Stolen: Over $600 Million In Crypto Currencies

Crypto hackers may have executed the biggest crypto currency theft in history. More than $600m (£433m) has been stolen in what’s likely to be one of the biggest crypto-currency thefts ever. Hackers have apparently breached blockchain-based platform Poly Network and stole more than $600 million in crypto currencies,including Ethereum. making this  the biggest known hack ever in 'decentralised finance'.  

Poly Network is a platform which allows users to exchange crypto tokens and has confirmed that thousands of investors have been affected by this latest crypto theft. 

A blockchain is a ledger of activities upon which various crypto currencies are based. Each digital coin has its own blockchain and they’re different to each other. Poly Network claims to be able to make these various blockchains work with each other.
“We are sorry to announce that #PolyNetwork was attacked,” Poly announced in a tweet yesterday, confirming that millions of dollars have been stolen from crypto investors.

In subsequent message, PolyNetwork disclosed the addresses of the attackers to which the stolen amount was transferred.
"We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses," announced the platform, which was formed by an alliance between the teams behind multiple blockchain platforms, Neo, Ontology and Switcheo

It has asked hackers to return the assets, while adding that a legal action will be taken against those involved. Ethereum is believed to be the most affected crypto currency in the theft. The hackers have taken $273 million in in Ethereum tokens, $253 million in tokens on Binance Smart Chain and $85 million in U.S. Dollar Coin (USDC) tokens on the Polygon network.  About $33 million of the stablecoin Tether that was a part of the theft has been frozen by Tether’s issuer soon after the attack. This means that these tokens cannot be used by the hackers.

One of the biggest advantages of crypto currency is that it uses encryption whenever a transaction needs to be verified. Crypto currency gets its name from the very thing that makes it as secure as possible: cryptography, aka ciphers and codes, according to Kaspersky

“Technology has changed the way people work, communicate, shop and even pay for goods. Companies and consumers don't always prefer cash anymore, and this behavior is giving way to contactless payments like Apple Pay. With the quick wave of a smartphone, consumers can pay for items at digital registers. Now, a new payment system is emerging: crypto currency... Crypto currency is a digital payment system that doesn't rely on banks to verify transactions” says Kaspersky.

The US Securities and Exchange Commission (SEC) has recently charged lender Blockchain Credit Partners and two of its top executives for raising $30m through allegedly fraudulent offerings. Losses from crime in the overall crypto-currency market dropped sharply in 2021 to $681m, compared to $1.9bn for the whole of 2020 and $4.5bn in 2019 

PolyNetwork:    CNBC:    Forbes:   Kaspersky:   Complex:   TechTimes:      BBC:      IndiaToday:    Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure
Cyber Crime In 2025 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

GV

GV

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.