HTX to restore services ‘within 24 hours’ after $13.6M hack

“Huobi HTX has now properly handled this attack,” the crypto exchange stated.

1804
17

0:00

HTX to restore services 'within 24 hours' after $13.6M hack

News

Join us on social networks

Crypto exchange HTX, formerly Huobi Global, will resume deposits and withdrawals within 24 hours after suffering a $13.6 million exploit on Nov. 22.

According to its official announcement, the exchange promised to “fully compensate for the losses caused by this attack and 100% guarantee the safety of user funds.” In addition, developers wrote, “the amount of funds lost by Huobi HTX this time accounts for a very small amount of the total funds of the platform,” noting that the “normal operations” of HTX were not affected by the incident. 

The day prior, Huobi suffered a $13.6 million hack to its exchange hot wallets as part of an orchestrated $86.6 million attack against the HTX Eco (HECO) Chain bridge, consisting of HTX, Tron (TRX), and BitTorrent (BTT). All three entities are linked or de-facto controlled by Chinese blockchain entrepreneur Justin Sun. 

Like previous incidents, HTX stated that “protecting user assets and information security is our highest responsibility, and we will take all necessary measures to prevent such incidents from happening again.” Over the past two months, HTX and Justin Sun-linked entities have been hacked four times. The largest was the $100 million Poloniex exploit on Nov. 10 caused by an apparent private key compromise. 

Sun has since stated, “We are investigating the specific reasons for the hacker attack. Once we complete the investigation and identify the cause, we will resume services.” A $10 million white hat bounty for the return of stolen funds in the $100 million Poloniex exploit remains open at the time of publication. 

Related: Huobi’s new name, HTX, raises community eyebrows

  • #Blockchain
  • #Cryptocurrencies
  • #Business
  • #Huobi
  • #Hacks

Add reaction

Leave A Comment

Leave a Reply

Your email address will not be published. Required fields are marked *