ClickCease Crypto Exchanges Face $3 Million Fine For Zero Day Exploit - TuxCare

Content Table

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

Crypto Exchanges Face $3 Million Fine For Zero Day Exploit

Wajahat Raja

July 2, 2024 - TuxCare expert team

As per recent reports, Kraken, a prominent crypto exchange, disclosed a significant security incident involving a zero day exploit that led to a theft of $3 million in digital assets. The breach was revealed by Nick Percoco, Kraken’s Chief Security Officer, who detailed that an unidentified security researcher exploited a critical flaw. This user interface change flaw allowed them to manipulate the platform’s deposit process, artificially inflating their account balance without completing the transaction.

Zero Day Exploit – Immediate Response and Vulnerability Disclosure

Upon receiving the Bug Bounty program alert, Kraken swiftly identified the security issue. This flaw enabled attackers to initiate deposits and receive funds without fully completing the deposit process. Despite the potential risk of asset manipulation, Kraken reassured users that client funds remained secure throughout the incident. The zero day vulnerability stemmed from recent user interface updates that inadvertently altered deposit handling protocols.

Exploitation and Extortion

Further investigation revealed that three accounts, including one linked to the initial security researcher, exploited the flaw within a short timeframe, siphoning $3 million from Kraken’s reserves. Rather than reporting the vulnerability under Kraken’s Bug Bounty program, the researcher allegedly shared it with associates who conducted unauthorized transactions. When approached by Kraken for cooperation, they demanded payment instead of returning the stolen assets, prompting accusations of extortion from Kraken’s security team.

Involvement of CertiK and Controversies

CertiK, a blockchain security firm, emerged as the entity responsible for detecting the crypto exchange Kraken security breach. They claimed to have identified critical flaws in Kraken that facilitated the creation and withdrawal of fabricated cryptocurrencies. CertiK defended their actions, stating that their testing aimed to expose vulnerabilities in Kraken’s security infrastructure. However, Kraken disputed CertiK’s claims, alleging that the firm’s activities were not conducted in compliance with industry standards and posed legal and financial risks.

Resolution and Recovery

Kraken managed to recover all funds, except for a small amount lost to transaction fees. The company promptly distributed the recovered $2.9 million back to affected users through a USDT airdrop. This restitution marked the conclusion of a challenging episode for Kraken, emphasizing the importance of robust cybersecurity measures in the cryptocurrency sector.

Lessons Learned and Moving Forward

In response to the three accounts exploited flaw, Kraken reinforced its commitment to security protocols and Bug Bounty programs. They highlighted the critical role of responsible vulnerability disclosure and ethical hacking practices in maintaining trust and integrity within the crypto community. Kraken also underscored the need for continuous vigilance and rapid response capabilities to mitigate future threats effectively.


The zero day exploit attack at Kraken underscores the persistent cybersecurity challenges faced by cryptocurrency exchanges. As digital assets continue to gain prominence, the importance of stringent security measures cannot be overstated. Kraken’s proactive handling of the incident, alongside lessons learned from collaboration and accountability, sets a precedent for resilience and recovery in the evolving landscape of digital finance.

The sources for this piece include articles in The Hacker News and Tech Times.

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Become a TuxCare Guest Writer

Get started




Linux & Open Source

Subscribe to
our newsletter