Last week, the hottest topic in the crypto markets was the KuCoin hack. Our team highly values the need for increasing user awareness of such threats, so beyond research into the specifics of the hack itself, we have also included recommendations on how to prevent similar situations in the future.
On September 25, 2020, cryptocurrency exchange KuCoin was hacked. The estimated stolen cryptocurrency amount is more than $275 million in various cryptocurrencies.
On their official website, the KuCoin team explained that the hack was due to a leak of the KuCoin hot wallet private keys.
The following cryptocurrencies were stolen:
The Tether team was able to block all of the stolen USDT, which some consider is a good way to deal with cases of hacked or stolen coins. Thanks to Tether’s blocking, KuCoin has already been able to return funds equivalent to $64 million. However, Tether’s ability to block transactions has been seen by others as antithetical to the core values of cryptocurrencies, since blocking transactions exposes the centralization in the Tether protocol. Bitcoin transactions, on the other hand, cannot be blocked,
The hacker made withdrawals from the KuCoin hot wallets to the following addresses:
As we found out from the transactions, the hacker sold the stolen cryptocurrency from the above addresses on decentralized exchanges like Uniswap and anonymized the stolen cryptocurrencies through mixing services. A key advantage of Uniswap, a decentralized exchange, is that it enables users to retain full custody of their digital assets when exchanging them. However, hackers took advantage of the fact that there is no single point of authority that could block them from using the platform and were able to launder the stolen funds.
The fact that a hacker uses decentralized exchanges negatively affects their reputation but at the same time confirms their reliability. Uniswap is completely decentralized and is a reliable service for exchanging cryptocurrencies. Everyone can exchange cryptocurrency without fear of their transactions being blocked.
How Did the Hack Happen?
According to KuCoin CEO and co-founder Johnny Lyu on Twitter, the Kucoin team has found suspects, but no more information was given beyond that law enforcement is involved.
Will KuCoin Cover the Losses?
Despite the exchange claiming to reimburse all losses to users, we can see that there are not enough funds on the identified KuCoin wallets to pay off the losses caused by the hack. In addition, the exchange did not have a secure asset fund from which to recover losses. It is possible that these funds are kept in bank accounts of the exchange or in “secret” wallets, but we do not have such information.
Who Is at Risk?
Since the KuCoin hack was due to leaked information about hot wallets, we consider exchanges that store large amounts of funds in hot wallets to be at risk of a similar attack. The following list includes some of the exchanges that rely on hot wallets:
How to Avoid Hacks in the Future?
Perform audits of the cryptocurrency storage system that is included in SOC2 and/or ISO27000 auditing procedures: https://gemini.com/blog/gemini-completes-soc-2-review-a-worlds-first-for-a-cryptocurrency-exchange-and-custodian
CER.live Downgrades KuCoin.
Because of the security incident, CER.live has now downgraded KuCoin from 6th place to 24th.
CER provides a fundamental analysis of the cryptocurrency exchange market. Through continuous cyber-forensic investigations and in-depth ranking methodology, CER has gained crypto traders’ trust as the only unbiased platform for crypto exchange reliability checks.
CER.live is integrated into one of the largest crypto-related analytical websites, CoinGecko, and is a member of all major crypto transparency alliances, including the Data Transparency and Accountability Alliance, run by CoinMarketCap.
The KuCoin exchange hack showed us that some exchanges have to pay more attention to common security standards. Some respectable exchanges such as U.S.-based Gemini, Coinbase and custody service provider Bitgo have already passed SOC-2 audits. SOC 2 examination on an annual basis demonstrates that an exchange cares about the safeguarding of its clients’ data and deposits.
Regardless of the reason for the hack, we recommend that exchanges adhere to generally accepted rules for storing client funds and perform regular audits.
With regards to cyber criminals using DEXs to launder stolen funds, while not being able to freezer funds increases user confidence in the truly decentralized nature of these types of platforms, it also means that it’s much easier for malicious hackers to move ill-gotten goods without any problems. This is something that will need to be addressed soon if DEXs are to continue being used in this space.”
Leading global blockchain news provider. A blockchain, originally block chain, is a growing list of records, called blocks, that are linked using cryptography.