ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Cryptocurrency

Polymarket Clashes With Hacker Over Alleged Data Breach as 300K Records Surface Online

A threat actor claims to have exploited API flaws to extract over 300,000 records from Polymarket, but the prediction market platform denies any breach, stating all data was already public on-chain.

Polymarket Clashes With Hacker Over Alleged Data Breach as 300K Records Surface Online

The decentralized prediction market platform is at the center of a heated dispute over what constitutes a data breach. A threat actor operating under the handle “xorcat team” posted on a cybercrime forum claiming to have extracted more than 300,000 records from Polymarket’s infrastructure, along with a full exploit kit and working proof-of-concept scripts Monday.

Key Takeaways
  • Polymarket denies a data breach after a threat actor claims to have stolen 300,000 user records via undocumented API endpoints.
  • The alleged 750-megabyte cache includes user profiles and activity logs extracted through unauthenticated pagination bypasses and CORS misconfigurations.
  • Security researchers at vx-underground warn that Polymarket’s dismissive response ignores the risk of targeted phishing via aggregated wallet data.
Listen to this article
READY

The alleged cache includes approximately 750 megabytes of compressed data spanning user profiles, activity logs, market metadata, follower relationships and reward configurations. The actor claims the extraction was performed entirely through unauthenticated means, exploiting undocumented API endpoints, a pagination bypass and a CORS misconfiguration.

Polymarket Denies Breach, Calls Data Public

Polymarket directly disputed the hacker’s claims in a series of posts on X on April 29. “We are investigating these claims, but initial review indicates that the ‘leaked’ data consists of information already publicly accessible on-chain and via public APIs,” the platform said.

The company maintained that no private user information, including email addresses, passwords or government identification documents, was compromised.

This response drew sharp criticism from the security community. vx-underground, a prominent malware research collective, warned that Polymarket’s dismissive tone could backfire.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

“I don’t think it is Polymarket’s best interest to mock Threat Actors who are claiming to have exfiltrated data from them,” vx-underground posted on X. “It is probably in their best interest to keep an eye on this and not mock criminals who are obviously interested in their organization. I don’t know, man. I don’t think this stuff is a joke.”

The Technical Claims

The threat actor alleged that multiple vulnerabilities were chained together to extract the data. These reportedly include a pagination bypass allowing bulk harvesting of market data, a CORS misconfiguration with wildcard origins, and unauthenticated endpoints exposing full user profiles and social graph data.

The threat actor claimed Polymarket has no bug bounty program and received no prior notification before the public posting.

User Risk

The immediate risk for users is phishing, according to Dark Web Informer. The combination of real names, usernames and wallet addresses enables attackers to craft personalized messages asking users to “secure” their accounts or “verify” transactions, leading to credential theft or drained wallets.

Polymarket did not confirm whether any of the alleged vulnerabilities have been patched. The platform did not respond to requests for comment.

Chain Street’s Take

The truth is probably in the middle. Polymarket is technically correct that on-chain data is public. But aggregated, packaged and cross-referenced with usernames and bios, that same data becomes a targeting map.

vx-underground’s warning should not be dismissed. The hacker is selling an exploit kit on a cybercrime forum. Even if Polymarket patches everything tomorrow, the tooling is now in the wild. Instead of memeing the situation, Polymarket would be better served by a transparent post-mortem. The dismissive response erodes trust faster than any data leak ever could.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

What is the Polymarket data leak claim?

A threat actor named xorcat team claims to have extracted 300,000 records from the Polymarket prediction platform. The alleged cache contains user profiles, market metadata, and activity logs totaling 750 megabytes. This dispute centers on whether aggregated public on-chain data constitutes a formal security breach.
02

Why does this matter for Polymarket users?

Aggregated data allows criminals to map usernames and social profiles directly to specific wallet addresses. Dark Web Informer warns that this correlation facilitates highly targeted phishing attacks and social engineering attempts. Users remain vulnerable to credential theft even if their private keys were never directly exposed.
03

How did the threat actor extract the information?

The hacker used unauthenticated API endpoints and a pagination bypass to harvest bulk user records Monday. Researchers identified a CORS misconfiguration with wildcard origins that allowed unauthorized data requests. Polymarket maintains that its internal systems remain secure and no private government identification was compromised.
04

What are the risks of Polymarket’s response?

Security collective vx-underground warns that mocking threat actors publicly increases the likelihood of retaliatory attacks against the platform. The lack of a formal bug bounty program prevented the hacker from disclosing the vulnerabilities privately before the forum post. Relying on the public nature of on-chain data ignores the dangers of centralized metadata aggregation.
05

What happens if the exploit kit remains public?

Malicious actors can use the leaked proof-of-concept scripts to scrape real-time activity from Polymarket's undocumented endpoints. The platform must now audit its API architecture to prevent further bulk extraction of user social graph data. Transparency regarding future patches is necessary to restore user trust in the platform's security infrastructure.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.