The Kraken website rejects submissions to scams and hackers who threaten to release customer data


Kraken confirmed on Monday that it had been tested by a criminal group with internal videos containing customer data, and the cryptocurrency trading platform made clear its refusal to comply with their demands.

Nick Percoco, the company’s head of security, revealed the threat through X on April 13, 2026, explaining that the company is working with the authorities in several places to track down and arrest the perpetrators.

This rejection is the right choice and a reading indicator at a time when trust in trading platforms is fragile.

Important points:

  • What was stolen: Access to internal systems containing customer data through internal recruitment; The system was not completely compromised, and customer funds were not at risk, according to Kraken.
  • Size: The data of about 2,000 people were viewed, which represents about 0.02% of all Kraken users; All users are connected.
  • Black method: Hackers are threatening to release videos of Kraken’s internal operations and distribute portions of customer data to media and social media unless their demands are met.
  • Red Crackin: Percoco said publicly, “We will not pay these criminals; we will not negotiate with criminals,” and emphasized the involvement of federal law enforcement.
  • Outbound process: An incident in February 2025 involved a similar crime scene video; In both cases, someone from the company was identified.
  • Section issues: Wrench attacks on crypto companies have increased by 75% per year, CertiK reports that more than $40 million in confirmed losses from these attacks last year.
  • Observations: Will the investigation lead to arrests, and how will Kraken’s IPO delay help its reputation after its second consecutive bankruptcy.

How the Kraken hack and hacking process was done

This operation was not performed due to protocol accident or theft. The legacy of both the February 2025 event and the recent threat was through internal recruitment; Where people were insulted within the organization Kraken By providing access to internal systems, allowing for review work rather than complete hacking.

Access appears to have been limited to read-only, which was enough to capture customer data on video without triggering the active interface.

Percoco confirmed that Kraken received information about the video showing customer information from its internal crypto system, the same method used in the February 2025 case, where a similar video appeared in court.

In both cases, an insider was identified as being involved. The hackers are threatening to distribute the videos and customer communications to local radio and television stations unless Kraken complies. The exact amount of money required for the fraud has not been disclosed publicly.

Percoco described this strategy as deliberate and dangerous, saying: “We have been cooperating with industry partners and law enforcement officials to investigate and disrupt recruitment activities targeting not only crypto companies, but also gaming and communications organizations.”

This isn’t just a waste of opportunity, it’s a way to connect people to a service that works at a price point, and Kraken making this clear is an important way for all companies to respond.

Reports indicate that Crypto theft vectors are increasingly focusing on access and infrastructure rather than exploiting network software vulnerabilities.Recruiting falls within these risks.

What user data is disclosed and what are the consequences?

Kraken has not publicly identified the categories of data captured in the videos, whether “know your customer” (KYC), wallet addresses, transaction history, or account metadata.

But what has been confirmed is that around 2,000 people have been exposed, and Kraken said it has already contacted everyone at risk. Access was read only, and internal systems were not compromised in the details of the massive data leak.

The risk of affected users is not account takeover, where there is no money to be found, but it is focused on technical and physical features.

With names, addresses, and account data in the hands of hackers, the affected users became the target of the company’s targeted attacks. TRM imageswhich resulted in a loss of more than $40 million last year.

This number may be lower, due to the underreporting of such incidents. Kraken’s move to meet affected users is the right thing to do; However, it has not yet been determined whether this communication included specific security instructions, suggestions for using physical security keys, changing addresses, or increased vigilance.

A note The Kraken website rejects submissions to scams and hackers who threaten to release customer data appeared for the first time Cryptonews Arabic.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *