$1 for keys? A post on the dark web claims to sell official access to Kraken



Threat actors sell read-only privileges to Kraken’s internal admin panel in a forum on the dark web.

The incident raises concerns about the potential exposure of user data and the risk of phishing attacks.

Sponsored

Sponsored

Admin panel for sale: Dark web claims question Kraken’s security

According to Dark Web Informer, the listing offers the ability to view user files, transaction history and complete KYC documents. These cards include ID, selfie, address proof and funding source information.

The vendor claims that access can last from one to two months, is a proxy without intellectual property restrictions, and includes the ability to create support tickets.

The listing raised immediate concerns among security professionals, although some online users remain skeptical.

“Probably fake”, He said A user, citing uncertainty about the authenticity of access.

Others warn that if the data leak is true, it could expose Kraken’s customers to significant risks, and urge the exchange and law enforcement to urgently investigate.

“If this is real, it poses a significant risk of data exposure and phishing for Kraken’s customers. Kraken’s security and enforcement teams need to be alerted to this immediately.” He added last

Sponsored

Sponsored

In fact, this feature can be exploited Social engineering attacks Very convincing. Kraken did not immediately respond to BeInCrypto’s request for comment.

Read-only access is not harmless: CIFER reveals the dangers of exposure to the Kraken table

CIFER Security emphasizes that even read-only access can have serious consequences. While attackers cannot directly modify accounts, they can leverage the support ticket functionality to:

  • plagiarism Kraken staff character,
  • Refer to real transaction details to gain trust, and
  • Target high value users identified through transaction history.

Complete access to business patterns, wallet addresses, and deposit or withdrawal behavior provides intelligence to threat actors To launch phishing attacksexchange of chips, and filling of credentials, extending the threat beyond the exposure of the account.

Sponsored

Sponsored

Management committee grants are nothing new in the cryptocurrency industry. You meet exchanges like Mt. Gox (2014), Binance (2019), KuCoin (2020), Crypto.com (2022), and FTX (2022) All are attacks aimed at internal systems. This highlights that centralized tools with elevated privileges are always prime targets.

Kraken’s reported exposure is consistent with this broader pattern, which highlights the ongoing challenge of securing privileged access in the financial services sector.

What should Kraken users do?

CIFER Security recommends assuming the potential exposure and taking immediate protective measures. These include:

  • Enable hardware key authentication,
  • Enable general settings locks,
  • Whitelist cloud addresses, and
  • Use extreme caution when responding to support communications.

Sponsored

Sponsored

Users should also watch for signs of chip swap attacks, suspicious password resets and other targeted threats, and consider moving significant assets to Hardware wallets Or new addresses that are not visible in potentially leaked transaction logs.

The incident highlights the dangers inherent in central custody. Exchanges, by design, centralize sensitive customer data in admin dashboards, creating single points of failure.

as well as Pointing CIFER, stronger architectures rely on role-based access, just-in-time permissions, data obfuscation, session logging, and no static permissions to reduce the blast radius in the event of a breach.

If the reports are accurate, Kraken faces an urgent need to determine the source of access, whether from compromised credentials, internal actions, external vendors, or session hijacking.

Again, if true, possible precautions include rotating all administrator credentials, auditing access logs, and transparent communication with users.

A quick and transparent response can help maintain trust in an environment where the risks of centralization intersect with the decentralized promise of cryptocurrencies.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *