Kraken Fights Back: Internal Extortion Threatens 2,000 Accounts, But Ransom Refused!

Kraken refuses ransom after internal extortion attempt hits 2,000 accounts

Kraken successfully defended against an extortion attempt after a limited data leak affected around 2,000 user accounts due to unauthorized internal access. However, they confirmed there was no widespread system breach and customer funds remain safe.

Summary

  • Kraken says it is being extorted by a criminal group threatening to leak videos of internal system access but insists there was no systemic breach and no client funds at risk.
  • The exchange links the incident to improper access by people tied to its customer support team that touched data on about 2,000 accounts, roughly 0.02% of users.
  • Chief security officer Nick Percoco says Kraken has cut off access, notified affected users and is working with law enforcement as “internal infiltration + social engineering” attacks grow.

Kraken, a cryptocurrency exchange, says it’s being threatened with blackmail. A criminal group claims to have videos proving they accessed the company’s internal systems, but Kraken refuses to pay a ransom and insists customer funds are secure. According to a statement reported by CoinDesk, Kraken says there was no major security breach of its trading systems or wallets. They describe the incident as someone misusing limited internal access, not a successful hack of their main systems.

Kraken recently experienced a security issue affecting about 2,000 accounts – less than 0.02% of its total users. This happened because of unauthorized access by people connected to Kraken’s customer support team in two separate incidents. Affected users have been informed, and those responsible have lost access to Kraken’s systems. Kraken is now strengthening its security measures and how it monitors access.

Internal infiltration, social engineering and Kraken’s response

Kraken’s chief security officer, Nick Percoco, stated the company is handling the new threats as a crime and is working with law enforcement. Percoco, who previously described a similar $3 million incident as extortion rather than ethical hacking, said Kraken has enough evidence to help identify and arrest those responsible. He emphasized that Kraken will not pay or negotiate with anyone trying to profit from unauthorized access to their systems.

The company reports a growing trend of attacks that combine getting inside a company through employees with social engineering. Instead of directly hacking secure systems where digital assets are stored, attackers are focusing on compromising or recruiting people who work for service organizations. This allows them to gain limited access – like viewing customer data or getting internal information – rather than directly stealing funds. Earlier this year, claims of being able to access sensitive data from Kraken for just $1 raised similar concerns. While Kraken didn’t confirm a security breach, experts warned that even limited access to internal tools could be used for phishing attacks and scams.

This latest hacking attempt follows a March incident where a user on Kraken lost around $18.2 million worth of cryptocurrency (7,784 ETH and 26.5 BTC) due to a clever social engineering attack. The stolen funds were then moved to HitBTC, highlighting the various security risks faced by both cryptocurrency platforms and their users. As experts at EmberCN and others have pointed out, even if an exchange’s main funds are secure, weaknesses in how people manage access or users protect their own information can still lead to significant financial losses and damage the exchange’s reputation.

This recent incident is a major test for Kraken’s security practices, which they’ve consistently emphasized – including requiring two-factor authentication, supporting hardware keys, and regularly sharing account security advice from their CEO. More broadly, it’s a reminder for the entire industry that the biggest threats aren’t always complex software vulnerabilities. Often, the greatest risks come from internal access issues, mistakes made by people, and traditional methods of blackmail, especially when a single stolen login could lead to massive financial losses.

Read More

2026-04-13 22:06