https://en.wikipedia.org/w/index.php?action=history&feed=atom&title=Poly_Network_exploit Poly Network exploit - Revision history 2025-07-03T14:21:28Z Revision history for this page on the wiki MediaWiki 1.45.0-wmf.8 https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1283576426&oldid=prev MrMacmur: /* growthexperiments-addlink-summary-summary:1|1|0 */ 2025-04-02T10:13:18Z <p>Link suggestions feature: 1 link added.</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 10:13, 2 April 2025</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 22:</td> <td colspan="2" class="diff-lineno">Line 22:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Aftermath ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Aftermath ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Poly Network launched the global bug bounty program on Immunefi. The program aims to encourage more security agencies and white hat organizations to participate in the audit of Poly Network's core functions, especially to address potential security risks. Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System — the rewards range up to $100,000 for critical vulnerabilities.&lt;ref&gt;{{cite web |url=https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |title=Poly Network Joins Immunefi With $100,000 Bug Bounty After Hack |access-date=2021-08-17 |archive-date=2021-08-17 |archive-url=https://web.archive.org/web/20210817062822/https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |url-status=live }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Poly Network launched the global <ins style="font-weight: bold; text-decoration: none;">[[</ins>bug bounty program<ins style="font-weight: bold; text-decoration: none;">]]</ins> on Immunefi. The program aims to encourage more security agencies and white hat organizations to participate in the audit of Poly Network's core functions, especially to address potential security risks. Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System — the rewards range up to $100,000 for critical vulnerabilities.&lt;ref&gt;{{cite web |url=https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |title=Poly Network Joins Immunefi With $100,000 Bug Bounty After Hack |access-date=2021-08-17 |archive-date=2021-08-17 |archive-url=https://web.archive.org/web/20210817062822/https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |url-status=live }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> </tr> </table> MrMacmur https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1225029360&oldid=prev Gobonobo: Rescuing 9 sources and tagging 0 as dead.) #IABot (v2.0.9.5 2024-05-21T22:28:35Z <p>Rescuing 9 sources and tagging 0 as dead.) #IABot (v2.0.9.5</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:28, 21 May 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 3:</td> <td colspan="2" class="diff-lineno">Line 3:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Background ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Background ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Poly Network is an interoperability protocol that lets users trade one [[cryptocurrency]] for another, such as trading [[Bitcoin]] for [[Ethereum]].&lt;ref&gt;{{cite web |url=https://poly.network/PolyNetwork-whitepaper.pdf |title=Poly Network Whitepaper |access-date=2020-05-20}}{{non-primary source needed|date=May 2022}}&lt;/ref&gt; Before the attack, Poly Network had transferred $10 billion in digital assets between blockchains, with total value of nearly $1 billion.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Poly Network is an interoperability protocol that lets users trade one [[cryptocurrency]] for another, such as trading [[Bitcoin]] for [[Ethereum]].&lt;ref&gt;{{cite web |url=https://poly.network/PolyNetwork-whitepaper.pdf |title=Poly Network Whitepaper |access-date=2020-05-20<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2020-10-26 |archive-url=https://web.archive.org/web/20201026210614/https://www.poly.network/PolyNetwork-whitepaper.pdf |url-status=live </ins>}}{{non-primary source needed|date=May 2022}}&lt;/ref&gt; Before the attack, Poly Network had transferred $10 billion in digital assets between blockchains, with total value of nearly $1 billion.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en<ins style="font-weight: bold; text-decoration: none;">|archive-date=2021-12-04|archive-url=https://web.archive.org/web/20211204072406/https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|url-status=live</ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2022-07-17 |archive-url=https://web.archive.org/web/20220717193003/https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |url-status=live </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 |<del style="font-weight: bold; text-decoration: none;"> </del>work=BBC |access-date=2021-08-11}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann<ins style="font-weight: bold; text-decoration: none;"> </ins>|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 |work=BBC |access-date=2021-08-11<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2021-08-11 |archive-url=https://web.archive.org/web/20210811231827/https://www.bbc.com/news/business-58180692 |url-status=live </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ |<del style="font-weight: bold; text-decoration: none;"> </del>work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun<ins style="font-weight: bold; text-decoration: none;"> </ins>|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ |work=Reuters |access-date=2021-08-14<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2021-08-13 |archive-url=https://web.archive.org/web/20210813210134/https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ |url-status=live </ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2022-07-17 |archive-url=https://web.archive.org/web/20220717193003/https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |url-status=live </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2022-07-17 |archive-url=https://web.archive.org/web/20220717193014/https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |url-status=live </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Reaction ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Reaction ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Poly Network's decision to refer to the hackers as "white hats" angered some in the security world who worried that it might set a precedent for criminal hackers to whitewash their actions. White hat hacker Katie Paxton-Fear said that "labelling this hack as a white hat is really disappointing".&lt;ref name="BBC"&gt;{{cite news |last=Tidy |first=Joe|date=2021-08-13 |title=Crypto hacker offered reward after $600m heist |url=https://www.bbc.com/news/business-58193396 |<del style="font-weight: bold; text-decoration: none;"> </del>work=BBC |access-date=2021-08-13}}&lt;/ref&gt; Charlie Steele, former Department of Justice and FBI official, thought "Private companies have no authority to promise immunity from criminal prosecution," and "in this event where a hacker stole the $600m 'for fun' and then returned most of it, all while remaining anonymous, is not likely to lessen regulators' concerns about the variety of risks posed by cryptocurrencies."&lt;ref name="BBC"&gt;&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Poly Network's decision to refer to the hackers as "white hats" angered some in the security world who worried that it might set a precedent for criminal hackers to whitewash their actions. White hat hacker Katie Paxton-Fear said that "labelling this hack as a white hat is really disappointing".&lt;ref name="BBC"&gt;{{cite news |last=Tidy |first=Joe<ins style="font-weight: bold; text-decoration: none;"> </ins>|date=2021-08-13 |title=Crypto hacker offered reward after $600m heist |url=https://www.bbc.com/news/business-58193396 |work=BBC |access-date=2021-08-13<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2021-08-12 |archive-url=https://web.archive.org/web/20210812231637/https://www.bbc.com/news/business-58193396 |url-status=live </ins>}}&lt;/ref&gt; Charlie Steele, former Department of Justice and FBI official, thought "Private companies have no authority to promise immunity from criminal prosecution," and "in this event where a hacker stole the $600m 'for fun' and then returned most of it, all while remaining anonymous, is not likely to lessen regulators' concerns about the variety of risks posed by cryptocurrencies."&lt;ref name="BBC"&gt;&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Aftermath ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Aftermath ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Poly Network launched the global bug bounty program on Immunefi. The program aims to encourage more security agencies and white hat organizations to participate in the audit of Poly Network's core functions, especially to address potential security risks. Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System — the rewards range up to $100,000 for critical vulnerabilities.&lt;ref&gt;{{cite web |url=https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |title=Poly Network Joins Immunefi With $100,000 Bug Bounty After Hack |access-date=2021-08-17}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Poly Network launched the global bug bounty program on Immunefi. The program aims to encourage more security agencies and white hat organizations to participate in the audit of Poly Network's core functions, especially to address potential security risks. Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System — the rewards range up to $100,000 for critical vulnerabilities.&lt;ref&gt;{{cite web |url=https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |title=Poly Network Joins Immunefi With $100,000 Bug Bounty After Hack |access-date=2021-08-17<ins style="font-weight: bold; text-decoration: none;"> |archive-date=2021-08-17 |archive-url=https://web.archive.org/web/20210817062822/https://medium.com/immunefi/poly-network-joins-immunefi-with-100-000-bug-bounty-after-hack-d349e1192853 |url-status=live </ins>}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td> </tr> </table> Gobonobo https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1205126613&oldid=prev MtPenguinMonster: #suggestededit-add-desc 1.0 2024-02-08T23:05:01Z <p>#suggestededit-add-desc 1.0</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:05, 8 February 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 1:</td> <td colspan="2" class="diff-lineno">Line 1:</td> </tr> <tr> <td colspan="2" class="diff-empty diff-side-deleted"></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>{{Short description|2021 cybersecurity incident}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{technical|date=June 2022}}The '''Poly Network exploit''' was an attack conducted by anonymous hackers on August 10, 2021. The attack transferred over $610 million in digital [[cryptocurrency]] to the hackers. All assets were returned to Poly Network over the following 15 days. It was one of the largest security incidents in [[Decentralized finance|DeFi]]'s history in terms of [[mark-to-market]] value.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{technical|date=June 2022}}The '''Poly Network exploit''' was an attack conducted by anonymous hackers on August 10, 2021. The attack transferred over $610 million in digital [[cryptocurrency]] to the hackers. All assets were returned to Poly Network over the following 15 days. It was one of the largest security incidents in [[Decentralized finance|DeFi]]'s history in terms of [[mark-to-market]] value.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> </table> MtPenguinMonster https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1196280559&oldid=prev Pppery: Spam 2024-01-17T00:52:06Z <p>Spam</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 00:52, 17 January 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 7:</td> <td colspan="2" class="diff-lineno">Line 7:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}<del style="font-weight: bold; text-decoration: none;">&lt;ref&gt;{{cite news |last1=Peter |first1=Jeff |title=ePrex 360 Avis |url=https://www.oinz.com.ua/fr/immediate-eprex-360/ |access-date=20 November 2022}}&lt;/ref&gt;</del></div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 | work=BBC |access-date=2021-08-11}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 | work=BBC |access-date=2021-08-11}}&lt;/ref&gt;</div></td> </tr> </table> Pppery https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1185597750&oldid=prev 118.211.171.22 at 20:12, 17 November 2023 2023-11-17T20:12:50Z <p></p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:12, 17 November 2023</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 7:</td> <td colspan="2" class="diff-lineno">Line 7:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto's Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}<ins style="font-weight: bold; text-decoration: none;">&lt;ref&gt;{{cite news |last1=Peter |first1=Jeff |title=ePrex 360 Avis |url=https://www.oinz.com.ua/fr/immediate-eprex-360/ |access-date=20 November 2022}}&lt;/ref&gt;</ins></div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 | work=BBC |access-date=2021-08-11}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers announced on August 11, 2021 that they had been planning to return the tokens. They claimed that the purpose of the theft was to reveal vulnerabilities and secure Poly Network. They posted a Q&amp;A to communicate with the public by embedding messages in transactions with their addresses.&lt;ref&gt;{{cite news |last=Russon |first=Mary-Ann|date=2021-08-11 |title=Cryptocurrency heist hacker returns $260m in funds |url=https://www.bbc.com/news/business-58180692 | work=BBC |access-date=2021-08-11}}&lt;/ref&gt;</div></td> </tr> </table> 118.211.171.22 https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1126396354&oldid=prev Citation bot: Alter: title. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_webform 2004/3850 2022-12-09T03:33:33Z <p>Alter: title. | <a href="/wiki/Wikipedia:UCB" class="mw-redirect" title="Wikipedia:UCB">Use this bot</a>. <a href="/wiki/Wikipedia:DBUG" class="mw-redirect" title="Wikipedia:DBUG">Report bugs</a>. | Suggested by Abductive | #UCB_webform 2004/3850</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 03:33, 9 December 2022</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 5:</td> <td colspan="2" class="diff-lineno">Line 5:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of <del style="font-weight: bold; text-decoration: none;">Crypto’s</del> Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The hackers transferred approximately $610 million of the most valuable digital assets to three addresses they controlled on Ethereum, [[Binance|Binance Smart Chain]] and Polygon.&lt;ref&gt;{{Cite web|last=Ponciano|first=Jonathan|title=More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of <ins style="font-weight: bold; text-decoration: none;">Crypto's</ins> Biggest Hacks Ever|url=https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/|access-date=2021-12-04|website=Forbes|language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=KrakenFX |date=2021-09-22 |title=Abusing Smart Contracts to Steal $600 million: How the Poly Network Hack Actually Happened |url=https://blog.kraken.com/post/11078/abusing-smart-contracts-to-steal-600-million-how-the-poly-network-hack-actually-happened/ |access-date=2022-07-17 |website=Kraken Blog |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>After the attack, the Poly team asked exchanges and miners to be aware of the flow of stolen tokens and called for the hacker's transactions to be stopped, [[Tether (cryptocurrency)|Tether]] froze $33 million worth of USDT. In an open letter on [[Twitter]], the Poly team wanted to establish communication with the hackers and urge them to return the stolen tokens. {{Citation needed|date=June 2022}}</div></td> </tr> </table> Citation bot https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1106622593&oldid=prev Pppery: Rv 2022-08-25T15:19:58Z <p>Rv</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 15:19, 25 August 2022</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 13:</td> <td colspan="2" class="diff-lineno">Line 13:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as " |Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "<ins style="font-weight: bold; text-decoration: none;">[[White</ins> <ins style="font-weight: bold; text-decoration: none;">hat (computer security)</ins>|Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> </tr> </table> Pppery https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1106614454&oldid=prev 12.127.223.46: /* Attack */ 2022-08-25T14:17:31Z <p><span class="autocomment">Attack</span></p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:17, 25 August 2022</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 13:</td> <td colspan="2" class="diff-lineno">Line 13:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "<del style="font-weight: bold; text-decoration: none;">[[White</del> <del style="font-weight: bold; text-decoration: none;">hat (computer security)</del>|Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as " |Mr. White Hat]]" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> </tr> </table> 12.127.223.46 https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1106614391&oldid=prev Ingenuity: Reverted edits by 12.127.223.46 (talk) (AV) 2022-08-25T14:16:55Z <p>Reverted edits by <a href="/wiki/Special:Contributions/12.127.223.46" title="Special:Contributions/12.127.223.46">12.127.223.46</a> (<a href="/wiki/User_talk:12.127.223.46" title="User talk:12.127.223.46">talk</a>) (<a href="/wiki/User:Ingenuity/AntiVandal" class="mw-redirect" title="User:Ingenuity/AntiVandal">AV</a>)</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:16, 25 August 2022</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 2:</td> <td colspan="2" class="diff-lineno">Line 2:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Background ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Background ==</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Poly Network is an interoperability protocol that lets users trade one [[cryptocurrency]] for another, such as trading [[Bitcoin]] for [[Ethereum]].&lt;ref&gt;{{cite web |url=https://poly.network/PolyNetwork-whitepaper.pdf |title=Poly Network Whitepaper |access-date=2020-05-20}}{{non-primary source needed|date=May 2022}}&lt;/ref&gt; Before the attack, Poly Network had transferred $10 billion in digital assets between blockchains, with total value of nearly $1 <del style="font-weight: bold; text-decoration: none;">trillion</del></div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Poly Network is an interoperability protocol that lets users trade one [[cryptocurrency]] for another, such as trading [[Bitcoin]] for [[Ethereum]].&lt;ref&gt;{{cite web |url=https://poly.network/PolyNetwork-whitepaper.pdf |title=Poly Network Whitepaper |access-date=2020-05-20}}{{non-primary source needed|date=May 2022}}&lt;/ref&gt; Before the attack, Poly Network had transferred $10 billion in digital assets between blockchains, with total value of nearly $1 <ins style="font-weight: bold; text-decoration: none;">billion.</ins></div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Attack ==</div></td> </tr> <tr> <td colspan="2" class="diff-lineno">Line 13:</td> <td colspan="2" class="diff-lineno">Line 13:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. <del style="font-weight: bold; text-decoration: none;">demetrius</del> <del style="font-weight: bold; text-decoration: none;">demarcas bartholemu james 3rd Jr.</del>" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. <ins style="font-weight: bold; text-decoration: none;">White</ins> <ins style="font-weight: bold; text-decoration: none;">Hat]]</ins>" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> </tr> </table> Ingenuity https://en.wikipedia.org/w/index.php?title=Poly_Network_exploit&diff=1106614360&oldid=prev 12.127.223.46: /* Attack */ 2022-08-25T14:16:40Z <p><span class="autocomment">Attack</span></p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:16, 25 August 2022</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 13:</td> <td colspan="2" class="diff-lineno">Line 13:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The hackers required multi-signature addresses for transfer. Poly Network generated a collection address and started to recover the assets that were returned first on August 11. On August 13, the hackers returned assets worth $340 million and transferred the bulk of the rest to a multi-signature address jointly controlled by them and Poly Network.&lt;ref&gt;{{cite news |last=John |first=Alun|date=2021-08-14 |title=Crypto platform Poly Network rewards hacker with $500,000 'bug bounty' |url=https://www.reuters.com/technology/crypto-platform-poly-network-rewards-hacker-with-500000-bug-bounty-2021-08-13/ | work=Reuters |access-date=2021-08-14}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |date=2021-08-12 |title=Poly Network Attacker Returning Funds After Pulling Off Biggest DeFi Theft Ever |url=https://blog.chainalysis.com/reports/poly-network-hack-august-2021/ |access-date=2022-07-17 |website=Chainalysis |language=en-US}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. <del style="font-weight: bold; text-decoration: none;">White</del> <del style="font-weight: bold; text-decoration: none;">Hat]]</del>" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>After receiving tokens, Poly Network started to address the hackers as "[[White hat (computer security)|Mr. <ins style="font-weight: bold; text-decoration: none;">demetrius</ins> <ins style="font-weight: bold; text-decoration: none;">demarcas bartholemu james 3rd Jr.</ins>" and offered to reward them with a $500,000 bug bounty and the position of "chief security advisor" of Poly Network, as a strategy to ensure safe return of the rest of the affected assets.&lt;ref&gt;{{cite news |author=&lt;!--Staff writer(s)/no by-line.--&gt; | title=White hat' hacker behind $610m crypto heist returns most of money |url=https://www.theguardian.com/technology/2021/aug/13/white-hat-hacker-behind-610m-crypto-heist-returns-most-of-money | work=The Guardian |access-date=2021-08-13}}&lt;/ref&gt; </div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The last of the hacked money was returned to Poly Network on August 25.&lt;ref&gt;{{Cite web |last=Browne |first=Ryan |date=2021-08-23 |title=Hacker behind $600 million crypto heist returns final slice of stolen funds |url=https://www.cnbc.com/2021/08/23/poly-network-hacker-returns-remaining-cryptocurrency.html |access-date=2022-07-17 |website=CNBC |language=en}}&lt;/ref&gt;</div></td> </tr> </table> 12.127.223.46