Polymarket investigates suspicious transactions, confirms no contract hack
A compromised private key led to roughly $520K-$700K in POL tokens being drained from internal wallets, but the platform says user funds remain safe.
Polymarket is dealing with a security scare after suspicious on-chain activity was flagged on Polygon, revealing that a compromised private key allowed unauthorized outflows from an internal operations wallet. The damage: somewhere between $520,000 and $700,000 in POL tokens, siphoned off and scattered across more than a dozen wallet addresses.
The good news, if you can call it that, is this wasn’t a smart contract exploit. The bad news is that the key in question was reportedly six years old, which raises a different kind of question entirely.
What happened and how it was caught
On-chain investigator ZachXBT was the first to flag the suspicious activity. He spotted unusual outflows from Polygon addresses tied to Polymarket’s UMA Conditional Tokens Framework adapter infrastructure. In English: these were internal wallets the platform uses for backend operations and top-ups, not the contracts that handle user bets or market settlements.
At the initial stage, roughly 5,000 POL tokens were being drained every 30 seconds. That’s the kind of pace that doesn’t exactly scream “authorized transaction.”
Analytical firms including Bubblemaps, Lookonchain, and PeckShield subsequently confirmed the findings. The stolen funds were dispersed across approximately 15 to 16 different wallet addresses and laundered through various services, including ChangeNOW, a non-custodial crypto exchange that doesn’t require identity verification for swaps.
Josh Stevens, Polymarket’s VP of Engineering, clarified that the compromised key was a six-year-old private key associated with an internal admin wallet. It was not a vulnerability in the platform’s core contract systems, he said.
“This was a compromised private key, not a fault in our contract systems.”
Look, there’s a meaningful distinction between “someone broke into our vault” and “someone found a really old key we left in a drawer.” Both are bad. But they’re different kinds of bad, and the implications for users diverge significantly.
The platform’s response
Polymarket moved quickly once the breach was identified. The company ceased withdrawals as a precautionary measure and initiated key rotations across its backend services. Shantikiran Chanal, another platform official, joined Stevens in reassuring users that market resolutions and user assets remain unaffected.
The company has also begun a broader review of internal secrets and security credentials. That’s standard incident-response protocol, but it also signals that Polymarket is taking seriously the possibility that other legacy keys or access points could present similar risks.
Here’s the thing about a six-year-old private key: Polymarket launched its prediction markets back in 2020, which means this key predates or dates back to the platform’s earliest days. Crypto infrastructure evolves fast, and security practices from half a decade ago might as well be from a different geological era. The fact that an old operational key still had enough access to enable a six-figure drain is the kind of oversight that makes security auditors lose sleep.
The attacker’s methodology, spreading funds across more than 15 wallets and routing them through non-custodial exchange services, suggests at least some sophistication. It’s not the most elaborate laundering playbook ever written, but it’s enough to make full recovery difficult without cooperation from the services involved.
A pattern worth watching
This isn’t Polymarket’s first brush with security concerns. In December 2025, the platform dealt with a third-party authentication vulnerability that impacted a limited number of user accounts. That incident was also contained relatively quickly, but two security events within roughly six months starts to look less like bad luck and more like a pattern that needs addressing.
To be fair, Polymarket has grown enormously. The platform became a cultural phenomenon during the 2024 US presidential election cycle, attracting mainstream attention and billions in trading volume. Rapid growth often means that legacy infrastructure gets stretched in ways nobody originally anticipated. The plumbing that worked fine for a niche prediction market can develop leaks when millions of users are running the faucets.
The involvement of ZachXBT in identifying the breach is notable in itself. The pseudonymous on-chain detective has become something of a one-person early warning system for the crypto industry, frequently catching exploits, rug pulls, and suspicious activity before platforms themselves are aware. The fact that an external investigator flagged this before Polymarket’s own monitoring caught it is worth noting, even if the platform’s subsequent response was swift.
What this means for investors
For Polymarket users specifically, the immediate risk appears contained. The compromised wallet was an operational one used for internal purposes, not a contract that holds user deposits or settles prediction markets. If Stevens and the engineering team are accurate in their assessment, and the confirmation from multiple independent on-chain analysis firms supports this, then existing bets and balances should be unaffected.
That said, the temporary withdrawal pause is the kind of thing that naturally makes people nervous. Even when it’s a precautionary measure, seeing “withdrawals halted” next to any crypto platform’s name triggers PTSD from the industry’s long history of platforms that paused withdrawals and never resumed them. Polymarket will need to restore that functionality promptly to maintain user confidence.
For the broader crypto market, this incident feeds into an ongoing conversation about operational security at prediction market platforms and DeFi protocols more generally. Smart contract audits get most of the attention, but operational key management, access controls, and credential rotation policies are often where the real vulnerabilities hide. You can have bulletproof contracts and still get robbed if someone finds an old key with too many permissions.
POL token holders should monitor whether the stolen funds create any measurable sell pressure. Between $520,000 and $700,000 isn’t catastrophic relative to POL’s overall market liquidity, but concentrated selling through non-custodial services could create short-term price disruptions depending on how and when the attacker converts those tokens.
The regulatory angle is also worth considering. Prediction markets already occupy a gray area in many jurisdictions, and repeated security incidents, even ones that don’t impact user funds, give regulators ammunition to argue for tighter oversight. If Polymarket wants to continue operating in the US market (where it has faced scrutiny from the CFTC in the past), demonstrating robust operational security isn’t optional. It’s existential.
Competing platforms in the prediction market space, including Kalshi and newer entrants, will almost certainly use this incident in their positioning. Whether that competitive pressure ultimately makes the entire sector more secure or just more litigious remains to be seen.
Earn with Nexo