{"id":84301,"date":"2023-09-11T17:52:02","date_gmt":"2023-09-11T14:52:02","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=84301"},"modified":"2025-09-12T16:32:16","modified_gmt":"2025-09-12T13:32:16","slug":"poly-network-hacker-transfers-1500-eth-to-tornado-cash","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/poly-network-hacker-transfers-1500-eth-to-tornado-cash\/","title":{"rendered":"Poly Network hacker transfers 1,500 ETH to Tornado Cash"},"content":{"rendered":"<p>On 11 September, a wallet linked to the Poly Network breach began moving the stolen funds. PeckShield analysts noted the activity.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/PeckShieldAlert?src=hash&#038;ref_src=twsrc%5Etfw\">#PeckShieldAlert<\/a> The <a href=\"https:\/\/twitter.com\/hashtag\/Polynetwork?src=hash&#038;ref_src=twsrc%5Etfw\">#Polynetwork<\/a> exploiter-labeled address has transferred 801 <a href=\"https:\/\/twitter.com\/search?q=%24ETH&#038;src=ctag&#038;ref_src=twsrc%5Etfw\">$ETH<\/a> to a new address 0xdBDA\u2026874d after failing to transfer <a href=\"https:\/\/twitter.com\/search?q=%24ETH&#038;src=ctag&#038;ref_src=twsrc%5Etfw\">$ETH<\/a> to <a href=\"https:\/\/twitter.com\/hashtag\/TornadoCash?src=hash&#038;ref_src=twsrc%5Etfw\">#TornadoCash<\/a> <a href=\"https:\/\/t.co\/pRY0UccZJ5\">pic.twitter.com\/pRY0UccZJ5<\/a><\/p>\n<p>\u2014 PeckShieldAlert (@PeckShieldAlert) <a href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1701090831695073351?ref_src=twsrc%5Etfw\">September 11, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Initially the hacker moved 801 ETH and 698 ETH in two transactions to a new address. From there he <a href=\"https:\/\/etherscan.io\/address\/0xdbda0c0cd018fc5466dbd57823ce81a93805874d\">sent 1,500 ETH<\/a> (~$2.5m) to the Tornado Cash cryptocurrency mixer.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Update: The <a href=\"https:\/\/twitter.com\/hashtag\/Polynetwork?src=hash&#038;ref_src=twsrc%5Etfw\">#Polynetwork<\/a> exploiter 0xdBDA-labeled address has transferred 1,500 <a href=\"https:\/\/twitter.com\/search?q=%24ETH&#038;src=ctag&#038;ref_src=twsrc%5Etfw\">$ETH<\/a> (~$2.5M) to <a href=\"https:\/\/twitter.com\/hashtag\/TornadoCash?src=hash&#038;ref_src=twsrc%5Etfw\">#TornadoCash<\/a> <a href=\"https:\/\/t.co\/113au421yg\">pic.twitter.com\/113au421yg<\/a><\/p>\n<p>\u2014 PeckShieldAlert (@PeckShieldAlert) <a href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1701104978742649008?ref_src=twsrc%5Etfw\">September 11, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Earlier in July, unknown attackers targeted the Poly Network and <a href=\"https:\/\/u1f987.com\/en\/news\/experts-call-the-34-billion-attack-the-new-poly-network-exploit\">issued tokens worth tens of billions of dollars<\/a> across several blockchains.<\/p>\n<p>According to PeckShield, at one point the hackers&#8217; wallet held assets totaling $42.8 billion.<\/p>\n<p>According to experts, the hackers managed to compromise three of the four private keys of the multisignature addresses used to control the smart contract.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 11 September, a wallet linked to the Poly Network breach began moving the stolen funds.<\/p>\n","protected":false},"author":1,"featured_media":84302,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1227,44,2231,1314],"class_list":["post-84301","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cryptocurrency-transactions","tag-cybercrime","tag-poly-network","tag-tornado-cash"],"aioseo_notices":[],"amp_enabled":true,"views":"28","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/84301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=84301"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/84301\/revisions"}],"predecessor-version":[{"id":84303,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/84301\/revisions\/84303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/84302"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=84301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=84301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=84301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}