Stolen: Over $600 Million In Crypto Currencies

Crypto hackers may have executed the biggest crypto currency theft in history. More than $600m (£433m) has been stolen in what’s likely to be one of the biggest crypto-currency thefts ever. Hackers have apparently breached blockchain-based platform Poly Network and stole more than $600 million in crypto currencies,including Ethereum. making this  the biggest known hack ever in 'decentralised finance'.  

Poly Network is a platform which allows users to exchange crypto tokens and has confirmed that thousands of investors have been affected by this latest crypto theft. 

A blockchain is a ledger of activities upon which various crypto currencies are based. Each digital coin has its own blockchain and they’re different to each other. Poly Network claims to be able to make these various blockchains work with each other.
“We are sorry to announce that #PolyNetwork was attacked,” Poly announced in a tweet yesterday, confirming that millions of dollars have been stolen from crypto investors.

In subsequent message, PolyNetwork disclosed the addresses of the attackers to which the stolen amount was transferred.
"We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses," announced the platform, which was formed by an alliance between the teams behind multiple blockchain platforms, Neo, Ontology and Switcheo

It has asked hackers to return the assets, while adding that a legal action will be taken against those involved. Ethereum is believed to be the most affected crypto currency in the theft. The hackers have taken $273 million in in Ethereum tokens, $253 million in tokens on Binance Smart Chain and $85 million in U.S. Dollar Coin (USDC) tokens on the Polygon network.  About $33 million of the stablecoin Tether that was a part of the theft has been frozen by Tether’s issuer soon after the attack. This means that these tokens cannot be used by the hackers.

One of the biggest advantages of crypto currency is that it uses encryption whenever a transaction needs to be verified. Crypto currency gets its name from the very thing that makes it as secure as possible: cryptography, aka ciphers and codes, according to Kaspersky

“Technology has changed the way people work, communicate, shop and even pay for goods. Companies and consumers don't always prefer cash anymore, and this behavior is giving way to contactless payments like Apple Pay. With the quick wave of a smartphone, consumers can pay for items at digital registers. Now, a new payment system is emerging: crypto currency... Crypto currency is a digital payment system that doesn't rely on banks to verify transactions” says Kaspersky.

The US Securities and Exchange Commission (SEC) has recently charged lender Blockchain Credit Partners and two of its top executives for raising $30m through allegedly fraudulent offerings. Losses from crime in the overall crypto-currency market dropped sharply in 2021 to $681m, compared to $1.9bn for the whole of 2020 and $4.5bn in 2019 

PolyNetwork:    CNBC:    Forbes:   Kaspersky:   Complex:   TechTimes:      BBC:      IndiaToday:    Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure
Cyber Crime In 2025 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Hexatrust

Hexatrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.