Stolen: Over $600 Million In Crypto Currencies

Crypto hackers may have executed the biggest crypto currency theft in history. More than $600m (£433m) has been stolen in what’s likely to be one of the biggest crypto-currency thefts ever. Hackers have apparently breached blockchain-based platform Poly Network and stole more than $600 million in crypto currencies,including Ethereum. making this  the biggest known hack ever in 'decentralised finance'.  

Poly Network is a platform which allows users to exchange crypto tokens and has confirmed that thousands of investors have been affected by this latest crypto theft. 

A blockchain is a ledger of activities upon which various crypto currencies are based. Each digital coin has its own blockchain and they’re different to each other. Poly Network claims to be able to make these various blockchains work with each other.
“We are sorry to announce that #PolyNetwork was attacked,” Poly announced in a tweet yesterday, confirming that millions of dollars have been stolen from crypto investors.

In subsequent message, PolyNetwork disclosed the addresses of the attackers to which the stolen amount was transferred.
"We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses," announced the platform, which was formed by an alliance between the teams behind multiple blockchain platforms, Neo, Ontology and Switcheo

It has asked hackers to return the assets, while adding that a legal action will be taken against those involved. Ethereum is believed to be the most affected crypto currency in the theft. The hackers have taken $273 million in in Ethereum tokens, $253 million in tokens on Binance Smart Chain and $85 million in U.S. Dollar Coin (USDC) tokens on the Polygon network.  About $33 million of the stablecoin Tether that was a part of the theft has been frozen by Tether’s issuer soon after the attack. This means that these tokens cannot be used by the hackers.

One of the biggest advantages of crypto currency is that it uses encryption whenever a transaction needs to be verified. Crypto currency gets its name from the very thing that makes it as secure as possible: cryptography, aka ciphers and codes, according to Kaspersky

“Technology has changed the way people work, communicate, shop and even pay for goods. Companies and consumers don't always prefer cash anymore, and this behavior is giving way to contactless payments like Apple Pay. With the quick wave of a smartphone, consumers can pay for items at digital registers. Now, a new payment system is emerging: crypto currency... Crypto currency is a digital payment system that doesn't rely on banks to verify transactions” says Kaspersky.

The US Securities and Exchange Commission (SEC) has recently charged lender Blockchain Credit Partners and two of its top executives for raising $30m through allegedly fraudulent offerings. Losses from crime in the overall crypto-currency market dropped sharply in 2021 to $681m, compared to $1.9bn for the whole of 2020 and $4.5bn in 2019 

PolyNetwork:    CNBC:    Forbes:   Kaspersky:   Complex:   TechTimes:      BBC:      IndiaToday:    Image: Unsplash

You Might Also Read: 

Standing On The Cryptocurrency Frontier:

 

« New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure
Cyber Crime In 2025 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.