{"id":47642,"date":"2021-08-13T13:05:01","date_gmt":"2021-08-13T10:05:01","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=47642"},"modified":"2025-09-01T22:22:59","modified_gmt":"2025-09-01T19:22:59","slug":"poly-network-hacker-rejects-500000-bounty-for-return-of-funds","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/poly-network-hacker-rejects-500000-bounty-for-return-of-funds\/","title":{"rendered":"Poly Network hacker rejects $500,000 bounty for return of funds"},"content":{"rendered":"<p>The developers of the Chinese cross-chain protocol Poly Network offered the hacker who stole $611 million a $500,000 bounty for returning the funds. The hacker declined the bounty. Tom Robinson, founder of analytics firm Elliptic, said this.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">The Poly Network hacker is now saying that they were offered a $500k bounty to return the stolen assets \u2014 but that they will not be claiming it <a href=\"https:\/\/t.co\/Dqp2ZhSO47\">pic.twitter.com\/Dqp2ZhSO47<\/a><\/p>\n<p>\u2014 Tom Robinson (@tomrobin) <a href=\"https:\/\/twitter.com\/tomrobin\/status\/1425849937137393666?ref_src=twsrc%5Etfw\">August 12, 2021<\/a><\/p>\n<\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In a statement, Poly Network representatives thanked the hacker for &#8216;help in improving the security of the project&#8217; and expressed hope that he would contribute to the further development of blockchain.<\/p>\n<p>The hacker did not take the bounty, but called for donations from the public for doing the right thing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-145722\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2021-08-13_123343_www.elliptic.co_.png\" alt=\"\u0425\u0430\u043a\u0435\u0440 Poly Network \u043e\u0442\u043a\u0430\u0437\u0430\u043b\u0441\u044f \u043e\u0442 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0432 $500 000 \u0437\u0430 \u0432\u043e\u0437\u0432\u0440\u0430\u0442 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\" width=\"1194\" height=\"180\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2021-08-13_123343_www.elliptic.co_.png 1194w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2021-08-13_123343_www.elliptic.co_-300x45.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2021-08-13_123343_www.elliptic.co_-1024x154.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Opera-Snimok_2021-08-13_123343_www.elliptic.co_-768x116.png 768w\" sizes=\"auto, (max-width: 1194px) 100vw, 1194px\" \/><\/p>\n<p>As of writing, $4,780 in various tokens had been sent to the hacker&#8217;s wallet.<\/p>\n<p>Earlier in August, the Poly Network protocol suffered the largest attack in history <a href=\"https:\/\/forklog.com\/en\/news\/hackers-stole-611-million-from-the-poly-network-cross-chain-protocol\">attack on the blockchains Ethereum, Binance Smart Chain and Polygon<\/a>. The total loss amounted to $611 million in various cryptocurrencies. Some of the stolen funds in USDT were blocked.<\/p>\n<p>On August 11 the hacker stated the <a href=\"https:\/\/forklog.com\/en\/news\/hacker-who-stole-611-million-from-poly-network-begins-returning-funds\">intention to return the funds<\/a>. He told the project team <a href=\"https:\/\/forklog.com\/en\/news\/poly-network-hacker-returns-all-stolen-funds-except-usdt\">all stolen assets<\/a> except for $33 million in USDT, which Tether froze after the attack.<\/p>\n<p>Experts suggested that one reason for returning the funds was that the hacker <a href=\"https:\/\/forklog.com\/en\/news\/doxxed-experts-outline-the-hackers-motives-for-returning-611m-to-poly-network\">exposed personal data<\/a>. However, he explained his actions by saying that <a href=\"https:\/\/forklog.com\/en\/news\/for-fun-hacker-explains-the-reasons-behind-the-poly-network-attack\">he hacks &#8216;for fun&#8217;<\/a> and wanted to protect the project from an insider exploiting the same flaw to steal funds.<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener\">ForkLog<\/a> \u2014 the most important news, infographics and opinions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The developers of Poly Network offered the hacker who stole $611 million a $500,000 bounty for returning the funds. The hacker declined the bounty.<\/p>\n","protected":false},"author":1,"featured_media":47643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Poly Network hacker rejects $500,000 bounty for return of funds","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1438,1154,2231],"class_list":["post-47642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-award","tag-crimes","tag-poly-network"],"aioseo_notices":[],"amp_enabled":true,"views":"30","promo_type":"1","layout_type":"1","short_excerpt":"Poly Network hacker rejects $500,000 bounty for return of funds","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=47642"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47642\/revisions"}],"predecessor-version":[{"id":47644,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47642\/revisions\/47644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/47643"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=47642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=47642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=47642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}