{"id":47552,"date":"2021-08-11T20:28:59","date_gmt":"2021-08-11T17:28:59","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=47552"},"modified":"2025-09-01T21:55:58","modified_gmt":"2025-09-01T18:55:58","slug":"for-fun-hacker-explains-the-reasons-behind-the-poly-network-attack","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/for-fun-hacker-explains-the-reasons-behind-the-poly-network-attack\/","title":{"rendered":"&#8220;For fun&#8221;: hacker explains the reasons behind the Poly Network attack"},"content":{"rendered":"<p>An unknown attacker embedded in <a href=\"https:\/\/etherscan.io\/tx\/0x1fb7d1054df46c9734be76ccc14fa871b6729e33b98f9a3429670d27ec692bc0\">Ethereum-\u0442\u0440\u0430\u043d\u0437\u0430\u043a\u0446\u0438\u044e<\/a> text containing answers to questions about the motives for his attack on the Poly Network cross-chain protocol.<\/p>\n<p><!--more--><\/p>\n<p>To read the text, open the transaction details on Etherscan, click <em>Click to see More <\/em>, and ensure that in the <em>Input Data \u2014 View Input As<\/em> field the UTF-8 encoding is selected.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"213\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Etherscan-6-1024x213.png\" alt=\"\u00ab\u0417\u0430\u0431\u0430\u0432\u044b \u0440\u0430\u0434\u0438\u00bb: \u0445\u0430\u043a\u0435\u0440 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b \u043e \u043f\u0440\u0438\u0447\u0438\u043d\u0430\u0445 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 Poly Network\" class=\"wp-image-145560\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Etherscan-6-1024x213.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Etherscan-6-300x62.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Etherscan-6-768x160.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Etherscan-6.png 1400w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>\u0414\u0430\u043d\u043d\u044b\u0435: Etherscan.<\/figcaption><\/figure>\n<p>According to the attacker, he hacks for amusement. He chose Poly Network because hacking cross-chain protocols is &#8220;hot&#8221;.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Now everyone can sense the scent of a hidden intent. An insider? Not me, but who knows? I take responsibility to disclose the vulnerability before anyone else exploits it!&#8221;<\/p>\n<\/blockquote>\n<p>The hacker called the Poly Network platform a &#8220;worthy system&#8221;.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;This is one of the most complex attacks a hacker could relish. And I had to be fast to beat any insider or hacker&#8221;.<\/p>\n<\/blockquote>\n<p>He wrote that he moved the tokens to &#8220;keep them safe&#8221;. According to the hacker, he &#8220;felt mixed emotions&#8221; when he discovered the bug.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Ask yourself what you would do if faced with such a sum&#8221;.<\/p>\n<\/blockquote>\n<p>In the first part of the hacker&#8217;s message, he noted that he &#8220;never&#8221; disclosed any information about himself.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;I prefer to stay in the shadows, saving the world&#8221;.<\/p>\n<\/blockquote>\n<p>In a note attached to another transaction, the hacker stressed that he is not particularly interested in money, but returns assets slowly, as he needs time to negotiate with the Poly Network team.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;I would like to give them advice on how to secure networks so they can manage a multi-billion-dollar project in the future. Poly Network is a well-crafted system; it can handle a large volume of assets&#8221;.<\/p>\n<\/blockquote>\n<p>As a reminder, on 10 August the Poly Network cross-chain protocol was attacked. The total damage <a href=\"https:\/\/forklog.com\/en\/news\/hackers-stole-611-million-from-the-poly-network-cross-chain-protocol\">amounted to $611 million<\/a> in various cryptocurrencies. Some of the stolen funds, for example in USDT, were blocked.<\/p>\n<p>On 11 August, the unknown attacker <a href=\"https:\/\/forklog.com\/en\/news\/hacker-who-stole-611-million-from-poly-network-begins-returning-funds\">began returning<\/a> funds related to the attack.<\/p>\n<p>ForkLog experts <a href=\"https:\/\/forklog.com\/en\/news\/doxxed-experts-outline-the-hackers-motives-for-returning-611m-to-poly-network\">offered various opinions<\/a> regarding possible reasons for the Poly Network attack.<\/p>\n<p>Follow ForkLog news on <a href=\"https:\/\/twitter.com\/ForkLog\" target=\"_blank\" rel=\"nofollow noopener\">Twitter<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An unknown attacker embedded in an Ethereum transaction a text containing answers to questions about the motives for his attack on the Poly Network cross-chain protocol.<\/p>\n","protected":false},"author":1,"featured_media":47553,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,2231],"class_list":["post-47552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-poly-network"],"aioseo_notices":[],"amp_enabled":true,"views":"25","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=47552"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47552\/revisions"}],"predecessor-version":[{"id":47554,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47552\/revisions\/47554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/47553"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=47552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=47552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=47552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}