Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    InfoSec News Nuggets 04/23/2026

    April 23, 2026

    Debian DSA-6227-1 strongswan Critical Infinite Loop Crash Issues

    April 23, 2026

    SSA-339694 V1.0: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2

    April 23, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Crypto-exchange Kraken extorted by hackers after insider breach
    News

    Crypto-exchange Kraken extorted by hackers after insider breach

    adminBy adminApril 14, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Crypto-exchange Kraken extorted by hackers after insider breach

    The Kraken cryptocurrency exchange announced that a cybercrime group is trying to extort the company by threatening to release videos showing internal systems that host client data.

    The company’s Chief Security Officer, Nick Percoco, stated that the incident did not put client funds at risk and involved an insider threat, with two instances of improper access to limited customer data by support employees.

    Kraken says that it will not pay or negotiate with the threat actor.

    Wiz

    “We are currently being extorted by a criminal group threatening to release videos of our internal systems with client data shown if we do not comply with their demands,” stated Percoco.

    “It’s important to start with the most important points: our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors.”

    Tweet

    Kraken is a U.S.-based cryptocurrency exchange that enables millions of users across 190 countries to buy, sell, and trade digital assets such as Bitcoin, Ethereum, and 200 others.

    It is considered one of the largest and most established exchanges, with a daily trading volume of hundreds of millions of U.S. dollars.

    Following a “tip from a trusted source” in February 2025 about cybercriminals circulating a video demonstrating access to its client support systems, Kraken initiated an investigation and uncovered a support employee recruited by the threat actor.

    More recently, Kraken received a tip about another, more recent video showing insider access to its systems.

    In both cases, the company reacted quickly by revoking the employee’s access, launching investigations, and strengthening controls. Where user exposure was identified, Kraken notified affected users directly.

    According to Percoco, the incident affects only about 2,000 accounts, which represents 0.02% of Kraken’s user base. For this small subset, the exposed information reportedly only concerns client support data.

    Kraken stated that its investigation has gathered enough evidence to legally prosecute all involved individuals attempting to blackmail them, and the company is closely working with federal law enforcement across multiple jurisdictions towards this goal.

    Insider threats and malicious recruitment are a broader problem impacting multiple industries, and especially the cryptocurrency sector.

    In mid-2025, it was revealed that another major American cryptocurrency exchange, Coinbase, suffered a data breach after hackers bribed employees of an India-based customer support agency to disclose to them private client support information.

    In that case, the incident impacted 70,000 customers, with Coinbase estimating the total financial damages to be $400 million.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTenable security advisory (AV26-354) – Canadian Centre for Cyber Security
    Next Article Adobe security advisory (AV26-353) – Canadian Centre for Cyber Security
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/23/2026

    April 23, 2026
    News

    Protected: Review of Operational Collaboration between the Communications Security Establishment (CSE) and the Canadian Security Intelligence Service (CSIS): Report – HTML

    April 23, 2026
    News

    Executive Summary: Defending against China-nexus covert networks of compromised devices

    April 23, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202636 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202636 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    InfoSec News Nuggets 04/23/2026

    April 23, 2026

    Debian DSA-6227-1 strongswan Critical Infinite Loop Crash Issues

    April 23, 2026

    SSA-339694 V1.0: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2

    April 23, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.