Thursday, April 3, 2025
HomeCryptocurrency hackPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Published on

SIEM as a Service

Follow Us on Google News

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets for trading. The platform was established in January 2014 by Tristan D’Agosta, with a vision to make cryptocurrency trading easier and more accessible for everyone.

According to recent reports, a theft took place around November 10th, and the perpetrators have announced their intent to return the stolen funds, amounting to $120 million, by November 25th.

Poloniex has recently announced that they have identified the hacker responsible for stealing $120 million worth of various cryptocurrencies. In an effort to recover the stolen funds, the exchange has offered a white hat reward of $10 million to anyone who can assist in returning the currencies.

The biggest stakeholder of Poloniex, Justin Sun, used the Ethereum network to send blockchain messages to addresses compromised in the breach. Sixteen transactions totaling $0.10 in Ethereum were started by Sun’s wallets, all of which had the identical multiple languages message.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

According to the statement, the stolen money has been successfully located, marked for tracking, and rendered useless. The statement also warns that the accounts of any financial counterparties that receive these assets will be frozen.

The hacked cryptocurrencies include Ethereum(ETM), Tron(TRX), and Bitcoin(BTC). Cryptocurrency is a digital or virtual currency secured by cryptography, which makes it nearly impossible to counterfeit or double-spend.

Notably, 80% of the stolen assets were Ethereum, Tron, and Bitcoin; other losses included 3.1 million XRP and 577 billion Shiba Inu (SHIB).

Following the incident, Justin Sun, the founder of TRON, offered a 5% reward for the stolen funds. Unfortunately, the attackers did not respond to this offer. Additionally, there was collaboration with law enforcement agencies, and the reward was increased to $10 million.

Poloniex has implemented robust measures to counter the most significant instances of malicious attacks of the year.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...