Stolen: Over $600 Million In Crypto Currencies

Crypto hackers may have executed the biggest crypto currency theft in history. More than $600m (£433m) has been stolen in what’s likely to be one of the biggest crypto-currency thefts ever. Hackers have apparently breached blockchain-based platform Poly Network and stole more than $600 million in crypto currencies,including Ethereum. making this  the biggest known hack ever in 'decentralised finance'.  

Poly Network is a platform which allows users to exchange crypto tokens and has confirmed that thousands of investors have been affected by this latest crypto theft. 

A blockchain is a ledger of activities upon which various crypto currencies are based. Each digital coin has its own blockchain and they’re different to each other. Poly Network claims to be able to make these various blockchains work with each other.
“We are sorry to announce that #PolyNetwork was attacked,” Poly announced in a tweet yesterday, confirming that millions of dollars have been stolen from crypto investors.

In subsequent message, PolyNetwork disclosed the addresses of the attackers to which the stolen amount was transferred.
"We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses," announced the platform, which was formed by an alliance between the teams behind multiple blockchain platforms, Neo, Ontology and Switcheo

It has asked hackers to return the assets, while adding that a legal action will be taken against those involved. Ethereum is believed to be the most affected crypto currency in the theft. The hackers have taken $273 million in in Ethereum tokens, $253 million in tokens on Binance Smart Chain and $85 million in U.S. Dollar Coin (USDC) tokens on the Polygon network.  About $33 million of the stablecoin Tether that was a part of the theft has been frozen by Tether’s issuer soon after the attack. This means that these tokens cannot be used by the hackers.

One of the biggest advantages of crypto currency is that it uses encryption whenever a transaction needs to be verified. Crypto currency gets its name from the very thing that makes it as secure as possible: cryptography, aka ciphers and codes, according to Kaspersky

“Technology has changed the way people work, communicate, shop and even pay for goods. Companies and consumers don't always prefer cash anymore, and this behavior is giving way to contactless payments like Apple Pay. With the quick wave of a smartphone, consumers can pay for items at digital registers. Now, a new payment system is emerging: crypto currency... Crypto currency is a digital payment system that doesn't rely on banks to verify transactions” says Kaspersky.

The US Securities and Exchange Commission (SEC) has recently charged lender Blockchain Credit Partners and two of its top executives for raising $30m through allegedly fraudulent offerings. Losses from crime in the overall crypto-currency market dropped sharply in 2021 to $681m, compared to $1.9bn for the whole of 2020 and $4.5bn in 2019 

PolyNetwork:    CNBC:    Forbes:   Kaspersky:   Complex:   TechTimes:      BBC:      IndiaToday:    Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure
Cyber Crime In 2025 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

ACA Compliance Group

ACA Compliance Group

ACA Compliance Group (ACA) is a leading global provider of governance, risk, and compliance advisory services and technology solutions.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.