security capabilities.
Key Lessons Learned: The key lessons learned from past incidents are Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff and and avoid misrepresenting security capabilities..

Source: Federal Trade Commission
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Federal Trade Commission.

Investigation Status: Completed (FTC settlement reached)

Root Causes: Inadequate code testing, lack of secure coding practices, absence of automated fraud monitoring, insufficient security staff, and misrepresentation of security capabilities.
Corrective Actions: Implementation of a comprehensive cybersecurity plan, third-party assessments, and return of recovered funds to victims.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Required as part of FTC settlement.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implementation of a comprehensive cybersecurity plan, third-party assessments, and return of recovered funds to victims..
Last Attacking Group: The attacking group in the last incident was an Malicious hackers.
Most Recent Incident Detected: The most recent incident detected was on July 2022.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on July 2022.
Highest Financial Loss: The highest financial loss from an incident was $186 million.
Most Significant Data Compromised: The most significant data compromised in an incident was Cryptocurrency funds.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Shut down the bridge after assets were drained.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Cryptocurrency funds.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was FTC settlement requiring security reforms and fund return.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff and and avoid misrepresenting security capabilities..
Most Recent Source: The most recent source of information about an incident is Federal Trade Commission.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (FTC settlement reached).
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.