Last 2 weeks, the hottest crypto market topic was the KuCoin Hack. Our team highly values the need for user awareness of such threats, so here is a presentation of the research that was carried out by our specialists. Nevertheless, the issue of preventing such situations is of greater importance at the moment. Our experts have prepared recommendations on what to pay attention to and what to do to avoid such attacks.
On September 25, 2020, the cryptocurrency exchange KuCoin was hacked. The estimated stolen cryptocurrency amount is more than $275 million in various cryptocurrencies.
On the official website, the KuCoin team explained that the hack was made because of a leakage of the private keys of KuCoin hot wallets. As a result, 1,008 BTC was stolen, along with 14,713 BSV, 26,733 LTC, 9,588,383 XLM, Omni, and EOS-based tether (USDT) worth $14 million, $153 million in ether and ERC20s, and over 18 million XRP.
All stolen USDT tokens have been blocked by the Tether team. Blocking is good for such hack cases. Thanks to these procedures, the exchange has already been able to return funds equivalent to $64 million. Nevertheless, it contradicts the main idea of cryptocurrencies, namely decentralization. For example, your bitcoins cannot be blocked in any way.
The hacker made withdrawals from the KuCoin hot wallets to the following addresses:
As we found out from the transactions, the hacker sold the stolen cryptocurrency from the above addresses on decentralized exchanges like Uniswap and anonymized the stolen cryptocurrencies through the mixing services. A key advantage of Uniswap, a decentralized exchange, is that it enables users to retain full custody of their digital assets when exchanging them. However, hackers took advantage of its pros and misused the service platform.
The fact that a hacker uses decentralized exchanges negatively affects their reputation but at the same time confirms their reliability. Uniswap is completely decentralized and is a reliable service for exchanging cryptocurrencies. Everyone can exchange cryptocurrency without fear of blocking.
Why could the hack have happened?
Malicious actions of responsible employees. This could have been done by someone from the exchange staff who had the appropriate access.
Attack on web infrastructure. An attacker could gain access to the exchange’s hot wallet services. Nevertheless, we consider such a version unlikely.
Social engineering attack. Hackers could obtain access to private keys as a result of a phishing attack by using exploits, viruses, and backdoors on employees who had access to private keys.
According to the twitter of Johny Lyu, the Kucoin team has found the suspects of the security incident. However, no specific reason was given.
Will KuCoin cover the losses?
Despite the exchange claiming to reimburse all losses to users, we can see that there are not enough funds on the identified KuCoin wallets to pay off the losses caused by the hack. In addition, the exchange did not have a secure asset fund from which to recover losses. Perhaps these funds are kept in bank accounts of the exchange or in “secret” wallets, but we do not have such information.
The KuCoin exchange hack showed us that some exchanges have to pay more attention to common security standards. Some respectable exchanges have already passed SOC-2 audits. SOC 2 examination on an annual basis demonstrates that an exchange cares about the safeguarding of its clients’ data and deposits.
Regardless of the reason for the hack, we recommend that exchanges adhere to generally accepted rules for storing client funds and perform regular audits.
Also, we can see that a hacker decided to exchange stolen cryptocurrencies on DEX services such as Uniswap. Unlike centralized exchanges, DEXs can’t block their users’ funds — only specific projects can block their tokens (for example Tether). We feel that this increases user confidence in the reliability of decentralized services.
share via social
Subscribe to our research
Enter your email address to subscribe to Hacken Reseach and receive
notifications of new posts by email
On 27th October 2022, Team Finance lost $14.5 million due to a smart contract exploit in its migration function. The “v2 to v3 migration function” – the one that caused the exploit – was added a few months after the audit completion by Hacken. After they added the “migrate” functionality, Team Finance chose Zokyo as
The internet revolution has presented the world with Web3, the third iteration of a constantly evolving ecosystem. Also known as decentralized web, Web3 ecosystems are designed to replace centralized infrastructure and allow every user to maintain complete control over the data, irrespective of whether they are interacting with an application or another user. The Web3
Modern businesses are focused on choosing the new competitive strategies to dominate the market in the coming decade. Turning to Web3 may constitute their jump to new heights. But why have we assumed that Web 3.0 is an inevitable future? What big benefits does it provide to businesses and common people? And what about security,