Did Kraken Just Get Extorted Over a Critical Bug? The Full Story
Kraken, a leading cryptocurrency exchange, has levelled serious accusations against three security researchers. According to Kraken, the trio discovered a critical bug, exploited it to siphon millions in digital currency, and then attempted to extort the exchange.
Kraken’s chief security officer, Nicholas Percoco, explained that the exploit allowed users to artificially inflate their account balances without completing a deposit.
📢"Kraken’s Chief Security Officer, Nicholas Percoco @c7five, confirmed that the funds, minus transaction fees, were returned on June 20," reports @RomainMax4
What a saga unfolding here between @CertiK and @krakenfx 📜 https://t.co/i6s36KpF8x
— Daily Crypto News (@DCNDailyCrypto) June 20, 2024
This was made possible by a recent user experience (UX) change aimed at simulating real-time trades. Unfortunately, this change was not thoroughly tested for such vulnerabilities.
The Incident: How the Bug Was Exploited
In a public statement, Percoco detailed the sequence of events. “The researchers did not provide details in their bug bounty report, but our team identified the bug within an hour,” Percoco said on X (formerly Twitter).
The issue stemmed from a UX update that prematurely credited user accounts before asset clearance, creating an illusion of real-time transactions.
🗞️ Crypto News
Cryptocurrency exchange Kraken has successfully recovered nearly $3 million in digital assets following a high-profile bug bounty exploit by CertiK.
🔗 https://t.co/xZAdzSLXEb#CryptoNews
— CoinMarketCap (@CoinMarketCap) June 22, 2024
Instead of simply reporting the bug, the primary researcher shared the vulnerability with colleagues, who then withdrew nearly $3 million from Kraken’s treasury.
“These funds were taken from Kraken’s reserves, not client accounts,” Percoco clarified. The researchers allegedly refused to disclose the full extent of their actions or return the stolen funds unless Kraken agreed to a speculative dollar amount for the potential damages.
The Response: CertiK Fires Back
The situation took another turn when CertiK, a blockchain security firm based in the US, identified itself as the other party in the dispute. CertiK countered Kraken’s accusations, claiming that they never withheld the funds and had always intended to return them.
They accused Kraken of misconduct, stating, “After initially cooperating on fixing the bug, Kraken’s team threatened our employees to repay an unreasonable amount in a very short time, without providing repayment addresses.”
CertiK’s statement on X highlighted that they had tried to resolve the issue amicably. However, public opinion on social media has been harsh.
Many accused CertiK of using sanctioned cryptocurrency mixers like TornadoCash and crypto-swapping platforms such as ChangeNOW. Others pointed out discrepancies between CertiK’s public statements and blockchain records.
The Fallout: What Happens Next?
As of now, Kraken has recovered most of the funds, minus some lost to blockchain fees. However, the crypto community remains divided. While Kraken insists that the researchers’ actions constitute extortion, CertiK maintains their innocence and claims Kraken has exaggerated the situation.
“This is not white-hat hacking; it is extortion!” Percoco asserted, adding that Kraken is treating the matter as a criminal case and has involved law enforcement.
The incident underscores the complex and often contentious relationship between cryptocurrency exchanges and security researchers.
As regulatory scrutiny of the crypto industry intensifies, both parties’ actions in this case could set a precedent for future interactions.