Kraken Unveils $3 Million Crypto Heist by Exploiting Zero-Day Flaw
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
“Instead, the ‘security researcher’ disclosed this bug to two other individuals they work with, who fraudulently generated much larger sums. They ultimately withdrew nearly $3 million from their Kraken accounts. This was from Kraken’s treasuries, not other client assets.”
In a surprising turn of events, when approached by Kraken to share their proof-of-concept (PoC) exploit used to create the on-chain activity and arrange the return of the withdrawn funds, they demanded that the company contact their business development team to pay a set amount to release the assets.
“This is not white hat hacking; it is extortion,” Percoco stated, urging the involved parties to return the stolen funds.
Although Kraken did not disclose the name of the company, it said it is treating the security incident as a criminal case and is coordinating with law enforcement agencies on the matter.
“As a security researcher, your license to ‘hack’ a company is enabled by following the simple rules of the bug bounty program you are participating in,” Percoco noted. “Ignoring those rules and extorting the company revokes your ‘license to hack.’ It makes you, and your company, criminals.”
Trending: Offensive Security Tool: SecretOpt1c
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: thehackernews.com