Get 40% Off
These stocks are up over 10% post earnings. Did you spot the buying opportunity? Our AI did.Read how

Explainer-How hackers stole and returned $600 million in tokens from Poly Network

Published 08/12/2021, 01:04 AM
Updated 08/12/2021, 04:01 PM
© Reuters. FILE PHOTO: A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration/File Photo

By Gertrude Chavez-Dreyfuss and Michelle Price

WASHINGTON (Reuters) -Hackers pulled off the biggest ever cryptocurrency heist on Tuesday, stealing more than $600 million in digital coins from token-swapping platform Poly Network, only to return nearly all the assets less than 48 hours later, the company said. [nL1N2PJ21E]

Here is what we know so far about the heist.

WHAT IS POLY NETWORK?

A lesser-known name in the world of crypto, Poly Network is a decentralized finance (DeFi) platform that facilitates peer-to-peer transactions with a focus on allowing users to transfer or swap tokens across different blockchains.

For example, a customer could use Poly Network to transfer tokens such as bitcoin from the Ethereum blockchain to the Binance Smart Chain.

Poly Network was founded by Chinese entrepreneur Da Hongfei, who is currently chief executive of Neo, a blockchain platform.

According to Neo's website, Poly Network was launched in August last year as a collaboration between Neo, crypto trading platform Switcheo and blockchain company Ontology.

HOW DID HACKERS STEAL THE TOKENS?

Poly Network operates on the Binance Smart Chain, Ethereum and Polygon blockchains. Tokens are swapped between the blockchains using a smart contract which contains instructions on when to release the assets to the counterparties.

One of the smart contracts that Poly Network uses to transfer tokens between blockchains maintains large amounts of liquidity to allow users to efficiently swap tokens, according to crypto intelligence firm CipherTrace.

Poly Network tweeted on Tuesday that a preliminary investigation found the hackers exploited a vulnerability in this smart contract.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

According to an analysis of the transactions tweeted by Kelvin Fichter, an Ethereum programmer, the hackers appeared to override the contract instructions for each of the three blockchains and diverted the funds to three wallet addresses, digital locations for storing tokens. These were later traced and published by Poly Network.

The attackers stole funds in more than 12 different cryptocurrencies, including ether and a type of bitcoin, according to blockchain forensics company Chainalysis.

A person claiming to have perpetrated the hack said they had spotted a "bug," without specifying, and that they wanted to "expose the vulnerability" before others could exploit it, according to digital messages posted on the Ethereum network published by Chainalysis. Reuters could not verify the authenticity of the messages.

WHERE DID THE MONEY GO?

Coindesk reported on Tuesday that the hackers had initially tried to transfer some of the assets from one of the three wallets into liquidity pool Curve.fi, but that transfer was rejected. About $100 million was moved out of another of the wallets and deposited into liquidity pool Ellipsis Finance, Coindesk also reported.

Curve.fi. and Ellipsis Finance could not immediately be reached for comment.

But early Wednesday the hackers started transferring assets back to Poly Network into a wallet which both parties controlled. By Thursday afternoon, the hackers had returned nearly all of the assets, with just $33 million tokens frozen earlier by cryptocurrency platform Tether outstanding, Poly Network said.

It added that it was still communicating with the hackers, referring to them as "Mr White Hat" - an ethical hacker who generally works to expose vulnerabilities so they can be fixed.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

WHO IS THE HACKER?

The hacker or hackers have not yet been identified.

Cryptocurrency security firm SlowMist said on its website that it has identified the attacker's mailbox, internet protocol address, and device fingerprints, but the company has not yet named any individuals. SlowMist said the heist was "likely to be a long-planned, organized and prepared attack."

Despite the purported hacker posing as a so-called "white hat", an ethical hacker who had "always" planned to give the money back, according to the messages published by Chainalysis, some crypto experts are skeptical.

Gurvais Grigg, chief technology officer at Chainalysis and former FBI veteran, said on Wednesday that it was unlikely that white hat hackers would steal such a large sum and that they may have returned the money due to the difficulties of laundering it.

Latest comments

what I find fascinating, is that given the inherent security around blockchain technology, how the hack was exploited. it goes without saying. however what i find even more fascinating is how that same technology is able to prevent him from attempting to launder the stolen assets. the hacker was traced so quickly, that funds are already being recovered. my point is that, while the technology isn't flawless, it's certainly pretty close. I'd imagine a this flaw will be remedied across all blockchains, and the technology will evolve even further into the future.
Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.