{"id":47504,"date":"2021-08-11T12:03:56","date_gmt":"2021-08-11T09:03:56","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=47504"},"modified":"2025-09-01T21:43:59","modified_gmt":"2025-09-01T18:43:59","slug":"hacker-who-stole-611-million-from-poly-network-begins-returning-funds","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/hacker-who-stole-611-million-from-poly-network-begins-returning-funds\/","title":{"rendered":"Hacker who stole $611 million from Poly Network begins returning funds"},"content":{"rendered":"<p>On August 11, an unknown attacker who had hacked the Chinese cross\u2011chain protocol Poly Network the day before said he intended to return $611 million stolen in the attack. CoinDesk <a href=\"https:\/\/www.coindesk.com\/poly-network-prepares-for-hacker-to-return-millions-in-stolen-crypto\" target=\"_blank\" rel=\"noopener\">reports<\/a>.<\/p>\n<div class=\"wp-block-text-wrappers-update-2 article_update\"><time class=\"gtb_text-wrappers_update_time\">11 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2021 | 14:27<\/time><span class=\"gtb_text-wrappers_update_head\">\u0410\u043f\u0434\u0435\u0439\u0442: <\/span><\/p>\n<p>The attacker made <a href=\"https:\/\/polygonscan.com\/address\/0xa4b291ed1220310d3120f515b5b7accaecd66f17#tokentxns\" target=\"_blank\" rel=\"noreferrer noopener\">first payouts<\/a> totaling 1,010,100 USDC. He also sent <a href=\"https:\/\/bscscan.com\/tx\/0x8537ce0fb13a9aae72a531b14838a59b9232bb3db8d65857f5e9b55bfbf3108d\" target=\"_blank\" rel=\"noreferrer noopener\">$1.1 million in the Bitcoin-pegged BTCB<\/a>, <a href=\"https:\/\/etherscan.io\/tx\/0x4d0c93ca9746d1c8a80c0ecf58bd5bba66654fefae3df320b4d138405d0cbc0e\" target=\"_blank\" rel=\"noreferrer noopener\">$2 million in Shiba Inu<\/a> and <a href=\"https:\/\/etherscan.io\/tx\/0xd3327a266add4ec655ef5fe00fd042bdcdf1b886c26af3b5dd21b2e4ec9bde49\" target=\"_blank\" rel=\"noreferrer noopener\">$622,243 in the FEI stablecoin<\/a>.<\/p>\n<div class=\"wp-block-text-wrappers-update-2 article_update\"><time class=\"gtb_text-wrappers_update_time\">11 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2021 | 17:46<\/time><span class=\"gtb_text-wrappers_update_head\">\u0410\u043f\u0434\u0435\u0439\u0442: <\/span><\/p>\n<p>The hacker returned 1,000 BTC, 26,629 ETH and 119,664,866 BUSD.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">According to the data on chain, Poly Network hacker has begun to return the funds stolen from the BSC chain. So far, the hacker has returned 1,000 BTC, 26,629 ETH, and 119,664,866 BUSD. <a href=\"https:\/\/t.co\/D1aPM3vpbA\">pic.twitter.com\/D1aPM3vpbA<\/a><\/p>\n<p>\u2014 Gwei Research (@btcinchina) <a href=\"https:\/\/twitter.com\/btcinchina\/status\/1425466641228308481?ref_src=twsrc%5Etfw\">August 11, 2021<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div>\n<\/figure>\n<\/div>\n<\/div>\n<p>The hacker embedded the statement in an Ethereum transaction sent to himself at around 07:00 MSK. In another <a href=\"https:\/\/etherscan.io\/tx\/0x79245fb1d1ae48a214118e25d6ad2f9324f514ec6708135a19ba9d4cfa6344f6\" target=\"_blank\" rel=\"noopener\">message<\/a> he wrote that he couldn&#8217;t reach Poly Network and asked for a multi-signature wallet address to return the funds.<\/p>\n<p>Representatives of the project created three wallets at the attack organizer&#8217;s request.<\/p>\n<blockquote class=\"wp-block-quote twitter-tweet is-layout-flow wp-block-quote-is-layout-flow\">\n<p dir=\"ltr\" lang=\"en\">Hope you will transfer assets to addresses below:<\/p>\n<p>ETH: 0x71Fb9dB587F6d47Ac8192Cd76110E05B8fd2142f<\/p>\n<p>BSC: 0xEEBb0c4a5017bEd8079B88F35528eF2c722b31fc<\/p>\n<p>Polygon: 0xA4b291Ed1220310d3120f515B5B7AccaecD66F17 <a href=\"https:\/\/t.co\/mKlBQU4a1B\">pic.twitter.com\/mKlBQU4a1B<\/a><\/p>\n<p>\u2014 Poly Network (@PolyNetwork2) <a href=\"https:\/\/twitter.com\/PolyNetwork2\/status\/1425321860539949056?ref_src=twsrc%5Etfw\">August 11, 2021<\/a><\/p>\n<\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The hacker added that he is already <a href=\"https:\/\/etherscan.io\/tx\/0xd239b01026c49b234d075e3d23a07efd1c3234239cfb440c0f90d5e84836fbe2\" target=\"_blank\" rel=\"noopener\">become a \u2018legend\u2019<\/a> after carrying out the largest hack in the history of DeFi and the industry at large.<\/p>\n<p>Poly Network approved the analysis by cybersecurity experts from SlowMist, who named the cause of the hack an exploit in the protocol\u2019s cross\u2011chain functions. Chinese firm BlockSec <a href=\"https:\/\/blocksecteam.medium.com\/the-initial-analysis-of-the-polynetwork-hack-270ac6072e2a\" target=\"_blank\" rel=\"noopener\">suggested<\/a> that the attack occurred as a result of a private key leak.<\/p>\n<p>Blockchain consultant Ma\/ya Zehavi pointed to the underexplored Chinese DeFi sector.<\/p>\n<blockquote class=\"wp-block-quote twitter-tweet is-layout-flow wp-block-quote-is-layout-flow\">\n<p dir=\"ltr\" lang=\"en\">My biggest take away from the Poly hack (other than we need to do more to scrutinize protocol key management) is that there\u2019s an entire Chinese DeFi ecosystem that goes under the radar of most westerners, cuz it\u2019s not on Ethereum or \u201cwestern\u201d L1s.<\/p>\n<p>\u2014 Ma\/ya Zehavi (@mayazi) <a href=\"https:\/\/twitter.com\/mayazi\/status\/1425167460190367749?ref_src=twsrc%5Etfw\">August 10, 2021<\/a><\/p>\n<\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe main takeaway from the Poly hack (aside from the need to scrutinize protocol key management more closely) is that there is an entire Chinese DeFi ecosystem that goes under the radar for most Westerners, because it isn\u2019t on Ethereum or \u2018western\u2019 L1s,\u201d Zehavi wrote.<\/p>\n<\/blockquote>\n<p>As noted, on <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-stole-611-million-from-the-poly-network-cross-chain-protocol\">an attack on the Ethereum, Binance Smart Chain and Polygon blockchains<\/a> hit Poly Network on August 10. The total damage amounted to $611 million across various cryptocurrencies. Some of the stolen funds, for example in USDT, were blocked.<\/p>\n<p>As of writing, three wallets linked to the attacker hold just under $400 million. The remaining assets have been moved, including into the Ellipsis Finance liquidity pool.<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener\">ForkLog Feed<\/a> \u2014 full news feed, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener\">ForkLog<\/a> \u2014 the most important news, infographics and opinions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On August 11, an unknown attacker who had hacked Poly Network the day before said he intended to return the $611 million stolen in the attack.<\/p>\n","protected":false},"author":1,"featured_media":47505,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[133,1154,1093,2231],"class_list":["post-47504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-china","tag-crimes","tag-defi","tag-poly-network"],"aioseo_notices":[],"amp_enabled":true,"views":"26","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/47504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=47504"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/47504\/revisions"}],"predecessor-version":[{"id":47506,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/47504\/revisions\/47506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/47505"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=47504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=47504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=47504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}