Pirates pirates left Cryptocurrence’s hospitality Tuesday, flying $ 613 million in digital parts from the Poly platform of the tokens exchange platform, to return $ 260 million. Here’s what we know so far on the heist
What is the poly network?
A less known name in the world of crypto, Poly Network is a decentralized financing platform (DEFI) which facilitates peer transactions by focusing on users to transfer or exchange chips on different blocks of Blocking.
For example, a client can use Poly Network to transfer tokens such as Bitcoin from the Ethereum block chain to the Smart Binance chain, which may be looking to access a specific application. It was not immediately the Poly Network website where the platform is based or running it.
According to the Crypto Specialist Cocindesk, Poly Network website was launched by the founders of Chinese Project Blockchain Project Neo.
How did the pirates stole the chips?
Poly Network works on the intelligent chain Binance, the etheric chain and the polygon.
Tokens are exchanged between the cargo using an intelligent contract that contains instructions on when to release assets to counterparties.
One of the intelligent contracts used by Poly Network uses to transfer chips between Blockchains retains large amounts of cash to allow users to effectively exchange the chips, in accordance with Crypto Intelligence Ciphertrace.
Poly Network has tweeted Tuesday that a preliminary inquiry revealed that computer hackers have exploited a vulnerability in this intelligent contract.
According to an analysis of transactions tweeted by Kelvin Fichter, a programmer Ethereum, the computer hackers seemed to replace the contractual instructions of each of the three blocks of blocks and diverted the funds to three portfolio addresses, digital locations to store tokens.
These were then traced and published by Poly Network.
The attackers flew in more than 12 different cryptocurcircles, including ether and a type of bitcoin, depending on the chain of society with blocking corporal.
A person claiming to perpetrate the Hack has declared a “bug”, without specifying and wanted to “expose the vulnerability” before others can exploit it, according to the digital messages displayed on the network Ethereum published by the chain.
Reuters could not check the authenticity of the messages.
Who is the computer hacker?
The computer hacker or hackers has not been identified yet
Cryptocurrence Security FirmMist Slowmist said on its website that it identified the attacker’s mailbox, the Internet protocol address and the fingerprints of the device, but the company has not appointed anyone yet.
Slowmist stated that the heist was “likely to be a long-standing attack, organized and prepared”. Despite the so-called computer pirate posing as a “white hat”, an ethical hacker that aimed to identify the vulnerability of the poly network and had “always” planned to give the