Share this article

Kraken Says Hackers Turned to 'Extortion' After Exploiting Bug for $3M

The bug found by a "security researcher" led to nearly $3 million stolen from Kraken's treasuries.

Updated Jun 19, 2024, 6:32 p.m. Published Jun 19, 2024, 3:22 p.m.
(Alpha Rad/Unsplash)
(Alpha Rad/Unsplash)
  • Kraken said third-party security researchers found a vulnerability, which was fixed by the crypto exchange.
  • The researchers secretly withdrew nearly $3 million and refused to give it back without seeing the bounty amount first, Kraken said.
  • Blockchain code editor Certik said it found a vulnerability in Kraken's platform and claims to have been "threatened" by the exchange.

Crypto exchange Kraken said "security researchers" who found a vulnerability on the platform turned to "extortion" after withdrawing about $3 million from the exchange's treasury.

Nick Percoco, Kraken's chief security officer, said in a post on social media platform X (formerly Twitter) that the firm received a "bug bounty program" alert from a security researcher on June 9 about a vulnerability that allows users to artificially inflate their balance. The bug "allowed a malicious attacker, under the right circumstances, to initiate a deposit onto our platform and receive funds in their account without fully completing the deposit," Percoco added.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters

Upon receiving the report, Kraken fixed the issue swiftly and no user funds were affected, Percoco noted.

What came after raised red flags for Kraken's team.

The security researcher, upon finding the bug, allegedly disclosed it to two other individuals, who then "fraudulently" withdrew nearly $3 million from their Kraken accounts. "This was from Kraken’s treasuries, not other client assets," Percoco said.

The initial bug report didn't mention the two other individuals' transactions, and when Kraken asked for more details of their activities, they refused.

"Instead, they demanded a call with their business development team (i.e. their sales reps) and have not agreed to return any funds until we provide a speculated $ amount that this bug could have caused if they had not disclosed it. This is not white-hat hacking, it is extortion!" Percoco wrote.

Kraken didn't disclose who the researchers were, but blockchain code editor Certik subsequently said in a social media post that it found several vulnerabilities in the crypto exchange.

Certik said it conducted "multi-day testing" and noted that the bug could be exploited to create millions of dollars worth of crypto. "Millions of dollars can be deposited to ANY Kraken account. A huge amount of fabricated crypto (worth more than 1M+ USD) can be withdrawn from the account and converted into valid cryptos. Worse yet, no alerts were triggered during the multi-day testing period," the post said.

However, Certik said things went sour after the initial conversation with Kraken. "Kraken’s security operation team has THREATENED individual CertiK employees to repay a MISMATCHED amount of crypto in an UNREASONABLE time even WITHOUT providing repayment addresses," the X post added.

Bug bounty programs – used by many firms to strengthen their security systems – invite third-party hackers, known as "white hats," to find vulnerabilities so the company can fix them before a malicious actor exploits them. Kraken's competitor, Coinbase, has a similar program to help alert the exchange of vulnerabilities.

To be paid the bounty, Kraken's program requires a third party to find the problem, exploit the minimum amount needed to prove the bug, return the assets and provide details of the vulnerability, Kraken said in a blog post, adding that since the security researchers didn't follow these rules, they won't get the bounty.

"We engaged these researchers in good faith and, in-line with a decade of running a bug bounty program, had offered a sizable bounty for their efforts. We’re disappointed by this experience and are now working with law enforcement agencies to retrieve the assets from these security researchers," a Kraken spokesperson told CoinDesk.

Read more: Your Crypto Project Needs a Sheriff, Not a Bounty Hunter

UPDATE (June 19, 18:30 UTC): Updates story throughout to add Certik's comments.


Más para ti

Protocol Research: GoPlus Security

GP Basic Image

Lo que debes saber:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

Más para ti

Telegram Ring Ran Pump-and-Dump Network That Netted $800K in a Month: Solidus Labs

hackers (Modified by CoinDesk)

A Solidus Labs investigation details how an invite-only Telegram group used bots, fake narratives and rapid token deployments across Solana and BNB Chain to manipulate markets.

Lo que debes saber:

  • PumpCell orchestrated synchronized token launches, sniper-bot buys and meme-driven hype campaigns to inflate micro-cap tokens to seven-figure valuations within minutes, according to a new forensic investigation by Solidus Labs.
  • The group generated an estimated $800,000 in October 2025, moving funds through centralized exchanges and an OTC cash broker to allegedly evade compliance controls.
  • Solidus says crypto’s AMM-driven markets, bot execution and cross-chain pseudonymity make such schemes difficult for legacy monitoring tools to detect — and warns PumpCell reflects a broader, evolving pattern of digital-asset abuse.