Key Points:
On June 9, the Kraken Bug Bounty program was announced from a researcher highlighting the exploit. Initially, details were scant, but the vulnerability allowed for unauthorized balance increases on the platform without endangering customer assets.
According to Percoco, the issue stemmed from a specific bug that enabled malicious actors to initiate deposits and receive funds without completing the process under certain conditions.
Although Kraken swiftly categorized the vulnerability as “extremely critical,” they acted promptly, resolving the issue within just 47 minutes of its discovery. A comprehensive investigation revealed that the exploit affected three accounts, resulting in the withdrawal of approximately $3 million from Kraken’s own funds, not affecting customer assets.
Percoco emphasized that such vulnerabilities are swiftly addressed, despite occasional false bug reports received under the Kraken Bug Bounty program. Following the incident, Kraken has reinforced its security measures to prevent similar occurrences in the future.
The exchange assured its users that their assets remained secure throughout the incident and reiterated its commitment to maintaining robust security protocols. With the issue fully resolved within hours of detection, Kraken continues to operate without disruption.
DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing. |
George Town, Grand Cayman, 22nd November 2024, Chainwire
Inflation Warning by Vanguard highlights risks during Trump’s term, citing tariffs and tighter labor markets…
Clanker token trading volume hit $59.8M on Nov 21, accounting for 14.75% of PumpFun. Fee…
Bitcoin Spot ETF inflows hit $1.005B on Nov 21, led by BlackRock’s $608M and Fidelity’s…
Discover the success story of a New York tech entrepreneur who made $72M from a…
Discover the best cryptos to buy and hold today: Qubetics leads with 1000x potential, Ethereum…
This website uses cookies.