Kraken Crypto Exchange Loses $3M in 47-Minute Heist

Lilu Anderson
Photo: Finoracle.net

Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw

Cybercrime / Crypto Security

Crypto exchange Kraken revealed that an unnamed security researcher exploited an "extremely critical" zero-day flaw in its platform to steal $3 million in digital assets and refused to return them.

Details of the Incident

Kraken's Chief Security Officer, Nick Percoco, shared that the platform received a Bug Bounty program alert about a bug that "allowed them to artificially inflate their balance on our platform" without sharing any other details.

The company identified a security issue within minutes of receiving the alert that essentially permitted an attacker to "initiate a deposit onto our platform and receive funds in their account without fully completing the deposit."

While Kraken emphasized that no client assets were at risk, the issue could have enabled a threat actor to generate assets in their accounts. Kraken addressed the problem within 47 minutes.

The flaw stemmed from a recent user interface change that allows customers to deposit funds and use them before they were cleared.

Exploitation and Theft

Further investigation unearthed that three accounts, including one belonging to the supposed security researcher, had exploited the flaw within a few days of each other and siphoned $3 million.

"This individual discovered the bug in our funding system, and leveraged it to credit their account with $4 in crypto," Percoco said. "This would have been sufficient to prove the flaw, file a bug bounty report with our team, and collect a very sizable reward under the terms of our program."

"Instead, the 'security researcher' disclosed this bug to two other individuals who they work with who fraudulently generated much larger sums. They ultimately withdrew nearly $3 million from their Kraken accounts. This was from Kraken's treasuries, not other client assets."

Extortion and Response

In a strange turn of events, when approached by Kraken to share their proof-of-concept (PoC) exploit and to arrange the return of the funds, the involved parties instead demanded that the company get in touch with their business development team to pay a set amount to release the assets.

"This is not white hat hacking, it is extortion," Percoco said, urging the concerned parties to return the stolen funds.

The name of the company was not disclosed, but Kraken said it's treating the security event as a criminal case and that it's coordinating with law enforcement agencies about the matter.

Ethical Hacking Gone Wrong

"As a security researcher, your license to 'hack' a company is enabled by following the simple rules of the bug bounty program you are participating in," Percoco noted. "Ignoring those rules and extorting the company revokes your 'license to hack.' It makes you, and your company, criminals."

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.