{"id":42288,"date":"2021-08-12T15:34:13","date_gmt":"2021-08-12T15:34:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32555\/Hacker-Returns-More-Than-260-Million-From-Poly-Attack.html"},"modified":"2021-08-12T15:34:13","modified_gmt":"2021-08-12T15:34:13","slug":"hacker-returns-more-than-260-million-from-poly-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/","title":{"rendered":"Hacker Returns More Than $260 Million From Poly Attack"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/08\/12\/880e080a-7301-4a4b-a4e7-def615879cd5\/thumbnail\/770x578\/866596a6250cdc78f923f3d56fc4c4c7\/cryptocurrency-hackers.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The hacker behind <a href=\"https:\/\/www.zdnet.com\/article\/hackers-take-600m-in-biggest-cryptocurrency-theft\/\">the largest decentralized finance platform hack in history<\/a> returned much of what they stole on Wednesday, sending back approximately $260 million of the more than $600 million in cryptocurrency that was taken.&nbsp;<\/p>\n<p>In <a href=\"https:\/\/twitter.com\/PolyNetwork2\/status\/1425509322126024708\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">a statement<\/a>, Poly Network &#8212; a &#8220;DeFi&#8221; platform that works across blockchains &#8212; said the unknown culprit behind the attack has so far returned $256 million in BSC, $1 million from Polygon and $3.3 million in Ethereum.&nbsp;<\/p>\n<p>Poly Network noted that there is still $269 million in Ethereum as well as $84 million in Polygon that needs to be returned. The company attributed the attack to a vulnerability that was exploited concerning contract calls. The exploit &#8220;was not caused by the single keeper as rumored,&#8221; Poly Network added.&nbsp;<\/p>\n<p><a href=\"https:\/\/twitter.com\/kelvinfichter\/status\/1425217047898869762\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Researchers online<\/a> tied the attack to a Poly Network privileged contract called the &#8220;<a href=\"https:\/\/github.com\/polynetwork\/eth-contracts\/blob\/d16252b2b857eecf8e558bd3e1f3bb14cff30e9b\/contracts\/core\/cross_chain_manager\/logic\/EthCrossChainManager.sol#L127\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">EthCrossChainManager<\/a>.&#8221;<\/p>\n<p>In addition to returning the money, the hacker included a three-part Q&amp;A where they explained some of their reasoning. In a post <a href=\"https:\/\/twitter.com\/tomrobin\/status\/1425487745166753794\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">shared by Elliptic co-founder Tom Robinson<\/a>, the attacker said they found a bug in Poly Network&#8217;s system and contemplated what to do from there, eventually deciding to steal the money available and transfer it to another account.&nbsp;<\/p>\n<p>They tried to paint their actions as altruistic and said they were trying to expose the vulnerability before it was exploited by &#8220;an insider.&#8221; They claim to be completely protected because they used anonymous email addresses and IPs.<\/p>\n<p>&#8220;The Poly Network is a decent system. It&#8217;s one of the most challenging attacks that a hacker can enjoy. I had to be quick to beat any insiders or hackers,&#8221; the attacker said.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>&#8220;I didn&#8217;t want to cause real panic in the crypto world. So I chose to ignore shit coins so people didn&#8217;t have to worry about them going to zero. I took important tokens (except for Shib) and didn&#8217;t sell any of them.&#8221;<\/p>\n<p>They eventually began to sell or swap stablecoins because they were unhappy with how Poly Network responded to the attack.&nbsp;<\/p>\n<p>&#8220;They urged others to blame and hate me before I had a chance to reply!&#8221; the attacker explained, adding that they turned to the stablecoins because they wanted to earn interest on the stolen money while they negotiated with Poly Network.&nbsp;<\/p>\n<p>&#8220;I am not very interested in money! I know it hurts when people are attacked, but shouldn&#8217;t they learn something from those hacks?&#8221; they said.&nbsp;<\/p>\n<p>The culprit noted that they were moving slowly in returning the money because they needed rest, needed more time to negotiate with Poly Network and needed to &#8220;prove&#8221; their dignity while hiding their identity.&nbsp;<\/p>\n<p>The statement goes on to say that the attacker wants to help Poly Network with its security because of its importance to the cryptocurrency industry.&nbsp;<\/p>\n<p>&#8220;The Poly Network is a well-designed system, and it will handle more assets. They have got a lot of new followers on Twitter, right?&#8221; the statement said. &#8220;The pain they have suffered is temporary but memorable.&#8221;<\/p>\n<p>The audacious attack <a href=\"https:\/\/www.zdnet.com\/article\/poly-network-hackers-potentially-stole-610-million-is-bitcoin-still-safe\/\">sent shockwaves<\/a> through the blockchain and cryptocurrency communities as Poly Network sought to respond. The company works across blockchains for Bitcoin, Ethereum, Neo, Ontology, Elrond, Ziliqa, Binance Smart Chain, Switcheo, and Huobi ECO Chain.<\/p>\n<p>Since Poly Network <a href=\"https:\/\/twitter.com\/PolyNetwork2\/status\/1425123153009803267\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">released a statement<\/a> threatening the culprit on Tuesday, the hacker has been slowly returning the money. The company begged the hacker to return the money.<\/p>\n<p>&#8220;The amount of money you hacked is the biggest one in defi history. Law enforcement in any country will regard this as a major economic crime, and you will be pursued,&#8221; the Poly Network team said.&nbsp;<\/p>\n<p>&#8220;It is very unwise for you to do any further transactions. The money stole is from tens of thousands of crypto community members, hence the people. You should talk to us to work out a solution. We call on miners of affected blockchain and crypto exchanges to blacklist tokens coming from the above addresses.&#8221;<\/p>\n<p>The company appealed to miners across affected blockchain and crypto exchanges like Binance, Tether, Uniswap, HuobiGlobal, OKEx, Circle Pay and BitGo to blacklist any tokens coming from these addresses.<\/p>\n<p>Tether CTO Paolo Ardoino said the platform <a href=\"https:\/\/twitter.com\/paoloardoino\/status\/1425090760609832978\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">froze about $33 million<\/a> in connection to the hack.&nbsp;<\/p>\n<p>Hank Schless, senior manager at Lookout, told <em>ZDNet <\/em>that DeFi has &#8220;become a primary target for cybercriminals&#8221;. A&nbsp;<a href=\"https:\/\/www.reuters.com\/technology\/defi-crime-hits-record-high-first-7-months-2021-ciphertrace-2021-08-10\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">recent report from CipherTrace<\/a> found that attacks on DeFi caused an all-time high number of losses for the first half of 2021.&nbsp;<\/p>\n<p>Thanks to cybercriminals, the DeFi community saw a record loss of $474 million between January and July this year.&nbsp;<\/p>\n<p>The attack on Poly Network is bigger than other headlining cryptocurrency attacks like the <a href=\"https:\/\/www.zdnet.com\/article\/coincheck-cryptocurrency-exchange-confirms-monex-takeover\/\">$550 million hack of Coincheck<\/a> in 2018 and the $400 million <a href=\"https:\/\/www.zdnet.com\/article\/russian-bitcoin-exchange-chief-arrested-in-connection-to-mt-gox-hack\/\">Mt. Gox hack in 2014<\/a>.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32555\/Hacker-Returns-More-Than-260-Million-From-Poly-Attack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42289,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8298],"class_list":["post-42288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerbankcybercrimedata-lossfraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-12T15:34:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker Returns More Than $260 Million From Poly Attack\",\"datePublished\":\"2021-08-12T15:34:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg\",\"keywords\":[\"headline,hacker,bank,cybercrime,data loss,fraud,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\",\"name\":\"Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg\",\"datePublished\":\"2021-08-12T15:34:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,bank,cybercrime,data loss,fraud,cryptography\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimedata-lossfraudcryptography\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacker Returns More Than $260 Million From Poly Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-12T15:34:13+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker Returns More Than $260 Million From Poly Attack","datePublished":"2021-08-12T15:34:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/"},"wordCount":801,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg","keywords":["headline,hacker,bank,cybercrime,data loss,fraud,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/","name":"Hacker Returns More Than $260 Million From Poly Attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg","datePublished":"2021-08-12T15:34:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/hacker-returns-more-than-260-million-from-poly-attack.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-returns-more-than-260-million-from-poly-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,bank,cybercrime,data loss,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimedata-lossfraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Hacker Returns More Than $260 Million From Poly Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42288"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42289"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}