Monday, January 27, 2025
HomeCryptocurrency hackPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Published on

SIEM as a Service

Follow Us on Google News

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets for trading. The platform was established in January 2014 by Tristan D’Agosta, with a vision to make cryptocurrency trading easier and more accessible for everyone.

According to recent reports, a theft took place around November 10th, and the perpetrators have announced their intent to return the stolen funds, amounting to $120 million, by November 25th.

Poloniex has recently announced that they have identified the hacker responsible for stealing $120 million worth of various cryptocurrencies. In an effort to recover the stolen funds, the exchange has offered a white hat reward of $10 million to anyone who can assist in returning the currencies.

The biggest stakeholder of Poloniex, Justin Sun, used the Ethereum network to send blockchain messages to addresses compromised in the breach. Sixteen transactions totaling $0.10 in Ethereum were started by Sun’s wallets, all of which had the identical multiple languages message.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

According to the statement, the stolen money has been successfully located, marked for tracking, and rendered useless. The statement also warns that the accounts of any financial counterparties that receive these assets will be frozen.

The hacked cryptocurrencies include Ethereum(ETM), Tron(TRX), and Bitcoin(BTC). Cryptocurrency is a digital or virtual currency secured by cryptography, which makes it nearly impossible to counterfeit or double-spend.

Notably, 80% of the stolen assets were Ethereum, Tron, and Bitcoin; other losses included 3.1 million XRP and 577 billion Shiba Inu (SHIB).

Following the incident, Justin Sun, the founder of TRON, offered a 5% reward for the stolen funds. Unfortunately, the attackers did not respond to this offer. Additionally, there was collaboration with law enforcement agencies, and the reward was increased to $10 million.

Poloniex has implemented robust measures to counter the most significant instances of malicious attacks of the year.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...