Stolen: Over $600 Million In Crypto Currencies

Crypto hackers may have executed the biggest crypto currency theft in history. More than $600m (£433m) has been stolen in what’s likely to be one of the biggest crypto-currency thefts ever. Hackers have apparently breached blockchain-based platform Poly Network and stole more than $600 million in crypto currencies,including Ethereum. making this  the biggest known hack ever in 'decentralised finance'.  

Poly Network is a platform which allows users to exchange crypto tokens and has confirmed that thousands of investors have been affected by this latest crypto theft. 

A blockchain is a ledger of activities upon which various crypto currencies are based. Each digital coin has its own blockchain and they’re different to each other. Poly Network claims to be able to make these various blockchains work with each other.
“We are sorry to announce that #PolyNetwork was attacked,” Poly announced in a tweet yesterday, confirming that millions of dollars have been stolen from crypto investors.

In subsequent message, PolyNetwork disclosed the addresses of the attackers to which the stolen amount was transferred.
"We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses," announced the platform, which was formed by an alliance between the teams behind multiple blockchain platforms, Neo, Ontology and Switcheo

It has asked hackers to return the assets, while adding that a legal action will be taken against those involved. Ethereum is believed to be the most affected crypto currency in the theft. The hackers have taken $273 million in in Ethereum tokens, $253 million in tokens on Binance Smart Chain and $85 million in U.S. Dollar Coin (USDC) tokens on the Polygon network.  About $33 million of the stablecoin Tether that was a part of the theft has been frozen by Tether’s issuer soon after the attack. This means that these tokens cannot be used by the hackers.

One of the biggest advantages of crypto currency is that it uses encryption whenever a transaction needs to be verified. Crypto currency gets its name from the very thing that makes it as secure as possible: cryptography, aka ciphers and codes, according to Kaspersky

“Technology has changed the way people work, communicate, shop and even pay for goods. Companies and consumers don't always prefer cash anymore, and this behavior is giving way to contactless payments like Apple Pay. With the quick wave of a smartphone, consumers can pay for items at digital registers. Now, a new payment system is emerging: crypto currency... Crypto currency is a digital payment system that doesn't rely on banks to verify transactions” says Kaspersky.

The US Securities and Exchange Commission (SEC) has recently charged lender Blockchain Credit Partners and two of its top executives for raising $30m through allegedly fraudulent offerings. Losses from crime in the overall crypto-currency market dropped sharply in 2021 to $681m, compared to $1.9bn for the whole of 2020 and $4.5bn in 2019 

PolyNetwork:    CNBC:    Forbes:   Kaspersky:   Complex:   TechTimes:      BBC:      IndiaToday:    Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure
Cyber Crime In 2025 »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Akin Gump

Akin Gump

Akin Gump practice areas include Cybersecurity, Privacy and Data Protection.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Wehowsky.com

Wehowsky.com

We specialize in developing innovative solutions to detect cyber threats in near real time by looking for suspicious anomalies in computer networks.

CyberWrite

CyberWrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.