Polymarket, the world’s largest decentralized prediction market platform. It is facing a suspected smart contract exploit after attackers reportedly drained more than $660,000 from a Polygon-based adapter contract on May 22, 2026.
The incident was first flagged by on-chain investigator ZachXBT. He warned that Polymarket’s UMA CTF Adapter contract may have been compromised. According to multiple blockchain trackers, the attacker continuously withdrew small batches of POL and MATIC tokens every few seconds. Through a suspected exploit tied to legacy oracle infrastructure. The ongoing drain has quickly turned into one of the biggest Polymarket News stories of the month.
The initial Polymarket ZachXBT alert identified two affected contracts:
The suspected attacker wallet was identified as:
Blockchain monitoring data later showed repeated withdrawals of roughly 5,000 MATIC every 20-30 seconds. Some transactions exceeded 9,900 MATIC before funds were routed through additional wallets. Lookonchain later confirmed the exploit had surpassed $660,000 in losses. While warning users to avoid new deposits or trading activity until more information becomes available.
Early reports suggest the exploit involves Polymarket’s UMA CTF Adapter on Polygon. The adapter acts as a bridge between UMA’s oracle infrastructure and Polymarket’s Conditional Tokens Framework. That system helps resolve prediction market outcomes across the platform. Security researchers believe the attacker may have exploited an old private key or legacy permission setup tied to the adapter contract. Rather than breaching Polymarket’s core trading infrastructure directly. The repeated small transfers suggest an automated draining strategy rather than a single large exploit transaction. Community members also warned that funds may already be moving toward laundering routes or intermediary wallets.
For users and traders, the exploit raises fresh concerns about smart contract security across decentralized prediction markets. Polymarket processes large betting volumes tied to elections, geopolitics, and financial markets. Therefore, any exploit can damage user confidence quickly.
Some traders now fear:
If the exploit continues growing, competitors could temporarily benefit as users shift activity elsewhere. The incident also highlights how even mature DeFi platforms remain exposed to infrastructure vulnerabilities.
For developers, the exploit reinforces the importance of key rotation, continuous audits, and strict contract permission management. Legacy adapter contracts and oracle integrations often become overlooked attack surfaces over time. This case may push more DeFi teams toward:
The attack could also accelerate discussions around oracle security standards across Polygon and broader DeFi ecosystems.
At the time of writing, Polymarket had not released a full public technical breakdown of the exploit. However, community alerts continue advising users to remain cautious until contract activity stabilizes. As Polymarket news continues developing. The investigators will likely focus on whether funds can be frozen or partially recovered through coordinated blockchain tracing efforts. For now, the incident serves as another reminder that security remains one of crypto’s biggest long-term challenges. Especially as decentralized finance platforms continue scaling globally.
The post Polymarket Exploited — Attacker Steals $660K and Counting appeared first on Coinfomania.


