Over seven hours after it was first reported, details about an exploit that nabbed $600 million in digital assets from Polynetwork have been slow to emerge. In the absence of a comprehensive audit, cybersecurity groups have uttered a common refrain to the programmers behind the cross-chain compatibility network: This is on you.
Funds linked to the attack have been traced to three separate addresses—one each on , , and .
As to the chain of events that got the misbegotten funds there, security experts have differing opinions—with some going as far as accusing their colleagues of misleading the public.
According to an initial analysis by China-based security auditor BlockSec, which it cautioned it had not yet verified, the theft could be the result of "either the leakage of the private key that is used to sign the cross-chain message" or "a bug in the signing process of the PolyNetwork that has been abused to sign a crafted message."
Other researchers also insinuated poor security practices may have led to the theft of private keys used by the PolyNetwork team to authorize transactions.
Ethereum developer and security researcher Mudit Gupta wrote that PolyNetwork uses a multisig wallet for transactions. In its configuration, four people have access to the key for signing transactions, and three must sign: "The attacker got hold of at least 3 keepers and then used them to change the keepers to a single keeper." In effect, the hacker locked them out. (Gupta initially thought Poly used a 1/1 multisig.)
Blockchain security team Slowmist says that's not exactly what happened. Instead, it says, the attacker took advantage of a flaw in a smart contract function to change its keeper, rerouting the flow of funds to the attacker's own address. "It is not the case that this event occurred due to the leakage of the keeper's private key," it reported.
PolyNetwork retweeted the blog post, while Gupta strongly disagreed with SlowMist, suggesting either gross impotence or corruption.
Either SlowMist is in bed with Poly Network or they are grossly incompetent.
They casually forgot to mention that any data that the user enters MUST be signed by the keepers. The attackers managed to either steal keepers' pvt keys or fooled them into signing malicious data. https://t.co/2ziQaoCcd1
— Mudit Gupta (@Mudit__Gupta) August 10, 2021
Regardless of whether the attacker obtained private keys or exploited a weak smart contract, one way to do either of those things is by being in charge. But was it an inside job? After all, according to blockchain analytics firm CipherTrace, so-called rug pulls, a type of exit scam, were the most popular form of crypto fraud last year.
It's too soon to tell. SlowMist says it "has grasped the attacker's mailbox, IP, and device fingerprints through on-chain and off-chain tracking, and is tracking possible identity clues related to the Poly Network attacker." But its investigation hasn't yet led to an executive at Poly holding a smoking gun. (Or, if it has, SlowMist is not yet saying.)
1)The cross-chain interoperability protocol @PolyNetwork2 was attacked, and a total of more than 610 million US dollars were transferred to 3 addresses. The impact caused the transfer of large assets of the O3 Swap cross-chain pool.
— SlowMist (@SlowMist_Team) August 10, 2021
In the meantime, it's unclear whether the attacker will be able to use the funds. PolyNetwork has also asked "miners of affected blockchain and crypto exchanges to blacklist tokens" from the exploiter's addresses. In response, Tether said it froze $33 million in USDT connected to the attack, while executives at Binance, OKEx, and Huobi pledged to help limit the damage.
The hacker, however, has taken to issuing taunts from the Ethereum blockchain, by appending messages to blocks. "WHAT IF I MAKE A NEW TOKEN AND LET THE DAO DECIDE WHERE THE TOKENS GO," they wrote in one message.
Perhaps, but maybe someone else should write the smart contracts for that.
Guide & Tools