Hacker behind Poly Network crypto heist did it ‘for fun’

Poly Network says $342 million worth of stolen coins has been returned to the company.

Poly Network operates a platform that allows people to move tokens between different blockchains.

The hacker apparently exploited a vulnerability in the way Poly Network verified smart contracts to change a list of public keys to match the hacker’s private keys, an analysis of the hack tweeted by Kelvin Fichter.

The hack was the biggest one in Poly Network’s history, the company said in a note to the hacker on Twitter.

In the Q&A found in one of the transactions, the hacker gave some insight into the motivation behind the hack. “Ask yourself what would you do had you faced so much fortune. Ask the project team politely so that they can fix it? Anyone could be the traitor given one billion!” the hacker wrote.

“I prefer to stay in the dark and save the world,” said the hacker. ‘I am not very interested in money! I know it hurts when people are attacked, but shouldn’t they learn something from those hacks?” he wrote.

The difficulty in moving that amount of cryptocurrency anonymously likely also posed a challenge for the hacker, said Joel Kruger,

CNBC

Suspected hacker behind $600 million Poly Network crypto heist did it ‘for fun’

More than $600 million worth of crypto was stolen in a cyberattack that targeted a decentralized finance platform called Poly Network.

Read More


Reuters

Crypto platform Poly Network rewards hacker with $500,000 ‘bug bounty’

Poly Network, the cryptocurrency platform which lost $610 million in a hack earlier this week, confirmed on Friday it had offered the hacker or hackers a $500,000 “bug bounty”.

Read More


Reuters

Explainer: How hackers stole and returned $600 mln in tokens from Poly Network

Hackers pulled off the biggest ever cryptocurrency heist on Tuesday, stealing more than $600 million in digital coins from token-swapping platform Poly Network, only to return nearly all the assets less than 48 hours later, the company said. [nL1N2PJ21E]

Read More