Key Takeaways
Crypto exchange Kraken disclosed that an anonymous security researcher exploited an “extremely critical” zero-day vulnerability in its platform, resulting in the theft of $3 million in digital assets, which the researcher refused to return.
Minutes after receiving the alert, Kraken reported that it identified a security issue allowing an attacker to “initiate a deposit onto our platform and receive funds in their account without fully completing the deposit.”
Kraken’s Chief Security Officer, Nick Percoco, shared details of the incident on X. He mentioned that the exchange received an alert from its Bug Bounty program about a bug that enabled the researcher to artificially inflate their balance on the platform without providing further specifics.
Kraken Security Update:
On June 9 2024, we received a Bug Bounty program alert from a security researcher. No specifics were initially disclosed, but their email claimed to find an “extremely critical” bug that allowed them to artificially inflate their balance on our platform.
— Nick Percoco (@c7five) June 19, 2024
Kraken emphasized that no client assets were at risk, but it could have enabled a threat actor to generate assets in their accounts. The company stated that the problem was addressed within 47 minutes.
Kraken also revealed that the flaw originated from a recent user interface change that allowed customers to deposit funds and use them before they were cleared.
Further investigation uncovered that three accounts, including one belonging to the supposed security researcher, had exploited the flaw within a few days of each other, resulting in the theft of $3 million.
Percoco explained:
“This individual discovered the bug in our funding system, and leveraged it to credit their account with $4 in crypto. This would have been sufficient to prove the flaw, file a bug bounty report with our team, and collect a very sizable reward under the terms of our program.
Instead, the ‘security researcher’ disclosed this bug to two other individuals who they work with who fraudulently generated much larger sums. They ultimately withdrew nearly $3 million from their Kraken accounts. This was from Kraken’s treasuries, not other client assets.” the researcher added.
In a strange turn of events, when Kraken approached the researcher to share their proof-of-concept (PoC) exploit used to create the on-chain activity and to arrange the return of the withdrawn funds, they instead demanded that Kraken contact their business development team and pay a set amount to release the assets.
Percoco described this behavior as extortion and urged the parties involved to return the stolen funds.
We have had a Bug Bounty program in place at Kraken for nearly ten years. This program is run internally and is fully staffed by some of the brightest minds in the community. Our program, like many others, has clear rules of the road…
1. Do not exploit more than you need to in…
— Nick Percoco (@c7five) June 19, 2024
Although the name of the company was not disclosed, Kraken stated it is treating the security event as a criminal case and is coordinating with law enforcement agencies.
Percoco emphasized that a security researcher’s permission to “hack” a company is contingent on following the rules of the bug bounty program. Ignoring those rules and extorting the company revokes this permission and classifies the individuals and their company as criminals.
Blockchain security firm CertiK has identified itself as the entity responsible for the breach on Kraken. CertiK reported that it discovered multiple critical vulnerabilities within Kraken’s platform, enabling the creation of counterfeit crypto assets in any account. These fabricated assets could then be withdrawn and converted into legitimate crypto.
CertiK defended its actions on X, stating that millions of dollars worth of crypto were created without involving any real Kraken user assets.
CertiK recently identified a series of critical vulnerabilities in @krakenfx exchange which could potentially lead to hundreds of millions of dollars in losses.
Starting from a finding in @krakenfx 's deposit system where it may fail to differentiate between different internal… pic.twitter.com/JZkMXj2ZCD
— CertiK (@CertiK) June 19, 2024
The firm explained that over several days, many fabricated tokens were generated and converted into legitimate cryptos, yet Kraken’s risk control mechanisms failed to detect these test transactions until CertiK reported them. CertiK emphasized that the real issue was why Kraken’s defense system did not identify the continuous large withdrawals from different testing accounts.
Additionally, CertiK claimed that Kraken’s security team threatened individual CertiK employees to repay a mismatched amount of crypto within an unreasonable timeframe without providing repayment addresses.
Evidence has surfaced indicating that a CertiK researcher may have been conducting probing and testing as early as May 27, 2024, which contradicts CertiK’s reported timeline of events.
stack ranked list of things certik should be scared of:
1. krakens lawyers
2. their own lawyers when they find out bout this
3. legit security researchers
4. their internal culture, ethics
5. their brand
…….
10000000. whether kraken labels their find as crit and pays a bounty https://t.co/Tz1fBMSfVy— Tay 💖 (@tayvano_) June 19, 2024
This development follows Kraken’s blog post accusing the “third-party security research company” of exploiting the flaw for financial gain before reporting it. The now-resolved vulnerability allowed certain users, for a short time, to artificially inflate their Kraken account balances without fully completing a deposit.
The ongoing dispute between Kraken and CertiK has taken another turn as both parties continue to clash over the nearly $3 million exploit. Kraken claimed that the total exploited amount was not returned, while CertiK asserted they had returned all funds according to their records.
On June 20, CertiK provided an update on X , stating they had returned 734.19215 Ether (ETH), 29,001 Tether (USDT), and 1021.1 Monero (XMR). However, Kraken had requested 155,818.4468 Polygon (MATIC), 907,400.1803 USDT, 475.5557871 ETH, and 1089.794737 XMR. The discrepancy between the returned and requested amounts remains a point of contention.
Q&A to recent CertiK-Kraken whitehat operations:
1. Did any real user lose fund?
No. Cryptos were minted out of air, and no real Kraken user’s assets were directly involved in our research activities.2. Have we refused to return the funds?
No. In our communication with…— CertiK (@CertiK) June 20, 2024
Bug bounty programs, widely adopted by firms to enhance their security systems, invite third-party hackers, known as “white hats,” to identify vulnerabilities so the company can address them before malicious actors exploit them. Kraken, like its competitor Coinbase , employs such a program to proactively discover and fix potential security issues.
CertiK reportedly sent the stolen funds to the crypto mixing service Tornado Cash to prevent them from being frozen by crypto exchanges. This move sparked significant criticism from the crypto community, raising questions about CertiK’s motives behind what was claimed to be a “white hat” operation.
just testing some tornado cash deposits after testing the kraken withdrawal feature
needed to make sure it still works pic.twitter.com/PL4zi7GzSW
— Spreek (@spreekaway) June 19, 2024
The crypto community questioned CertiK’s decision to move millions of dollars worth of funds when a single transaction could have proven the vulnerability.
Critics also reminded that Tornado Cash is an Office of Foreign Assets Control (OFAC)-sanctioned tool, and using it could lead to legal trouble for CertiK. Many also wondered whether CertiK intended to return the funds and why it chose to send them to Tornado Cash.
The real question should be why Kraken’s in-depth defense system failed to detect so many test transactions. This is indeed what we were testing.
You often heard from a weak exchange’s response to a security bug finding with a brag of their strong risk control and in-depth…— CertiK (@CertiK) June 19, 2024
The majority of the crypto community sided with Kraken, condemning CertiK for its ruthless behavior. Many accused CertiK of “stealing” and blackmailing Kraken for the bounty, calling the firm’s ethical standards into question.