Monday, April 7, 2025
HomeCryptocurrency hackPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Published on

SIEM as a Service

Follow Us on Google News

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets for trading. The platform was established in January 2014 by Tristan D’Agosta, with a vision to make cryptocurrency trading easier and more accessible for everyone.

According to recent reports, a theft took place around November 10th, and the perpetrators have announced their intent to return the stolen funds, amounting to $120 million, by November 25th.

Poloniex has recently announced that they have identified the hacker responsible for stealing $120 million worth of various cryptocurrencies. In an effort to recover the stolen funds, the exchange has offered a white hat reward of $10 million to anyone who can assist in returning the currencies.

- Advertisement - Google News

The biggest stakeholder of Poloniex, Justin Sun, used the Ethereum network to send blockchain messages to addresses compromised in the breach. Sixteen transactions totaling $0.10 in Ethereum were started by Sun’s wallets, all of which had the identical multiple languages message.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

According to the statement, the stolen money has been successfully located, marked for tracking, and rendered useless. The statement also warns that the accounts of any financial counterparties that receive these assets will be frozen.

The hacked cryptocurrencies include Ethereum(ETM), Tron(TRX), and Bitcoin(BTC). Cryptocurrency is a digital or virtual currency secured by cryptography, which makes it nearly impossible to counterfeit or double-spend.

Notably, 80% of the stolen assets were Ethereum, Tron, and Bitcoin; other losses included 3.1 million XRP and 577 billion Shiba Inu (SHIB).

Following the incident, Justin Sun, the founder of TRON, offered a 5% reward for the stolen funds. Unfortunately, the attackers did not respond to this offer. Additionally, there was collaboration with law enforcement agencies, and the reward was increased to $10 million.

Poloniex has implemented robust measures to counter the most significant instances of malicious attacks of the year.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...