Thursday, February 22, 2024

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets for trading. The platform was established in January 2014 by Tristan D’Agosta, with a vision to make cryptocurrency trading easier and more accessible for everyone.

According to recent reports, a theft took place around November 10th, and the perpetrators have announced their intent to return the stolen funds, amounting to $120 million, by November 25th.

Poloniex has recently announced that they have identified the hacker responsible for stealing $120 million worth of various cryptocurrencies. In an effort to recover the stolen funds, the exchange has offered a white hat reward of $10 million to anyone who can assist in returning the currencies.

The biggest stakeholder of Poloniex, Justin Sun, used the Ethereum network to send blockchain messages to addresses compromised in the breach. Sixteen transactions totaling $0.10 in Ethereum were started by Sun’s wallets, all of which had the identical multiple languages message.

Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

According to the statement, the stolen money has been successfully located, marked for tracking, and rendered useless. The statement also warns that the accounts of any financial counterparties that receive these assets will be frozen.

The hacked cryptocurrencies include Ethereum(ETM), Tron(TRX), and Bitcoin(BTC). Cryptocurrency is a digital or virtual currency secured by cryptography, which makes it nearly impossible to counterfeit or double-spend.

Notably, 80% of the stolen assets were Ethereum, Tron, and Bitcoin; other losses included 3.1 million XRP and 577 billion Shiba Inu (SHIB).

Following the incident, Justin Sun, the founder of TRON, offered a 5% reward for the stolen funds. Unfortunately, the attackers did not respond to this offer. Additionally, there was collaboration with law enforcement agencies, and the reward was increased to $10 million.

Poloniex has implemented robust measures to counter the most significant instances of malicious attacks of the year.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.


Latest articles

Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens

An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as...

US to Pay $15M for Info About Lockbit Ransomware Operator Data

In a significant move against cybercrime, the U.S. government has announced a bounty of...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

Threat actors abuse Google Drive for several malicious activities due to its widespread use,...

Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000

In a startling incident underscoring the growing menace of cybercrime, a woman's Swiggy account...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles