Unchained - Unconfirmed: Why Did the Poly Network Attacker Return Half the Money They Stole? - Ep.263

Episode Date: August 13, 2021

Poly Network, a cross-chain DeFi protocol, recently suffered a $600M hack -- the largest DeFi exploit in crypto history. Mudit Gupta, security researcher and SushiSwap dev, breaks down the attack, exp...laining how it occurred, why the hacker is returning the funds, and what Poly Network should do next. Show highlights: how Poly Network works what specific mechanism the hacker attacked on Poly Network why many people (including myself) had never heard of Poly Network before the hack how “keepers” failed to protect Poly Network why a failed transaction was the key to pulling off the hack what SlowMist claims to have discovered about the hacker what could be motivating the hacker to return the stolen funds how the hacker is communicating with Poly Network why Tether was able to freeze funds while USDC and BSC allowed the hacker to get away with their tokens how Poly Network should handle negotiations with the hacker   Thank you to our sponsors! Sorare: https://sorare.com   Polymarket: https://polymarket.co/unconfirmed Crypto.com: https://crypto.onelink.me/J9Lg/unchainedcardearnfeb2021    Episode Links   Mudit Gupta Twitter: https://twitter.com/Mudit__Gupta Blog: https://mudit.blog/ SushiSwap: https://twitter.com/SushiSwap    Poly Network hack Poly Network response: https://twitter.com/PolyNetwork2/status/1425870262067548163  Mudit’s analysis: https://mudit.blog/poly-network-largest-crypto-hack/  Kelvin Fichter thread: https://twitter.com/kelvinfichter/status/1425217046636371969 Hacker Q&A: https://twitter.com/tomrobin/status/1425487745166753794 Tether blacklist: https://twitter.com/paoloardoino/status/1425090760609832978 ETH tip: https://twitter.com/HsakaTrades/status/1425093301691195407 The Block’s coverage: https://www.theblockcrypto.com/post/114189/poly-hack-attacker-return-funds-id-slowmist  ​​Returning funds: https://www.coindesk.com/poly-network-hacker-starts-to-return-funds Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:04 Hi, everyone. Welcome to Unconfirmed, the show that reveals how the marquee names in crypto are reacting to the week's top headlines and gets the insights given what they see on the horizon. I'm your host, Laura Shin, a journalist with over two decades of experience. I started covering crypto six years ago, and as a senior editor at Forbes was the first mainstream media reporter to cover cryptocurrency full-time. This is the August 13th, 2021 episode of Unconfirmed. The Unchanged newsletter has switched from a weekly news recap to a daily email. Each morning, you'll get four to five, quick headlines, a crypto meme or two, and a few recommended reads. Head to Unchainedpodcast.com and the signup for the newsletter is right on the homepage. Polymarket is the leading information markets platform where you can trade on the most hotly debated topics, whether it's politics, coronavirus, current events, and more, all on the blockchain. For a limited time, sign up with referral code, unconfirmed, to get your first trade reimbursed up to $100.
Starting point is 00:00:59 The crypto.com app pays you up to 8.5% interest on your Bitcoin. Get $25 when you download the crypto.com app with code Laura. The link is in the description. Looking for NFTs that are useful and fun? Try So Rare, the largest NFT-based fantasy game. You can collect, trade, and compete with officially licensed digital cards of soccer players from over 160 clubs on So Rare. That's S-O-R-A-R-E.com.
Starting point is 00:01:29 Today's guest is Moodipta, core developer at Sushi Swap. Welcome, Mootid. Here, everyone. This week saw the largest exploit in Defi history. In fact, it was one of the biggest hacks in all of crypto history, in which an attacker was able to steal more than $600 million worth of coins from the cross-chain protocol Polly Network. Why don't you give us an overview of what happened here?
Starting point is 00:01:57 Yes, sure. So I'll start with the basics. The brief background about Polynetwork is that it is a cross-blockchain application. It allows you to pass messages from one blockchain to another. One of the main product is a bridge between different blockchains. So if you have tokens on Ethereum, you can move them to BSC or numerous other blockchains that Polynetwork supports. The way this bridge works is that you lock tokens on one blockchain, and then you can
Starting point is 00:02:28 unlock them on other blockchain. So it maintains a balance between locked and unlocked. What the hacker eventually managed to do is break this balance and unlock their tokens without locking any tokens in exchange. So they basically broke this balance and withdrew all tokens without having to lock their own tokens. Wow. that that is
Starting point is 00:02:57 quite a simple actually attack to extract a huge amount of tokens. So as you mentioned, Polly Network is a cross-chain network but I did see a lot of crypto people and I myself also had not heard of Polly Network before this moment. So
Starting point is 00:03:15 can you tell us kind of how it is that it was that many of us had not heard of it? Yes, sure. So firstly, this hack was actually relatively complex. There were a lot of steps involved. I'm just oversimplifying here in some sort.
Starting point is 00:03:32 But it was indeed a complex act. And the reason probably none of us have heard about Polynetwork is that their target audience is in China. I'm sure most of the Chinese users would have heard about it and probably used it. But outside China, I don't think anyone really
Starting point is 00:03:52 uses Polynetwork. Yeah, yeah. And actually, when I called it simple, what I meant was it's not like they had to hack keys, right? They ended up just kind of making their key, the one that could give themselves the money. So in that sense, it was, I guess, sort of like almost like a, what you might call it, just kind of going around the normal route or something. Yes, sure. It was indeed a unique attack. It wasn't like your previous. hacks in the D5 space which usually use something like flash loans, price manipulation, and stuff like that. But it was quite different.
Starting point is 00:04:34 Honestly, Polly Network has quite a unique architecture from other protocols. So, yes, the hack was also unique. The attacker managed to kick out the trusted parties from the system and replace them with their own malicious party. They call it keeper in the system. So once this key was replaced of the system, keeper. The attacker was free to do anything they want. Yeah. So just to actually break down the steps a little bit more, you know, you kind of mentioned at the end, but, and I mean, you did give us the
Starting point is 00:05:07 overview, but why don't you just walk a step by step what they did without obviously going into such technical details people won't be able to follow? Yes, sure. So I can start with some background about Polyne Network. Firstly, they have a system, they have a concept of keepers. Keep of our trusted entities that sign messages that are then validated by the blockchain. So as we know, Ethereum can't directly talk to other blockchains like BSC. So we need an intermediary source that can validate messages that happened on Ethereum and tell BAC that it actually happened. And similarly, if something happens on BAC, these guys validate it and tell Ethereum that this actually happened. This is the basic job of keepers.
Starting point is 00:05:58 Now, as long as these keepers are trusted entities and they are not behaving maliciously, they will only verify actions that only actually happened. So if they sign a transaction of Ethereum, then that transaction must have already happened on Ethereum. They won't sign any transaction that hasn't yet happened. So with some background, the way Poly network passes messages around is that they have a manager contract on every blockchain, that once it receives signed data from the keepers, it verifies that the signature is correct. If the signature is correct, it assumes that the transaction actually happened on a different blockchain. it does not, it has no way to verify it apart from those signatures that this transaction
Starting point is 00:06:55 has already happened or not. When the signature is given to it, it assumes that the transaction has happened and it rebroadcasts that transaction on the target chain on which the code is now running. So now the transaction, this is the complete cycle of message passing. Transaction first happens on a source blockchain. the keepers sign it and then pass the data to the destination blockchain and then the destination blockchain rebroadcast this transaction this means that anyone can make the manager contract on the destination blockchain
Starting point is 00:07:33 basically rebroadcast almost any transaction they just do that transaction on a source blockchain the keepers will verify it because the transaction has happened and then the destination blockchain will also execute it manager and the destination blockchain will also execute it because this has happened. The security concern with this approach is that since anyone can make the destination chain, the destination manager contract do anything, we should make sure that this contract has no special permission on anything. It does not hold any tokens.
Starting point is 00:08:09 It is not an admin of any contract or anything like that. Otherwise, what can happen is let's say I do a transaction on source blockchain. which is an admin action. Obviously, I don't have those admin permissions, so it will fail on the source blockchain. But on the destination blockchain, since the transaction is done by the manager contract, not me,
Starting point is 00:08:31 if the manager contract has these admin permissions, this transaction will actually go through rather than failing. And this is a problem. The transaction which was supposed to fail is not going through. And this is what the hacker exploited. They did a transaction on one of the blockchings that failed on that blockchain because they didn't have enough permissions. But it actually went fine on the destination blockchain because there it was executed by the manager rather than the user directly. They used this transaction to replace the keepers in the system.
Starting point is 00:09:06 Now once the keepers were replaced, you could make the destination blockchain do any transaction you want. You don't even need to do that transaction on the source blockchain. The hacker basically created such false transactions, which did not happen on the source blockchain, but they still signed it with the keeper. They control the keeper now, so they can sign whatever they want. They signed these transactions, which basically said that take all money out of the system and give it to the hacker. These wouldn't have happened on the original network because these can only be called by a specific permission contract. and this contract is obviously not going to call these unless you lock your tokens. But since keepers can now sign anything that the hacker wants, they did sign these transactions.
Starting point is 00:10:00 They broadcasted these on the destination chain. The destination chain verified the signature. The signatures were correct. And it let the hacker take all the money, withdraw all the money by unlocking these funds. Yeah, and ultimately it ended up being $273 million of Ethereum coins, coins, $253 million worth of finance smart chain coins, and $855 million worth of USDC. And then Tether, it also stole $33 million in Tether, but Tether the company ended up blacklisting those USDT. So there's a lot of twists that happened after the actual attack. And we'll get to discussing those.
Starting point is 00:10:45 But first a quick word from the sponsors who make this show possible. Do you love sports collectibles or fantasy sports? So Rare is blending this together to create an entirely new gaming experience powered by its community. So Rare cards are officially licensed NFTs from over 160 clubs, including Real Madrid, Paris Saint-Germont, and Liverpool, and built on Ethereum. You truly own your collectibles. They are productive gaming assets that will generate rewards,
Starting point is 00:11:12 if you're a good fantasy player. Join so rare and connect with your favorite teams, live the game with passion, and earn weekly prices. Today's sponsor is Polymarket, the world's leading information markets platform where you can trade on the most pressing global questions, all on the blockchain. Choose from a variety of markets.
Starting point is 00:11:31 Will Cardano support smart contracts by October? Will the U.S. again have more than 200,000 new COVID cases per day before 2022? Will Trump run for president again? With over $130 million, traded on the platform, Polymarket is the go-to place to settle the biggest debates of the day. For a limited time, sign up with referral code, unconfirmed, to get your first trade reimbursed up to $100. Go to the description and click on the link to get started. That's polymarket.combe, slash, unconfirmed.
Starting point is 00:12:03 Back to my conversation with Mudakupta. So the exploit itself was, you know, pretty crazy, just especially the eye-opening amount. but then after that, a number of twists happened. So first let's start with a tweet from SlowMist, which is, I guess, like a security company or an audit company or something. So let me tell us what it is that Slow Mists discovered. Yes, so Slow Mists has been working on finding who the hacker is and what they did it since basically as soon as people knew that this hack,
Starting point is 00:12:43 happened. I assume they are working closely with Poly Network and other entities. So they discovered that one of the wallets is linked to this hacker's account and that wallet has done transactions on an exchange which requires users to go through KYC process. This means that there is a chance that the hacker messed up and actually used a KYC verified wallet, which will allow the agencies to actually know the identity of this hacker and get him in real life.
Starting point is 00:13:19 So this was one of these slip-ups by the hacker. The hacker later claims that this didn't slip-up. Maybe they used fake KYC or a stolen account or something. It's basically like we can't verify these claims. Either thing is possible. It's also possible it's the real identity or they are just making it. up. So this was one of the things slow mist discovered. Then slow mist has also been working on finding the underlying root cause of this hack. I think they did two analysis, a brief one on the
Starting point is 00:13:55 day of hack, just a few hours later, which didn't contain many details, but it did give a brief over you. And then recently they added a more detailed analysis where they went over a bit more details. So yes, Lomist has been working on finding who did this. And then the attacker began returning the majority of the tokens, at least as of by Thursday, noon, Eastern time. So how did that turn of events come about? Yes. So by now, I think about 50% of the tokens have been returned. There are two sides to the story. One, the hacker is claiming that they are a white hat. They always intended to return these tokens.
Starting point is 00:14:42 The only reason they hacked them because they didn't trust that Polly Network team, if they disclose this bug bounty, then the Polly Network team will take proper actions and resolve this issue properly. They were scared that such a big amount might persuade the team themselves to run away with these funds over table.
Starting point is 00:15:03 So it's their claim that they actually saved the project. they actually saved the money of the users and now they are returning it. And since the project now is underlying light, the project will not run away with these funds or anything. But the other side of the story is that it is highly likely that Slow Mists and other teams were narrowing down on the real identity of the hacker. This identity linked to exchange was one of the slippers that the hacker did and some other stuff. So if these teams were getting closer and the hacker was realizing that,
Starting point is 00:15:40 so they might have changed their story. Like I believe their original motive was not put it on these funds, the actions they took after immediately getting these funds, like they sent out a tip to a person who tried helping them and laundered these funds. They were talking about creating a DAO, trolling the Polynetwork team and stuff. All of these kind of actions are usually, not done by white hackers, but people who have malicious intentions.
Starting point is 00:16:09 That being said, it is hard to tell what the exact intentions of the hacker was, hacker were, but I believe that they changed their motives once they realized that they can get into trouble if their identity is released. This is obviously a very large amount of money, and people will do their best to grab hold of this person in real life. Even laundering such a large amount of money is very risky. So if they wanted to actually use these funds, they will have to go through a lot of risky hoops. And now they are trying to get alleged bug bounty reward in exchange for returning these funds.
Starting point is 00:16:46 So they're negotiating the terms with the team right now. But I guess in the curtains, they're saying maybe I return you 95% of the funds. You're letting key 5% and you don't do any, like, you don't take any legal actions or anything against me. you announce this as a reward and give me legal money that I can legally use without any troubles. These negotiations are still going on. I guess they are negotiating the amount and the terms, but this is where the situation is right now. Yeah, the whole thing, just every twist and turn has been pretty crazy. One other aspect of this is that they've been broadcasting a bunch of messages through the blockchain.
Starting point is 00:17:32 Can you talk about kind of how that conversation's been going and how that came about and why they're doing this? Yeah, sure. So I think at the start, it started out as something a bit cocky in some sense. They were teasing people, trawling the team and posting such comments. They also tipped a user who tried helping them learn the money and stuff like that. So I think it started out as a nefarious thing, a chaotic evil loss. some sorts. But over time, it has become a bit more military communication medium. Now they are actually doing Q&Es on the blockchain. I think they have done four till now. People are asking
Starting point is 00:18:14 them questions by sending them messages and they are answering those questions on the blockchain. They also use the blockchain to communicate with the Pali network team. They posted an address and they said encrypt messages with the public key of this account. They know the private key so they can decrypt these messages. So they have established an encrypted medium of communication between them and the poly network team. These messages, we can't decipher. We don't know what they're talking about. And similarly, different agencies that might be listening on will not be able to decipher these messages unless the polynetwork team decides to disclose this. So now I believe it has, these communication medium has become something quite useful.
Starting point is 00:19:03 This is the only medium to talk to this hacker right now. So I think, yeah, it's a very important bit. Yeah, one thing I wanted to add was that tip that they sent to the person who said, you know, don't use your tether because it's blacklisted. The tip they sent was the amount of 1337, which is like this like internet leap speak. And so it's definitely And what lead speak is is the way of using numbers to spell letters and words.
Starting point is 00:19:36 And so yeah, it's just kind of like a deep in internet culture thing. And it sort of shows kind of maybe a little bit of the personality of the attacker. So I mean, this attack just raises all kinds of questions because so obviously Tether, which is a centralized company who is able to blacklist the Tether. But then there were people, you know, I think that maybe also were questioning whether Binance,
Starting point is 00:20:04 because it has launched Binance smart chain or whether USTC could do anything about what happened with those coins. So what do you, you know, think happened there and should have happened there? Yes, sure. So let's talk one by one. Tater actually responded quite quickly. after the hack, they immediately blocked the Palin, so that's great. USDC has similar functionality,
Starting point is 00:20:30 but I guess they were just a bit slower in reacting and the hacker had already deposited these tokens in curve by them. So even if USDA wanted to blacklist them, they wouldn't have been able to do it. So props to Tether for reacting so quickly. But for other folks, I guess maybe some,
Starting point is 00:20:53 somehow they need to improve their alerting monitoring system or something. As far as BAC goes, although BAC is relatively centralized as compared to other blockchains, but it's not centralized in a way that any single identity or entity can block this hacker from doing transactions. There are still like two dozens validator on BAC and all of them will have to collude to block this person. And getting that sort of collusion is not easy in a short time frame. And even if it was possible for CJ to, let's say, anyone to get that sort of arrangement on BAC,
Starting point is 00:21:40 they wouldn't really want to do it because BAC is positioned as a chain that is free, that is censorship resistant. And if you take an action that blocks these hackers, it does not look good from optics point of view from BOC's users. Yeah. So as you mentioned at this point, the attacker is negotiating with the Polly Network team to keep 5% of the tokens as sort of like a bounty. What do you think the Polly Network should do at this point?
Starting point is 00:22:14 Yeah, sure. So I think we can take a page from your traditional ransomware requests and stuff like that. So the, like the suggested approach in these cases is to pay the ransom, whatever the demand is, get your product back, get as much of funds secured as possible. And once that has happened, then you can continue taking all those legal actions and whatever you were originally planning on taking. So even if right now, Polynetwork agrees to a settlement with the user, this settlement, like, If they wanted to pursue a legal action at a later date, this settlement won't matter. What this person did will likely be treated as illegal in most jurisdictions. I'm not a lawyer, but these are my views.
Starting point is 00:23:07 So whatever Pauly Network agrees to right now will not really be considered as a final agreement in the codes and all. So right now, the strategy for Pellin Network should be to secure as many funds as possible. and then decide if they should continue pursuing other means of getting to this user. If the amount remains, like, if the hacker agrees that they'll keep the bounty of like $100K or something and return everything else, then I think it makes sense to not take any further actions. The hacker probably deserved those $100K. But if the hacker is saying that I want to keep $10 million, like I think $10 million might also be fine, but let's say they are saying 100 million.
Starting point is 00:23:52 They have returned 50% of the funds now, so they still have 300 million left. If they are saying they want to keep anywhere between 100 to 300, then I think that is not really justified. For now, the Polynetwork team should give into these demands, but still consider options of taking these traditional legal methods. Yeah, but what is the typical amount for a bounty? The traditionally accepted value for critical boards like these is 10% of the amount hacked.
Starting point is 00:24:26 So at worst, you should be giving this was a 600 million, a billion, 600 million hacks. So you should at most be giving 60 million to the user. But I personally feel that this amount should be taking as the hack, like amount at risk increases. So for maybe, like if the hack amount was $1 million, then maybe 10% 100%. and K is justified. That for such large amounts like 600M, I don't think 10% is justified. Even like a million dollar buck bounty is a life-changing amount, and I think it's a fair amount for this hack.
Starting point is 00:25:06 Yeah. Yeah. I would agree with that, but we'll see what happens. All right, well, this has been such a fascinating discussion. Thank you so much for coming on Unconfirmed. in a ways, it was a nice talking to you. Don't forget. Next up is the weekly news recap. Stick around for this week in crypto after this short break. With over 10 million users, crypto.com is the easiest place to buy and sell over 90 cryptocurrencies.
Starting point is 00:25:33 Grow your crypto with crypto.com earn, which pays up to 8.5% interest on your Bitcoin and 14% interest on your stable coins. When it's time to spend your crypto, nothing beats the crypto.com visa card, which pays you up to 8% back instantly and gives you 100% rebates for your Netflix, Spotify, and Amazon Prime subscriptions. Download the crypto.com app now and get $25 by using the code Laura. The link is in the description. Thanks for tuning in to this week's news recap. First headline. The infrastructure bill saga ends at the beginning. On Tuesday, the Senate passed its infrastructure bill, voting 69 to 30 to invest $1.2 trillion into the country's public. works. To the crypto industry's chagrin, however, the bill moved out of the Senate without changing a certain provision regarding crypto taxation, despite multiple amendments being offered.
Starting point is 00:26:33 As a refresher, the original and final language requires reporting for crypto brokers in order to bring in $28 billion in taxes over the next few years. The provision mandates crypto brokers report customer gains via $10.99 and any transactions over $10,000 to the Internal Revenue Service. While the community does not object to appropriate entities being taxed, the provision received vociferous backlash over its broad definition of a crypto broker. Kristen Smith, executive director of the Blockchain Association, interpreted the bill to encompass, quote, software wallet developers, hardware wallet manufacturers, multi-sic service providers, liquidity providers, Dow token holders, and potentially even minors, as brokers under the current iteration of the bill. Such a requirement would force pseudonymous decentralized protocols to collect and enforce know-your-c-customer-c-information, an impossible task.
Starting point is 00:27:27 Senators proposed multiple amendments, though none gained the support necessary. Notably, on Monday morning, a last-ditch compromise between Senators Cynthia Lemmiss, Pat Toomey, Mark Warner, Rob Portman, and Kirsten Sinema to amend the contentious language felt just short of approval, courtesy of a single objection from Senator Richard Shelby. The infrastructure package is now on its way to the House of Representatives with the crypto provisions original language intact. However, the crypto industry nor the House will be taken by surprise this time around. Coin Center's Jerry Brito is ready to make a brand new amendment tweeting. The bad news is that the amendment did not receive consent so it will not make the bill.
Starting point is 00:28:09 The good news is we're not giving up. Next stop is the House where we can try to get a whole new amendment from scratch that can address all our concerns. Four members of the House's Blockchain Caucus are also prepared for another round of crypto policy debates, with representatives Tom Emmer, Darren Soto, Bill Foster, and David Twikert, pending a letter to their colleagues, noting, quote, we must prioritize amending this language to clearly exempt non-custodial blockchain intermediaries and ensure that civil liberties are protected. On Thursday, Representative Anna Eschew also joined the fray, penning a letter to House Speaker Nancy Pelosi. encouraging an amendment to the problematic broker definition.
Starting point is 00:28:46 Next headline. On Coinbase, ETH flipped BTC. Coinbase announced its second quarter results on Tuesday. Here are three things you need to know. At $1.6 billion, Q2 profit nearly doubled that of Q1. Total revenue also outperformed expectations coming in at $2.03 billion, compared to the $1.88 billion predicted by the analyst consensus compiled by Bloomberg. Second, Coinbase users were very active this quarter with monthly transacting users growing 44%
Starting point is 00:29:17 from Q1 to Q2. Its total user base also jumped climbing to 68 million verified customers. Point three, Coinbase also saw Ethereum flip Bitcoin this quarter, at least in terms of trading volume. In Q2, Ethereum made up 26% of the exchanges volume while Bitcoin only held a 24% share. Additionally, in an earnings call, CEO Brian Armstrong said that 10% of the top 100 hedge funds by assets under management are Coinbase clients. The exchange also mentioned SpaceX, Tesla, and PNC Bank specifically as institutional clients, marking the first public acknowledgement of a Tesla coin base relationship. Next headline. Brian Brooks resigns as CEO of Binance U.S. Last Friday, Brian Brooks dropped a bombshell via Twitter, announcing his
Starting point is 00:30:06 resignation as CEO of Binance U.S. after just a few months on the job. He wrote, quote, Greetings Crypto Community, letting you all know that I have resigned as CEO of Binance U.S. Despite differences over strategic direction, I wish my former colleagues much success. Exciting new things to come.
Starting point is 00:30:23 Before his short tenure with Binance U.S., Brooks was the acting head of the Office of the Controller of the Currency, the regulator for national banks under President Trump. He also worked as Coinbase's top lawyer in 2018. It initially appeared that Brooks's impressive regulatory resume was a perfect match for Binance, which has faced intense scrutiny from jurisdictions like the UK and Japan in 2021. His hiring was even considered a steal that ruffled feathers over at Circle, where Brooks had been on the cusp of accepting a position as president
Starting point is 00:30:53 before abruptly moving over to Binance U.S., as described by DeCripps Jeff Roberts in a July report. In response to Brooks' departure, Binance CEO Chang Peng Zhao wished him the best in the future and thanked him for his invaluable work, a divergent from the exchanges handling of Brooks's predecessor, Catherine Coley, who was not even mentioned after being ousted to make room for Brooks.
Starting point is 00:31:17 Next headline. Tether reveals reserve details. On Monday, Tether released a new attestation, revealing the details of its $62.8 billion in reserves for the world to parse. This is Tether's second reserves report since launching in 2014,
Starting point is 00:31:33 prompted by a settlement with a New York attorney General's office earlier this year. CNBC's Kate Rooney tweeted out a simple description, writing, Tether Out with New Audit on what's backing the stable coin. Mostly commercial paper includes other crypto money. $31 billion worth of commercial paper. $6 billion worth of cash. $1 billion worth of reverse repo or reverse repurchases.
Starting point is 00:31:57 $15 billion in T bills or treasury bills. $2.5 billion in secured loans. $4.8 billion in corporate bonds, funds, funds, and precious metals, and $2 billion in other investments, including digital tokens. In the new attestation dated June 30th, Tether released both the composition of its reserves, along with the ratings and maturity of its commercial paper and commercial deposits. Interestingly, $30.8 billion, or 48% of Tether's reserves, were held in commercial paper and certificates of deposit, of which 93% were rated A2 and above. Only 1.3% was rated, A3 or below. Audit firm Moor Cayman was responsible for assuring the attestation.
Starting point is 00:32:39 Quote, our most recent assurance opinion from Moore Cayman again confirms Tether is fully backed, said Tether CEO Palo Arduino. A healthy and conservative portfolio with an emphasis on liquidity continues to fuel our growth and confidence in our innovative offerings. In related staple coin news, USDC issuer circle has ambitions to become a U.S. national bank, according to an S-4 filing on Monday. The company, which plans to go public via SPAC, told the block that it, quote, intends to become a full reserve national commercial bank, operating under the supervision and risk management requirements of the Federal Reserve, U.S. Treasury, and OCC, and the FDIC. In its filing, Circle cited risk reduction regarding its current reliance on third-party payment services as a motive for transitioning to a banking structure.
Starting point is 00:33:28 next headline bitmex settles with the cfTC and fincet crypto derivatives platform bitmex is settling with the united states commodities future trading commission or cfTC and financial crimes enforcement network or fincen the company has agreed to pay $100 million to resolve charges with $50 million going to each of the regulators for violating the Bank Secrecy Act commodities regulations and CFTC rules according to a consent order filed Tuesday, the CFTC found that BitMex had offered U.S. customers leveraged and unlicensed crypto products between 2014 and 2020. Furthermore, the platforms know-your-customer and anti-money laundering safeguards were described as inadequate. FinCEN's deputy director, Anna Lou Tirol, said, quote,
Starting point is 00:34:16 BitMex's rapid growth into one of the largest futures commission merchants offering convertible virtual currency derivatives without a commensurate anti-money laundering program, put the U.S. financial system at meaningful risk. It is critical that platforms build in financial integrity from the start so that financial innovation and opportunity are protected from vulnerabilities and exploitation. For now, the $100 million will only settle civil charges against Bitmex. The CFTC's criminal case against BitMex founders Arthur Hayes, Benjamin Delo, and Samuel Reed will continue. In a blog post, Alexander Hopner, Chief Executive Officer of BitMex expressed relief, saying, quote, today marks an important day in our company's history and we are very glad to
Starting point is 00:34:58 put this behind us. As crypto matures and enters a new era, we too have evolved into the largest crypto derivatives platform with a fully verified user base. Comprehensive user verification, robust compliance, and anti-money laundering capabilities are not only hallmarks of our business, they are drivers of our long-term success. Next headline. SEC versus Ripple, recap. The Securities and Exchange Commission or SEC is requesting Slack messages from Ripple concerning its ongoing legal battle with the company. According to documents reviewed by DeCript, the SEC contends that Ripple's original supply of slack messages sent over July 1st was incomplete, leading to a negative impact on the trial with the SEC deposing over 11 Ripple witnesses based on incomplete message
Starting point is 00:35:43 data. The SEC believes that over 1 million messages are missing, which the regulator says will help in its case against Ripple. Relatedly, Jeff Roberts, executive editor at DeCrypt, published an article delving into SEC versus Ripple, describing how both sides have a lot to lose in the case, with Ripple's XRP status as a security hanging in the air and the SEC's crypto agenda needing a big win. It goes into how the SEC likely waited as long as it did to bring the lawsuit because it was setting precedent with its kick and telegram cases. And because clear regulation for crypto is unlike.
Starting point is 00:36:19 likely to come anytime soon from Congress, Robert says that regulatory clarity for the industry is likely to come in the form of a decision in SEC versus ripple, and that could come as soon as this fall. Speaking of the SEC, its chairman Gary Gensler wrote a letter to Senator Elizabeth Warren advocating for, quote, additional plenary authority to expand consumer protection via new roles and guardrails for the crypto industry. Gensler believes that crypto investors, quote, are not adequately protected. Time for fun bits. Ethereum pet rock
Starting point is 00:36:55 NFTs. Call it a fad, call it a bubble. NFTs are still here and the headlines are not getting any less head scratching. One caught my attention this week as especially shall I say, interesting. Ether rock, an early NFT project consisting of
Starting point is 00:37:13 100 NFT images of identical rocks of various shades saw two rocks from the collection sell for over $100,000 worth of ether this week. The website, of course, specifically explains that the pet rock-inspired project, quote, serve, and this is in all capital letters, no purpose, outside of being, well, colored rocks. What a time to be alive. All right, thanks for tuning in.
Starting point is 00:37:42 To learn more about Mootid and the Poly Network exploit, be sure to check the links in the show notes. Unconfirmed is produced by me, Laura. with help from Anthony Youne, Mark Murdoch, and Daniel Ness. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.