[ccpw id="39382"]

HomeCrypto NewsMarketKraken Accuses CertiK of Stealing $3 Million in Bug Bounty Program Clash

Kraken Accuses CertiK of Stealing $3 Million in Bug Bounty Program Clash

Date:

Written By:

Follow Us On

Kraken accuses CertiK of exploiting a critical bug to withdraw $3M, while CertiK denies wrongdoing, highlighting Kraken’s security vulnerabilities.

In a security update on June 19, Kraken’s Chief Security Officer, Nick Percoco, accused CertiK of stealing $3 million from a white-hat bug bounty operation. The dispute arose after a security researcher reported a critical vulnerability to Kraken, leading to a heated exchange between the two companies.

- Advertisement -

Bug Discovery and Exploitation

On June 9, 2024, Kraken received an alert about a critical bug allowing artificial balance inflation. Despite frequent fake reports, Kraken’s team took this seriously and quickly identified an isolated bug. 

The flaw permitted malicious deposits to be credited without full completion, posing a risk despite no client assets allegedly being at risk. Kraken’s team triaged and mitigated the issue within 1 hour, 47 minutes.

Further investigation revealed three accounts exploiting this vulnerability, with one linked to the self-identified security researcher. Instead of following protocol, the researcher disclosed the bug to others, resulting in nearly $3 million being fraudulently withdrawn from Kraken’s treasury. 

Kraken requested the return of the funds and full disclosure of the activities, but the researchers refused, demanding a speculative reward instead. Interestingly, these researchers were affiliated with CertiK.

- Advertisement -

CertiK’s Response and Accusations

CertiK responded to Kraken’s accusations by disclosing their findings. They highlighted critical vulnerabilities in Kraken’s deposit system that could lead to massive financial losses. CertiK’s testing revealed that fabricated deposits and withdrawals were possible without triggering Kraken’s risk controls.

CertiK accused Kraken of threatening its employees to repay mismatched amounts of crypto within an unreasonable time frame, without providing repayment addresses. 

In a move to protect the Web3 community, CertiK decided to publicly share their findings and announced the transfer of funds to an account Kraken could access. CertiK emphasized that no real user assets were involved in their testing.

Industry Reactions and Ongoing Dispute

Adam Cochran, a blockchain expert, weighed in on the situation, criticizing CertiK’s actions and labeling them as criminal. He speculated on a potential conspiracy involving CertiK and North Korean entities, alleging they conduct cheap audits and allow subsequent exploits. 

Cochran also noted that CertiK moved funds through the US-sanctioned Tornado Cash, questioning their ethics as a US-domiciled company.

Meanwhile, a commenter on X defended CertiK, noting that the firm had run extensive tests, including on Kraken’s internal alert system, and paid back the funds. The commenter suggested Kraken should be thankful for the free security penetration test they received. 

Disclaimer: This content is informational and should not be considered financial advice. The views expressed in this article may include the author's personal opinions and do not reflect The Crypto Basic’s opinion. Readers are encouraged to do thorough research before making any investment decisions. The Crypto Basic is not responsible for any financial losses.

Author

Zabi
Zabi
Zabi is crypto enthusiastic with more than 10 years of experience in managing Google News-approved Finance websites. Zabi has a strong background in finance with a thorough understanding of cryptos and a solid grip on the crypto and financial market industry. Along with his passion for crypto writing, Zabi manages his personal stock and finance-related Google News-approved websites.

More from Author

Latest Stories

Guides