{"id":47612,"date":"2021-08-12T21:34:57","date_gmt":"2021-08-12T18:34:57","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=47612"},"modified":"2025-09-01T22:14:01","modified_gmt":"2025-09-01T19:14:01","slug":"poly-network-hacker-returns-all-stolen-funds-except-usdt","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/poly-network-hacker-returns-all-stolen-funds-except-usdt\/","title":{"rendered":"Poly Network hacker returns all stolen funds except USDT"},"content":{"rendered":"<p>The Poly Network hacker has reimbursed the project all stolen funds except <a href=\\\"https:\/\/etherscan.io\/address\/0xc8a65fadf0e0ddaf421f28feab69bf6e2e589963\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">$33 million in USDT<\/a>, which Tether froze after the attack.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"und\"><a href=\"https:\/\/t.co\/aBRUvanLuL\">pic.twitter.com\/aBRUvanLuL<\/a><\/p>\n<p>\u2014 Poly Network (@PolyNetwork2) <a href=\"https:\/\/twitter.com\/PolyNetwork2\/status\/1425870262067548163?ref_src=twsrc%5Etfw\">August 12, 2021<\/a><\/p>\n<\/blockquote>\n<p><script async=\\\"\\\" src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script><\/p>\n<p>Stablecoins cannot be moved without the issuer&#8217;s permission. Tether is already working on this.<\/p>\n<blockquote>\n<p>\u201cWe will accelerate the work to return the funds,\u201d said Tether&#8217;s Chief Technology Officer Paolo Ardoino in The Block&#8217;s commentary.<\/p>\n<\/blockquote>\n<p>According to him, the company would most likely burn the tokens and reissue them to pass to Poly Network, rather than trusting the hacker to move funds after unfreezing.<\/p>\n<p>Earlier the attacker returned <a href=\"https:\/\/forklog.com\/en\/news\/poly-network-hacker-returns-all-assets-stolen-from-polygon-and-binance-smart-chain-networks\">$85 million, stolen from the Polygon network, and $253 million \u2013 from the Binance Smart Chain<\/a>.<\/p>\n<p>On August 10, the Poly Network suffered what would be the industry\u2019s largest attack on blockchains to date, targeting the Ethereum, Binance Smart Chain and Polygon networks. The total damage amounted to $611 million in various cryptocurrencies. Some of the stolen funds in USDT were blocked.<\/p>\n<p>On August 11, the hacker stated his intention to return the funds. The project team created three wallets for this purpose. Experts suggested that one reason for the restitution was that the hacker exposed personal data.<\/p>\n<p>Developer Kelvin Fichter detailed the <a href=\"https:\/\/forklog.com\/en\/news\/expert-explains-mechanism-behind-poly-network-hack-worth-611-million\">attack mechanism on Poly Network<\/a>. The hacker forged data, forcing the network to authorize transactions with large sums from three blockchains, which were then sent to the hacker\u2019s own wallets.<\/p>\n<p>Subsequently the attacker admitted that he hacks for fun, and Poly Network was chosen because cross-chain-hacking is \u201chot\u201d.<\/p>\n<p>Subscribe to ForkLog&#8217;s news on Telegram: ForkLog Feed \u2014 the full news stream, ForkLog \u2014 the most important news, infographics and opinions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Poly Network hacker has reimbursed the project all stolen funds except $33 million in USDT, which Tether froze after the attack.<\/p>\n","protected":false},"author":1,"featured_media":47613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,2231],"class_list":["post-47612","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-poly-network"],"aioseo_notices":[],"amp_enabled":true,"views":"29","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=47612"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47612\/revisions"}],"predecessor-version":[{"id":47614,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47612\/revisions\/47614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/47613"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=47612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=47612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=47612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}