A Hair Dryer Blows Away $34,000 from Polymarket

marsbitPublished on 2026-04-23Last updated on 2026-04-23

Abstract

A hairdryer was used to manipulate a temperature sensor at Paris Charles de Gaulle Airport (LFPG) on April 6 and 15, 2026, causing short-lived artificial temperature spikes. These false readings were used to exploit a prediction market on Polymarket, where users bet on Paris’s daily maximum temperature. The attacker targeted low-probability high-temperature outcomes, which settled as "Yes" based on the corrupted data, netting a total of $34,000 in profit. The attacker’s a newly created anonymous account funded just two days before the first incident. After the successful manipulations, the funds were quickly moved through mixers and decentralized exchanges to avoid tracing. French meteorological experts and authorities confirmed the anomalies were inconsistent with actual weather conditions and nearby station data, pointing to physical intervention. Legal action was initiated for "disrupting automated data processing systems," which carries severe penalties under French law. Polymarket’s market rules relied solely on a single, publicly accessible sensor and did not account for subsequent data revisions, making the system vulnerable to such physical oracle attacks. In response, Polymarket silently switched its data source to Paris-Le Bourget Airport (LFPB) without public explanation or refunding the exploited funds. The incident highlights the risks of single-point data dependencies in prediction markets and the low-cost, high-reward potential of real-world manipulation.

Author: 0x2333, The BlockBeats

A hair dryer, an unattended weather sensor, and two meticulously calculated operations.

On April 6 and April 15, 2026, a weather probe at the Météo-France station at Paris Charles de Gaulle Airport was heated with a portable heating device, causing the temperature readings to spike abnormally within a short period. The actual temperature at Charles de Gaulle Airport did not experience such fluctuations, but the prediction market betting on "Paris Daily Maximum Temperature" on Polymarket settled as usual. In two operations, a total of $34,000 in rewards was transferred from the platform to an anonymous account opened just two days before the incident.

This was not a typical crypto attack. It did not exploit any smart contract vulnerabilities, nor did it target any decentralized governance processes. The entire attack tool was just a hair dryer.

Temperature Spikes 4°C in 12 Minutes, How Did a Single Probe Deceive the Global Prediction Market?

Between 6:30 PM and 6:42 PM on April 6, the temperature reading at the Charles de Gaulle Airport weather station climbed 4°C in 12 minutes, peaking at 22.5°C, before rapidly dropping back within 5 minutes. The actual temperature in Paris that day did not show such drastic fluctuations, and no similar anomalies were recorded at other nearby weather stations.

This weather station (code: LFPG) is located at the edge of the Charles de Gaulle Airport runway, near a public area adjacent to a road. Its relatively open physical location made it possible for the suspect to approach the sensor and perform physical intervention.

This brief period of "high temperature"恰好 hit the "21°C" option on Polymarket, a previously almost ignored outcome. After the abnormal data was accepted by the platform as the day's maximum temperature, it settled to Yes. An account behind it took away approximately $14,000.

Nine days later, around 9:30 PM on April 15, almost the exact same script played out again. On a cloudy, windless night, the temperature reading at Charles de Gaulle Airport bizarrely climbed to 22°C. The probability of the "22°C" option on Polymarket soared from 0.1% to 95% in just 30 minutes. A second prize of over $20,000 flowed into the same account.

Paul Marquis, founder of French E-Meteo Service and a meteorologist, provided a technically almost irrefutable judgment: "There was no change in wind direction or relative humidity at the time, and no anomalies were recorded at other surrounding weather stations. Physical intervention is the most reasonable explanation, such as placing a heating device near the sensor probe."

Météo-France subsequently conducted a physical inspection of the sensor, found evidence of tampering, and formally filed a criminal complaint with the Roissy Air Transport Gendarmerie. The charge is "disrupting the operation of an automated data processing system." Under French law, this offense carries a maximum penalty of 7 years imprisonment and a fine of 300,000 euros.

The profile of the involved account is also questionable. It was created on April 4, 2026, just 48 hours before the first operation. The initial funds were only a few dozen dollars, transferred via a cryptocurrency exchange. It almost exclusively participated in the "Paris weather" market, specifically buying extremely low-probability "high temperature" options. After two successful attempts, the funds were quickly transferred through mixers and decentralized exchanges, making on-chain tracking significantly more difficult.

On one side is a common household hair dryer, retailing for less than 30 euros. On the other side is a global climate prediction market with a daily trading volume exceeding $2 million. The extreme asymmetry between the cost of the attack and the potential gain.

The abnormal data was first discovered by local French weather enthusiasts on the Infoclimat forum. The event was subsequently spread to the English-speaking crypto community, followed by reports from French media such as Le Monde, Le Figaro, and BFMTV. Polymarket officials have not issued any public statement on the matter, nor have they revoked the already paid $34,000 reward.

Rule Vulnerability, How Does a Single Sensor Reading Decide Six-Figure Prizes?

The true protagonist of this incident is not the hair dryer, but rather the settlement rules of Polymarket's weather market.

Polymarket's weather markets have grown rapidly in recent years, with the number of active markets now reaching 173, covering temperature, precipitation, hurricanes, tornadoes, earthquakes, volcanoes, and even pandemics. Among them, the "Paris Daily Maximum Temperature" market uses an extremely simple settlement mechanism, locking the data source to the readings from one specific weather station hosted on the Wunderground website.

Before this incident, this station was the Charles de Gaulle Airport weather station (code LFPG), with temperature rounded to the nearest whole degree Celsius. Most crucially, the market settles immediately after the data is finalized, and "does not consider any subsequent data revisions."

This last point means that even if Météo-France later discovers data anomalies and revises the historical records, Polymarket will still pay out rewards based on the contaminated original reading. The rules are written clearly and executed without ambiguity.

The vulnerability thus clearly presents itself in three points:

First, a single point of failure. The settlement of the entire six-figure prize pool relies entirely on the reading from one sensor. Polymarket did not design mechanisms for multi-station weighting, redundant comparison, or anomaly熔断. The so-called "data source" is that single metal probe by the runway at Charles de Gaulle Airport.

Second, physical accessibility. The Charles de Gaulle Airport weather station is located near the edge of the runway, adjacent to a public area next to a road, allowing any ordinary person to approach within meters of the probe. This geographical detail lowers the barrier to "physical intervention" from theoretical possibility to an almost zero-cost practical operation.

Third, the rigidity of the settlement mechanism. The invalidity of post-hoc revisions means that once an attack is successful, there is no possibility of "reversal." The rules ensure the certainty of settlement on one hand, but also guarantee that manipulation, once successful, is irreversible.

Fibo Crypto analyst Victor gave this technique a technically elegant name: "Physical Oracle Attack." Unlike previous "Digital Oracle Attacks" that targeted UMA governance votes and relied on large-scale token voting to manipulate oracle results, physical oracle attacks bypass the entire on-chain logic, acting directly on the first mile of the data pipeline—the metal probe in the real world.

On April 17, two days after the incident was exposed, Polymarket quietly completed a rule change, switching the settlement data source for the Paris weather market from Charles de Gaulle Airport (LFPG) to Paris-Le Bourget Airport (LFPB). The switch was not accompanied by any official announcement, public technical explanation, or any response to the two manipulations that had already occurred.

Changing a probe is much easier than publicly admitting a vulnerability. Polymarket's weather market was initially designed as a mirror, reflecting the market's collective judgment about the future. But when the image in the mirror is valuable enough, the odds steep enough, and the probe accessible enough, someone will always walk over with a 30-euro hair dryer and blow their desired result into it.

Related Questions

QWhat was the method used to manipulate the temperature readings at Charles de Gaulle Airport?

AA portable heating device, such as a hairdryer, was used to artificially heat the meteorological sensor, causing a temporary spike in temperature readings.

QHow much money was stolen from Polymarket through this manipulation attacks?

AA total of $34,000 was stolen from the platform across two separate attacks.

QWhat specific vulnerability in Polymarket's system did this attack exploit?

AThe attack exploited a single point of failure in the settlement mechanism, which relied solely on the temperature reading from one specific, physically accessible weather station (LFPG) without any redundancy checks or mechanisms to account for data revisions.

QWhat action did Polymarket take after the attacks were discovered?

APolymarket quietly changed the data source for its Paris weather market from the Charles de Gaulle Airport station (LFPG) to the Paris-Le Bourget Airport station (LFPB) without making any public announcement or addressing the prior manipulations.

QWhat is the term used to describe this type of attack that targets the physical data source?

AThis type of attack is called a 'physical oracle attack,' which manipulates the real-world data source feeding into the prediction market, rather than exploiting a smart contract or governance vulnerability.

Related Reads

20 Billion Valuation, Alibaba and Tencent Competing to Invest, Whose Money Will Liang Wenfeng Take?

DeepSeek, an AI startup founded by Liang Wenfeng, is reportedly in talks with Alibaba and Tencent for an external funding round that could value the company at over $20 billion. This marks a significant shift, as DeepSeek had previously relied solely on funding from its parent company,幻方量化 (Huanfang Quantitative), and had resisted external investment. The potential valuation would place DeepSeek among the top-tier AI model companies in China, comparable to competitors like MoonDark (valued at ~$18 billion) and ahead of recently listed firms like MiniMax and Zhipu. The funding—which could range from $600 million (for a 3% stake) to $2 billion (for 10%)—is seen as a move to secure resources for model development, retain talent, and support infrastructure needs, particularly as competition in inference models and AI agents intensifies. Both Alibaba and Tencent are eager to invest, not only for financial returns but also to integrate DeepSeek into their broader AI ecosystems. However, DeepSeek’s leadership is cautious about maintaining independence and may prefer financial investors over strategic ones to avoid being locked into a specific tech ecosystem. Alternative options, such as state-backed funds, offer longer-term capital and policy support but may come with slower decision-making and potential constraints on global expansion. With competing AI firms accelerating their IPO plans, DeepSeek’s window for securing optimal terms may be narrowing. The final decision will reflect a trade-off between capital, resources, and strategic independence.

marsbit30m ago

20 Billion Valuation, Alibaba and Tencent Competing to Invest, Whose Money Will Liang Wenfeng Take?

marsbit30m ago

After Losing 97% of Its Market Value, iQiyi Attempts to Use AI to Forcefully Extend Its Lifespan

After losing 97% of its market value since its 2018 peak, iQiyi is aggressively pivoting to AI in a desperate attempt to survive. At its 2026 World Conference, CEO Gong Yu announced an "AI Artist Library" with over 100 virtual performers and a new AIGC platform, "NaDou Pro," promising faster production and lower costs. This shift comes as the company faces severe financial distress: its market cap sits near delisting thresholds at $1.36 billion, with significant losses, declining membership revenue, and depleted cash flow. The AI strategy has sparked controversy. Top actors have issued legal threats against unauthorized digital replicas, while in Hengdian, over 134,000 background actors are seeing their already scarce job opportunities vanish as AI replaces them for background roles. iQiyi's move represents a fundamental shift from being a high-cost content buyer to a landlord" to becoming a "platform capitalist" that transfers production risk to creators. This contrasts with competitors like Douyin (TikTok's Chinese counterpart), which is investing heavily in *real* actor-led short dramas, betting that authentic human connection retains users better than AI-generated content. The article draws a parallel to the 1920s transition to "talkies," which made cinema musicians obsolete but ultimately enriched the art form. In contrast, iQiyi's AI drive is framed not as an artistic evolution but as a cost-cutting measure that could degrade storytelling, replacing genuine human emotion with algorithmically calculated stimulation and potentially numbing audiences' capacity for empathy. The core question remains: can a company focused solely on financial survival preserve the art of storytelling?

marsbit33m ago

After Losing 97% of Its Market Value, iQiyi Attempts to Use AI to Forcefully Extend Its Lifespan

marsbit33m ago

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

The CLARITY Act, which passed the House in July 2025 with strong bipartisan support (294-134), faces a critical juncture in the Senate. The Senate Banking Committee is expected to hold a markup soon, but key issues remain unresolved, including stablecoin yield provisions, DeFi regulations, and securing full Republican committee support. Other contentious points involve the Blockchain Regulatory Certainty Act (BRCA), ethics amendments for government officials, and SEC-related matters. The legislative calendar is tight, with limited time before the midterm elections. If the committee markup is delayed beyond mid-May, the chances of passage in 2026 drop significantly. Senator Cynthia Lummis has warned that failure this year could delay comprehensive crypto market structure legislation until 2030 or later. Galaxy estimates the probability of the CLARITY Act becoming law in 2026 is only about 50%. The bill provides crucial regulatory clarity by defining jurisdictional boundaries between the SEC and CFTC, establishing a path for decentralization, and bringing digital commodity intermediaries under federal regulation. Its passage is seen as vital before potential power shifts in the next Congress, which could bring less favorable leadership to key committees. The timeline is compressed, and the bill must compete for floor time with other priorities like Iran authorization and DHS appropriations. Key hurdles include finalizing the stablecoin yield compromise text, addressing law enforcement concerns about BRCA, and navigating political dynamics around SEC nominations. The outcome of the Banking Committee markup and the level of bipartisan support will be critical indicators of its future success.

marsbit1h ago

Only a 50% Chance of Passing This Year, Can the CLARITY Bill Succeed Before the Midterm Elections?

marsbit1h ago

Trading

Spot
Futures

Hot Articles

How to Buy T

Welcome to HTX.com! We've made purchasing Threshold Network Token (T) simple and convenient. Follow our step-by-step guide to embark on your crypto journey.Step 1: Create Your HTX AccountUse your email or phone number to sign up for a free account on HTX. Experience a hassle-free registration journey and unlock all features.Get My AccountStep 2: Go to Buy Crypto and Choose Your Payment MethodCredit/Debit Card: Use your Visa or Mastercard to buy Threshold Network Token (T) instantly.Balance: Use funds from your HTX account balance to trade seamlessly.Third Parties: We've added popular payment methods such as Google Pay and Apple Pay to enhance convenience.P2P: Trade directly with other users on HTX.Over-the-Counter (OTC): We offer tailor-made services and competitive exchange rates for traders.Step 3: Store Your Threshold Network Token (T)After purchasing your Threshold Network Token (T), store it in your HTX account. Alternatively, you can send it elsewhere via blockchain transfer or use it to trade other cryptocurrencies.Step 4: Trade Threshold Network Token (T)Easily trade Threshold Network Token (T) on HTX's spot market. Simply access your account, select your trading pair, execute your trades, and monitor in real-time. We offer a user-friendly experience for both beginners and seasoned traders.

10.7k Total ViewsPublished 2024.03.29Updated 2025.03.21

How to Buy T

Discussions

Welcome to the HTX Community. Here, you can stay informed about the latest platform developments and gain access to professional market insights. Users' opinions on the price of T (T) are presented below.

活动图片