Unchained Capital ActiveCampaign Privacy Breach: Difference between revisions

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Jump to navigation Jump to search
No edit summary
(Another 30 minutes complete. All sources merged in. Prevention added. Information relocated around.)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Imported Case Study 2|source=https://www.quadrigainitiative.com/casestudy/unchainedcapitalactivecampaignprivacybreach.php}}
{{Case Study Under Construction}}[[File:Unchainedcapital.jpg|thumb|Unchained Capital]]Unchained Capital is a bitcoin custody service which assists individuals in setting up multi-signature wallets. For marketing, they used a customer relationship management tool called ActiveCampaign. In February 2022, they closed down their account and requested all data to be deleted. However, the following month, fraudsters impersonated them and succeeded in reopening the account. This gave the fraudsters access to all the contact information of different customers that had been stored in the platform.
{{Unattributed Sources}}
 
[[File:Unchainedcapital.jpg|thumb|Unchained Capital]]Unchained Capital is a bitcoin custody service which assists individuals in setting up multi-signature wallets. For marketing, they used a customer relationship management tool called ActiveCampaign. In February 2022, they closed down their account and requested all data to be deleted. However, the following month, fraudsters impersonated them and succeeded in reopening the account. This gave the fraudsters access to all the contact information of different customers that had been stored in the platform.


Unchained Capital appears to have been transparent around which information was leaked and how the events unfolded. They have advised customers to be vigilantly looking out for any spear-phishing attempts using their stolen data.
Unchained Capital appears to have been transparent around which information was leaked and how the events unfolded. They have advised customers to be vigilantly looking out for any spear-phishing attempts using their stolen data.


This exchange or platform is based in United States, or the incident targeted people primarily in United States.<ref name="zub79twitter-8593" /><ref name="21millonesbtctwitter-8594" /><ref name="unchained-8595" /><ref name="unchained-8596" /><ref name="coindesk-8597" /><ref name="unchained-8598" /><ref name="thecoinnews-8599" /><ref name="bitcoinmagazine-8600" />
== About Unchained Capital ==
<ref name="unchained-8595" /><ref name="unchained-8596" />


== About Unchained Capital ==
"Established at block height 433179, Unchained Capital is the world’s premier bitcoin financial services company." "We make it easy for you to get the most from your bitcoin while holding your own keys." "Secure your bitcoin with multisig keys that you control." "Multisig vaults for teams with granular access permissions."
"Established at block height 433179, Unchained Capital is the world’s premier bitcoin financial services company." "We make it easy for you to get the most from your bitcoin while holding your own keys." "Secure your bitcoin with multisig keys that you control." "Multisig vaults for teams with granular access permissions."


Line 18: Line 15:


"Ensuring the privacy of our clients is critical to our business as is transparency around the information we collect and the associated risks. We want our customers to not only be informed about the value and services we deliver but also potential tradeoffs. Prior to using our services, we recommend all potential clients review our materials on privacy and security and please reach out to us with any questions."
"Ensuring the privacy of our clients is critical to our business as is transparency around the information we collect and the associated risks. We want our customers to not only be informed about the value and services we deliver but also potential tradeoffs. Prior to using our services, we recommend all potential clients review our materials on privacy and security and please reach out to us with any questions."
== About ActiveCampaign ==
ActiveCampaign is a customer relationship management tool.


"Most individuals don’t understand the power of a CRM. At minimum, these tools allow companies to acquire, sort and manage incoming customers (and their data) in a way that provides the best user experience. At maximum, these tools are capable of an extreme degree of web monitoring and AI-based user segmentation and prediction."
"Most individuals don’t understand the power of a CRM. At minimum, these tools allow companies to acquire, sort and manage incoming customers (and their data) in a way that provides the best user experience. At maximum, these tools are capable of an extreme degree of web monitoring and AI-based user segmentation and prediction."


"ActiveCampaign (“AC”) [was] a third-party email marketing provider that Unchained Capital used." "Unchained Capital used AC until February 2022 to support [their] marketing and sales functions. As a result, limited data was shared with AC depending on the nature of services clients or prospective clients were interested in or used." "For clients, this data included: email addresses, usernames, account status (active/inactive) and whether the client had an active vault or loan with Unchained Capital (yes or no)." "For individuals that purchased a service directly through our website, such as Concierge Onboarding, scheduled a consultation, or signed up on our website for updates and our newsletter, this data included: their name, email address, and IP address (but no shipping addresses were ever stored in AC)."
"ActiveCampaign (“AC”) [was] a third-party email marketing provider that Unchained Capital used." "Unchained Capital used AC until February 2022 to support [their] marketing and sales functions. As a result, limited data was shared with AC depending on the nature of services clients or prospective clients were interested in or used."  
 
== The Reality ==
While Unchained Capital was no longer using the Active Campaign platform, the information remained stored there.
 
=== Failed Attempt To Delete Information ===
When leaving the Active Campaign platform, Unchained Capital had requested that their customer information be deleted, however this was not done<ref name="unchained-8598" />.
 
The information included "email addresses, usernames, account status (active/inactive) and whether the client had an active vault or loan with Unchained Capital (yes or no)"<ref name="unchained-8598" />. In addition, "[f]or individuals that purchased a service directly through [the Unchained Capital] website, such as Concierge Onboarding, scheduled a consultation, or signed up on [their] website for updates and our newsletter, this data included: their name, email address, and IP address (but no shipping addresses were ever stored in AC)."<ref name="unchained-8598" />
 
== What Happened ==
Information on Unchained Capital customers was stored on Active Campaign. Shortly after the relationship was severed, malicious actors claiming to be Unchained Capital convinced Active Campaign staff to reopen the account, providing them with access to the customer data.
{| class="wikitable"
|+Key Event Timeline - Unchained Capital ActiveCampaign Privacy Breach
!Date
!Event
!Description
|-
|March 10th, 2022
|Main Event
|Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.
|-
|March 16th, 2022 12:58:12 PM MDT
|Unchained Capital Announcement
|Unchained Capital posts an announcement to their website<ref>[https://web.archive.org/web/20220316185812/https://unchained.com/blog/email-marketing-data-leak-notice/ Notice of data leak by email marketing provider impacting clients - Unchained Capital Archive March 16th, 2022 12:58:12 PM MDT] (Apr 25, 2023)</ref>. The attack on the former vendor, ActiveCampaign, a third-party email marketing provider, resulted in the compromise of Unchained Capital client and marketing data, including email addresses, usernames, account status, client name, and IP address. The firm emphasized that there was no impact on Unchained Capital’s systems, nor were client assets secured through its platform ever at risk. Clients were advised to be vigilant for spear-phishing attempts and confirmed communications with the firm. The attack on Unchained Capital comes amid a rising number of cyber threats to financial firms<ref name="unchained-8598" />.
|-
|March 16th, 2022 4:04:00 PM MDT
|Reported on CoinDesk
|The incident is reported on CoinDesk<ref name="coindesk-8597" />. TBD different versions.
|-
|March 17th, 2022 8:20:00 AM MDT
|CoinDesk Article Updated
|TBD what updates?<ref name="coindesk-8597" />
|-
|March 18th, 2022 6:54:00 PM MDT
|Praised on Twitter
|The breach is publicly praised on Twitter by a user Zub79, responding about the [[BlockFi Hubspot Data Breach|BlockFi data breach]]<ref name="zub79twitter-8593" />.
|-
|March 18th, 2022 10:50:00 PM MDT
|Another Twitter Reference
|The breach is referenced<ref name="21millonesbtctwitter-8594" />.
|-
|March 21st, 2022 7:14:49 AM MDT
|Bitcoinist Article Published
|Bitcoinist publishes an article comparing and contrasting the privacy breach against others<ref>[https://web.archive.org/web/20220321131449/https://bitcoinist.com/data-leak-unchained-capital-nydig-swan-blockfi/ Data Leak At Unchained Capital, NYDIG, Swan & BlockFi. At The Same Time - Bitcoinist Archive March 21st, 2022 7:14:49 AM MDT] (Apr 25, 2023)</ref>. In addition to Unchained Capital, NYDIG, Swan Bitcoin, and BlockFi, also recently suffered a data breach through their third-party providers. Although the companies all made public apologies and addressed the issue, the blame was shifted to the third-party vendors. Fortunately, the data stolen was mostly marketing-driven personal information rather than critical financial data. The companies urged affected clients to be extra vigilant and avoid clicking on any links to protect themselves from spear phishing attempts. The four companies have all said they are working with their third-party vendors and looking to move away from using vendors for email<ref name="thecoinnews-8599" />.
|-
|March 21st, 2022 5:05:26 PM MDT
|Bitcoin Magazine Article
|Bitcoin Magazine publishes an article on the Hubspot data breach<ref>[https://web.archive.org/web/20220321230526/https://bitcoinmagazine.com/business/how-hubspot-data-breach-hits-bitcoiners How HubSpot Data Breach Hits Bitcoiners - Bitcoin Magazine Archive March 21st, 2022 5:05:26 PM MDT] (Apr 25, 2023)</ref>. They report the unauthorized user with "super admin" access exported contact lists and data, including IP addresses, email histories, customer browsing behavior, financial value, and help tickets. While financial data was not compromised, the loss of user persona and behavioral data is severe, and users should expect spear phishing and spam attacks. Users are advised to be cautious of unsolicited communications and to use privacy best practices when browsing, buying, and communicating online<ref name="bitcoinmagazine-86002">[https://bitcoinmagazine.com/business/how-hubspot-data-breach-hits-bitcoiners How HubSpot Data Breach Hits Bitcoiners - Bitcoin Magazine - Bitcoin News, Articles and Expert Insights] (Jul 19, 2022)</ref>.
|}
 
== Technical Details ==
Information on Unchained Capital customers was stored on the Active Campaign customer relationship management platform. Shortly after the relationship was severed, malicious actors claiming to be Unchained Capital convinced Active Campaign staff to reopen the account, providing the malicious actors with access to export the customer data.
 
Upon discovering the
 


On March 10th, "ActiveCampaign (“AC”) was the subject of a social engineering attack." "The attack was conducted through a live chat tool on AC’s public website, which did not require any user authentication, on Thursday March 10th between approximately 8-9am CST."
On March 10th, "ActiveCampaign (“AC”) was the subject of a social engineering attack." "The attack was conducted through a live chat tool on AC’s public website, which did not require any user authentication, on Thursday March 10th between approximately 8-9am CST."
Line 29: Line 84:
"The social engineering attack took place on the AC platform, and involved AC personnel, procedures, systems and applications." "[O]nly information shared with AC – client email addresses, usernames, account status, whether the client had an active multisig vault or loan with Unchained Capital and possibly IP addresses – may have been exported without authorization." "This attack occurred after Unchained Capital had closed its AC account and requested that all data be purged."
"The social engineering attack took place on the AC platform, and involved AC personnel, procedures, systems and applications." "[O]nly information shared with AC – client email addresses, usernames, account status, whether the client had an active multisig vault or loan with Unchained Capital and possibly IP addresses – may have been exported without authorization." "This attack occurred after Unchained Capital had closed its AC account and requested that all data be purged."


"Though [Unchained] had requested this data be deleted, it was not. Unfortunately, we only learned that AC had not deleted this data after discovering the social engineering attack. Within 20 minutes of the attack, an Unchained Capital administrator received emails with the fraudulent chat transcripts and took immediate measures to restrict further access. After the attack was identified, Unchained Capital worked to gather these relevant facts. Ultimately, on Tuesday, March 15th, AC confirmed unauthorized access did occur and that the attacker was able to export the data described above."
== Total Amount Lost ==
No funds are believed to have been lost in this situation.
 
== Immediate Reactions ==
 


"In an email to clients and a letter posted on the company website on Wednesday [a week after the attack], Unchained Capital CEO Joe Kelly said ActiveCampaign (AC), an outside email marketing provider used by Unchained until earlier this year, was hit with a social engineering attack."
"In an email to clients and a letter posted on the company website on Wednesday [a week after the attack], Unchained Capital CEO Joe Kelly said ActiveCampaign (AC), an outside email marketing provider used by Unchained until earlier this year, was hit with a social engineering attack."
Line 45: Line 104:
"While we minimize the need for trust in the ultimate security of client funds through our approach to custody, our clients still put an immense amount of trust in us to protect their privacy and to ensure these incidents do not occur. As bitcoiners and clients of Unchained Capital ourselves, we have taken on these responsibilities with a clear understanding of the weight of our obligations. While we carry the gravity of this disclosure and security incident with us, we will learn from mistakes and strive to do better."
"While we minimize the need for trust in the ultimate security of client funds through our approach to custody, our clients still put an immense amount of trust in us to protect their privacy and to ensure these incidents do not occur. As bitcoiners and clients of Unchained Capital ourselves, we have taken on these responsibilities with a clear understanding of the weight of our obligations. While we carry the gravity of this disclosure and security incident with us, we will learn from mistakes and strive to do better."


This exchange or platform is based in United States, or the incident targeted people primarily in United States.
=== Unchained Capital Announcement ===
Unchained Capital announced the breach with a detailed announcement on their website.<blockquote>We are letting our clients and community know about a security incident that occurred at one of the vendors we previously used for email marketing, resulting in the compromise of Unchained Capital client and marketing data detailed below. Importantly, there is no impact whatsoever to Unchained Capital’s systems, nor were client assets secured through our platform ever at risk.
 
ActiveCampaign (“AC”), a third-party email marketing provider that Unchained Capital used until early in 2022, was the subject of a social engineering attack last week. This attack occurred after Unchained Capital had closed its AC account and requested that all data be purged. While the attack occurred on a third party, it has impacted our clients and it was ultimately the result of our decision to work with this vendor. Regardless of any failures by third parties, we are accountable to our clients in all cases. In this instance, we have let them down and it is necessary that we share details of the security incident which occurred on Thursday, March 10th.
 
'''What information was NOT compromised'''


The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.
The social engineering attack took place on the AC platform, and involved AC personnel, procedures, systems and applications. None of Unchained Capital’s systems, applications, employees, or accounts (admin or client) were compromised. Because none of Unchained Capital’s systems were compromised, the following information was NOT subject to the compromise: client profile information containing personally identifiable information (e.g. addresses, SSN, DOB, IDs, phone numbers used in our KYC process), bank account numbers, passwords, bitcoin addresses, bitcoin balances, loan balances, trading activity, vault statements, loan statements.


Include:
None of this information was provided to ActiveCampaign and was therefore never subject to compromise through the attack on AC. Given our bitcoin custody is built on multisig and cold storage, through which clients hold their own keys, no funds were ever at risk but it is critical that clients be diligent and on high alert for reasons described below.


* Known history of when and how the service was started.
'''What information was compromised'''
* What problems does the company or service claim to solve?
* What marketing materials were used by the firm or business?
* Audits performed, and excerpts that may have been included.
* Business registration documents shown (fake or legitimate).
* How were people recruited to participate?
* Public warnings and announcements prior to the event.


Don't Include:
Unchained Capital used AC until February 2022 to support our marketing and sales functions. As a result, limited data was shared with AC depending on the nature of services clients or prospective clients were interested in or used. Elements of this data were compromised and exported by an unauthorized user as described below.
* Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
* Anything that wasn't reasonably knowable at the time of the event.
There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.


== The Reality ==
For clients, this data included: email addresses, usernames, account status (active/inactive) and whether the client had an active vault or loan with Unchained Capital (yes or no).
This sections is included if a case involved deception or information that was unknown at the time. Examples include:
 
For individuals that purchased a service directly through our website, such as Concierge Onboarding, scheduled a consultation, or signed up on our website for updates and our newsletter, this data included: their name, email address, and IP address (but no shipping addresses were ever stored in AC).
 
'''What steps clients should consider taking'''
 
It is always important that our clients be diligent about confirming all communications and any requests that appear to come from Unchained Capital. Given the data leak, clients should be on high alert for any spear phishing attempts. Be especially careful about clicking on any links—always ensure that they are HTTPS links to unchained.com. If any email or communication looks suspicious, please contact us at clientservices@unchained.com or call us at 1-844-486-2424 to confirm its authenticity. Please be diligent, and where there is any doubt, it is best to always err on the side of caution and reach out to us for confirmation. Specifically, if clients receive suspicious emails requesting to change passwords, perform any actions to sign transactions or replace any keys that secure your bitcoin, please do not take any such actions and reach out to us immediately. Our client services team and executives are on standby to take calls and answer all questions clients have. We will also be hosting a continuing education webinar on spear phishing and general best practices to avoid any associated risks.
 
'''Details of security incident'''
 
The attack was conducted through a live chat tool on AC’s public website, which did not require any user authentication, on Thursday March 10th between approximately 8-9am CST.
 
An attacker impersonating an Unchained Capital employee socially engineered an AC support chat representative to reactivate Unchained Capital’s account which had been closed on February 17th, 2022. Subsequently, the attacker(s) then socially engineered a second AC support chat representative to add an administrative user using a username and password provided by the attacker. The attacker then gained unauthorized access to the reopened Unchained Capital account without needing a valid email and was able to export data from our previously closed AC account.
 
Though we had requested this data be deleted, it was not. Unfortunately, we only learned that AC had not deleted this data after discovering the social engineering attack. Within 20 minutes of the attack, an Unchained Capital administrator received emails with the fraudulent chat transcripts and took immediate measures to restrict further access. After the attack was identified, Unchained Capital worked to gather these relevant facts. Ultimately, on Tuesday, March 15th, AC confirmed unauthorized access did occur and that the attacker was able to export the data described above.
 
'''Duty to our clients'''
 
Regardless of any actions or failures by third parties, our commitments are to our clients, prospective clients, and partners that put their trust in Unchained Capital and to each of them, we take responsibility. Furthermore, we have an obligation—not an option—to make this disclosure to help ensure the security of our clients regardless of the negative impact it may have on our business.


* When the service was actually started (if different than the "official story").
While we minimize the need for trust in the ultimate security of client funds through our approach to custody, our clients still put an immense amount of trust in us to protect their privacy and to ensure these incidents do not occur. As bitcoiners and clients of Unchained Capital ourselves, we have taken on these responsibilities with a clear understanding of the weight of our obligations. While we carry the gravity of this disclosure and security incident with us, we will learn from mistakes and strive to do better.
* Who actually ran a service and their own personal history.
* How the service was structured behind the scenes. (For example, there was no "trading bot".)
* Details of what audits reported and how vulnerabilities were missed during auditing.


== What Happened ==
'''Working to do better'''
The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.
{| class="wikitable"
|+Key Event Timeline - Unchained Capital ActiveCampaign Privacy Breach
!Date
!Event
!Description
|-
|March 10th, 2022
|Main Event
|Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.
|-
|
|
|
|}


== Total Amount Lost ==
We go to great lengths to secure client data through our internal infrastructure, proprietary applications, and the third parties we rely upon to run our business. We utilize encryption, access control, user management, and are extremely conservative about what information we share with third parties, far more conservative than the standard in our industry. We perform due diligence before engaging any new vendor to process data for us, including a review of any independent security audits (such as SOC II reports), and hold our vendors to a high standard.
The total amount lost is unknown.


How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?
Our high standards for client privacy ensured that we limited the amount of data we shared with ActiveCampaign. But with these same high standards, any exposure of client data is unacceptable to us. We have ensured that this social engineering attack vector is not possible with our current email marketing provider and over the coming weeks, we will be carefully reviewing all security measures and processes including vendor risk management.


== Immediate Reactions ==
We are deeply sorry this incident occurred as we take our client’s privacy very seriously. Our mission is to grow bitcoin adoption and to empower our clients to hold their own private keys, eliminating us or any financial institution as a single point of failure. We want to reinforce the fact that, due to our collaborative custody model, no such incidents could ever put any client funds at risk.</blockquote>
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?


== Ultimate Outcome ==
== Ultimate Outcome ==
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?
TBD
 
"Though [Unchained] had requested this data be deleted, it was not. Unfortunately, we only learned that AC had not deleted this data after discovering the social engineering attack. Within 20 minutes of the attack, an Unchained Capital administrator received emails with the fraudulent chat transcripts and took immediate measures to restrict further access. After the attack was identified, Unchained Capital worked to gather these relevant facts. Ultimately, on Tuesday, March 15th, AC confirmed unauthorized access did occur and that the attacker was able to export the data described above."


== Total Amount Recovered ==
== Total Amount Recovered ==
There do not appear to have been any funds recovered in this case.
There do not appear to have been any funds lost in this case.


What funds were recovered? What funds were reimbursed for those affected users?
== Ongoing Developments ==
TBD
==Individual Prevention Policies==
Most companies have insecurities. Any information provided to a company may be breached or abused.


== Ongoing Developments ==
===Protection Of Personal Information===
What parts of this case are still remaining to be concluded?
Obviously, anything you can do to minimize the amount of information which you provide to websites will reduce your risk.
== General Prevention Policies ==
The situation involved a failure to verify the identity of the account holder, and a failure to remove customer data which was requested to be removed already. Beyond this, access to the entire mailing list was possible for a single employee of the company. Greater security can be achieved when the actual contact information is not directly handled by employees without multi-signature approval, especially to access full mailing lists.
== Individual Prevention Policies ==
{{Prevention:Individuals:Placeholder}}


{{Prevention:Individuals:End}}
{{Prevention:Individuals:Protect Personal Information}}
===Never Give Access To Your Funds===
In a typical cryptocurrency fraud, malicious actors try to use the available information to convince you to give them authorization to access or transfer funds. This can be accomplished via tricking you into providing a private key or seed phrase, signing a transaction that grants them permission to move funds, or installing malware on your device. In most cases, this will be accomplished via a greed or fear trigger, and you should be on extra guard when experiencing those emotions.


== Platform Prevention Policies ==
{{Prevention:Individuals:Never Share Private Keys}}
{{Prevention:Platforms:Placeholder}}


{{Prevention:Platforms:End}}
{{Prevention:Individuals:Always Verify Executables}}


== Regulatory Prevention Policies ==
{{Prevention:Individuals:Store Funds Offline}}
{{Prevention:Regulators:Placeholder}}


{{Prevention:Regulators:End}}
{{Prevention:Individuals:End}}
==Platform Prevention Policies==
The situation involved a failure to verify the identity of the account holder, and a failure to remove customer data which was requested to be removed already. Beyond this, access to the entire mailing list was possible for a single employee of the company. Greater security can be achieved when the actual contact information is not directly handled by employees without multi-signature approval, especially to access full mailing lists.


== References ==
Platforms should put in place multi-signature access control on all customer data, which requires the approval of multiple people to enable the download of data. An external security review should be conducted regularly. If information is lost in a breach, the level of damage can be minimized by educating users about potential scams and frauds that they may encounter. Platforms should be prepared to assist with victims, which could be done through an industry insurance fund.
<references><ref name="zub79twitter-8593">[https://twitter.com/Zub79/status/1504984558005104642 @Zub79 Twitter] (Jun 20, 2022)</ref>


<ref name="21millonesbtctwitter-8594">[https://twitter.com/21Millones_BTC/status/1505043915279319041 @21Millones_BTC Twitter] (Jun 20, 2022)</ref>
{{Prevention:Platforms:Cryptocurrency Safety Quiz}}


<ref name="unchained-8595">[https://unchained.com/ Bitcoin financial services - Unchained Capital] (Jul 14, 2022)</ref>
{{Prevention:Platforms:Implement Multi-Signature}}


<ref name="unchained-8596">[https://unchained.com/about/ About us - Unchained Capital] (Jul 14, 2022)</ref>
{{Prevention:Platforms:Regular Audit Procedures}}


<ref name="coindesk-8597">[https://www.coindesk.com/business/2022/03/16/unchained-capital-discloses-data-leak-at-email-marketing-partner/ Unchained Capital Discloses Data Leak at Email Marketing Partner] (Jul 19, 2022)</ref>
{{Prevention:Platform:Supply Chain Assessment}}


<ref name="unchained-8598">[https://unchained.com/blog/email-marketing-data-leak-notice/ Notice of data leak by email marketing provider impacting clients - Unchained Capital] (Jul 19, 2022)</ref>
{{Prevention:Platforms:Establish Industry Insurance Fund}}


<ref name="thecoinnews-8599">[https://thecoin.news/articles/data-leak-unchained-capital-nydig-swan-blockfi-time-1647882577272 Data Leak At Unchained Capital, NYDIG, Swan & BlockFi. At The Same Time] (Jul 19, 2022)</ref>
{{Prevention:Platforms:End}}
==Regulatory Prevention Policies==
While the best solution is to reduce the amount of information collected, a combination of increased education, improved security, and a collective industry insurance fund can also prevent and mitigate the outcome of a similar data breach.
===Private Identity Key Protocol===
{{Prevention:Regulators:Private Identity Key Protocol}}
===Increased Education For Cryptocurrency Users===
{{Prevention:Regulators:Cryptocurrency Education Mandate}}
===Third Party Security Assessments===
{{Prevention:Regulators:Platform Security Assessments}}
===Establish Industry Insurance Fund===
{{Prevention:Platforms:Establish Industry Insurance Fund}}


<ref name="bitcoinmagazine-8600">[https://bitcoinmagazine.com/business/how-hubspot-data-breach-hits-bitcoiners How HubSpot Data Breach Hits Bitcoiners - Bitcoin Magazine - Bitcoin News, Articles and Expert Insights] (Jul 19, 2022)</ref></references>
{{Prevention:Regulators:End}}
== References ==
<references>
<ref name="zub79twitter-8593">[https://twitter.com/Zub79/status/1504984558005104642 Zub79 - "Look at how transparent @unchainedcap was to their customers." - Twitter] (Jun 20, 2022)</ref>
<ref name="21millonesbtctwitter-8594">[https://twitter.com/21Millones_BTC/status/1505043915279319041 21Millones_BTC - "First Ledger with Shopify, then Unchained with Active Campaign, now BlockFi with Hubspot." - Twitter] (Jun 20, 2022)</ref>
<ref name="unchained-8595">[https://unchained.com/ Bitcoin financial services - Unchained Capital] (Jul 14, 2022)</ref>
<ref name="unchained-8596">[https://unchained.com/about/ About us - Unchained Capital] (Jul 14, 2022)</ref>
<ref name="coindesk-8597">[https://www.coindesk.com/business/2022/03/16/unchained-capital-discloses-data-leak-at-email-marketing-partner/ Unchained Capital Discloses Data Leak at Email Marketing Partner - CoinDesk] (Jul 19, 2022)</ref>
<ref name="unchained-8598">[https://unchained.com/blog/email-marketing-data-leak-notice/ Notice of data leak by email marketing provider impacting clients - Unchained Capital] (Jul 19, 2022)</ref>
<ref name="thecoinnews-8599">[https://thecoin.news/articles/data-leak-unchained-capital-nydig-swan-blockfi-time-1647882577272 Data Leak At Unchained Capital, NYDIG, Swan & BlockFi. At The Same Time - Bitcoinist] (Jul 19, 2022)</ref>
<ref name="bitcoinmagazine-8600">[https://bitcoinmagazine.com/business/how-hubspot-data-breach-hits-bitcoiners How HubSpot Data Breach Hits Bitcoiners - Bitcoin Magazine - Bitcoin News, Articles and Expert Insights] (Jul 19, 2022)</ref>
</references>

Latest revision as of 10:54, 10 July 2023

Notice: This page is a new case study and some aspects have not been fully researched. Some sections may be incomplete or reflect inaccuracies present in initial sources. Please check the References at the bottom for further information and perform your own additional assessment. Please feel free to contribute by adding any missing information or sources you come across. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Unchained Capital

Unchained Capital is a bitcoin custody service which assists individuals in setting up multi-signature wallets. For marketing, they used a customer relationship management tool called ActiveCampaign. In February 2022, they closed down their account and requested all data to be deleted. However, the following month, fraudsters impersonated them and succeeded in reopening the account. This gave the fraudsters access to all the contact information of different customers that had been stored in the platform.

Unchained Capital appears to have been transparent around which information was leaked and how the events unfolded. They have advised customers to be vigilantly looking out for any spear-phishing attempts using their stolen data.

About Unchained Capital

[1][2]

"Established at block height 433179, Unchained Capital is the world’s premier bitcoin financial services company." "We make it easy for you to get the most from your bitcoin while holding your own keys." "Secure your bitcoin with multisig keys that you control." "Multisig vaults for teams with granular access permissions."

"In March 2019, we launched our bitcoin multisig vault platform, a superior approach to security that combines the control of self-custody with the benefits of a managed financial service. This approach allows users to control private keys and to create redundancy by distributing keys among participants who know and trust each other."

"When a client chooses Unchained, they are making a decision to reveal themselves selectively to our company, and not to anyone else, in exchange for better security, redundancy, support, and more value from their holdings through our financial services. In doing so, we recognize that clients sacrifice anonymity and entrust us with their privacy in return for the value of our service."

"We go to great lengths to secure client data through our internal infrastructure, proprietary applications, and the third parties we rely upon to run our business. We utilize encryption, access control, user management, and are extremely conservative about what information we share with third parties, far more conservative than the standard in our industry. We perform due diligence before engaging any new vendor to process data for us, including a review of any independent security audits (such as SOC II reports), and hold our vendors to a high standard."

"Ensuring the privacy of our clients is critical to our business as is transparency around the information we collect and the associated risks. We want our customers to not only be informed about the value and services we deliver but also potential tradeoffs. Prior to using our services, we recommend all potential clients review our materials on privacy and security and please reach out to us with any questions."

About ActiveCampaign

ActiveCampaign is a customer relationship management tool.

"Most individuals don’t understand the power of a CRM. At minimum, these tools allow companies to acquire, sort and manage incoming customers (and their data) in a way that provides the best user experience. At maximum, these tools are capable of an extreme degree of web monitoring and AI-based user segmentation and prediction."

"ActiveCampaign (“AC”) [was] a third-party email marketing provider that Unchained Capital used." "Unchained Capital used AC until February 2022 to support [their] marketing and sales functions. As a result, limited data was shared with AC depending on the nature of services clients or prospective clients were interested in or used."

The Reality

While Unchained Capital was no longer using the Active Campaign platform, the information remained stored there.

Failed Attempt To Delete Information

When leaving the Active Campaign platform, Unchained Capital had requested that their customer information be deleted, however this was not done[3].

The information included "email addresses, usernames, account status (active/inactive) and whether the client had an active vault or loan with Unchained Capital (yes or no)"[3]. In addition, "[f]or individuals that purchased a service directly through [the Unchained Capital] website, such as Concierge Onboarding, scheduled a consultation, or signed up on [their] website for updates and our newsletter, this data included: their name, email address, and IP address (but no shipping addresses were ever stored in AC)."[3]

What Happened

Information on Unchained Capital customers was stored on Active Campaign. Shortly after the relationship was severed, malicious actors claiming to be Unchained Capital convinced Active Campaign staff to reopen the account, providing them with access to the customer data.

Key Event Timeline - Unchained Capital ActiveCampaign Privacy Breach
Date Event Description
March 10th, 2022 Main Event Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.
March 16th, 2022 12:58:12 PM MDT Unchained Capital Announcement Unchained Capital posts an announcement to their website[4]. The attack on the former vendor, ActiveCampaign, a third-party email marketing provider, resulted in the compromise of Unchained Capital client and marketing data, including email addresses, usernames, account status, client name, and IP address. The firm emphasized that there was no impact on Unchained Capital’s systems, nor were client assets secured through its platform ever at risk. Clients were advised to be vigilant for spear-phishing attempts and confirmed communications with the firm. The attack on Unchained Capital comes amid a rising number of cyber threats to financial firms[3].
March 16th, 2022 4:04:00 PM MDT Reported on CoinDesk The incident is reported on CoinDesk[5]. TBD different versions.
March 17th, 2022 8:20:00 AM MDT CoinDesk Article Updated TBD what updates?[5]
March 18th, 2022 6:54:00 PM MDT Praised on Twitter The breach is publicly praised on Twitter by a user Zub79, responding about the BlockFi data breach[6].
March 18th, 2022 10:50:00 PM MDT Another Twitter Reference The breach is referenced[7].
March 21st, 2022 7:14:49 AM MDT Bitcoinist Article Published Bitcoinist publishes an article comparing and contrasting the privacy breach against others[8]. In addition to Unchained Capital, NYDIG, Swan Bitcoin, and BlockFi, also recently suffered a data breach through their third-party providers. Although the companies all made public apologies and addressed the issue, the blame was shifted to the third-party vendors. Fortunately, the data stolen was mostly marketing-driven personal information rather than critical financial data. The companies urged affected clients to be extra vigilant and avoid clicking on any links to protect themselves from spear phishing attempts. The four companies have all said they are working with their third-party vendors and looking to move away from using vendors for email[9].
March 21st, 2022 5:05:26 PM MDT Bitcoin Magazine Article Bitcoin Magazine publishes an article on the Hubspot data breach[10]. They report the unauthorized user with "super admin" access exported contact lists and data, including IP addresses, email histories, customer browsing behavior, financial value, and help tickets. While financial data was not compromised, the loss of user persona and behavioral data is severe, and users should expect spear phishing and spam attacks. Users are advised to be cautious of unsolicited communications and to use privacy best practices when browsing, buying, and communicating online[11].

Technical Details

Information on Unchained Capital customers was stored on the Active Campaign customer relationship management platform. Shortly after the relationship was severed, malicious actors claiming to be Unchained Capital convinced Active Campaign staff to reopen the account, providing the malicious actors with access to export the customer data.

Upon discovering the


On March 10th, "ActiveCampaign (“AC”) was the subject of a social engineering attack." "The attack was conducted through a live chat tool on AC’s public website, which did not require any user authentication, on Thursday March 10th between approximately 8-9am CST."

"An attacker impersonating an Unchained Capital employee socially engineered an AC support chat representative to reactivate Unchained Capital’s account which had been closed on February 17th, 2022. Subsequently, the attacker(s) then socially engineered a second AC support chat representative to add an administrative user using a username and password provided by the attacker. The attacker then gained unauthorized access to the reopened Unchained Capital account without needing a valid email and was able to export data from our previously closed AC account."

"The social engineering attack took place on the AC platform, and involved AC personnel, procedures, systems and applications." "[O]nly information shared with AC – client email addresses, usernames, account status, whether the client had an active multisig vault or loan with Unchained Capital and possibly IP addresses – may have been exported without authorization." "This attack occurred after Unchained Capital had closed its AC account and requested that all data be purged."

Total Amount Lost

No funds are believed to have been lost in this situation.

Immediate Reactions

"In an email to clients and a letter posted on the company website on Wednesday [a week after the attack], Unchained Capital CEO Joe Kelly said ActiveCampaign (AC), an outside email marketing provider used by Unchained until earlier this year, was hit with a social engineering attack."

"[C]lient profile information that was never shared with AC was not leaked. This would include data including physical addresses, Social Security numbers, dates of birth, IDs, phone numbers, bank account numbers, passwords, bitcoin (BTC) addresses, bitcoin balances, loan balances, trading activity, vault statements and loan statements."

"Please be diligent, and where there is any doubt, it is best to always err on the side of caution and reach out to us for confirmation. Specifically, if clients receive suspicious emails requesting to change passwords, perform any actions to sign transactions or replace any keys that secure your bitcoin, please do not take any such actions and reach out to us immediately. Our client services team and executives are on standby to take calls and answer all questions clients have. We will also be hosting a continuing education webinar on spear phishing and general best practices to avoid any associated risks."

"Kelly added that while client bitcoin custody is protected by multisig cold storage, clients nevertheless should be aware of what happened and be vigilant against phishing attacks."

"We are deeply sorry this incident occurred as we take our clients’ privacy very seriously," concluded Kelly. "We want to reinforce the fact that, due to our collaborative custody model, no such incidents could ever put any client funds at risk."

"We have ensured that this social engineering attack vector is not possible with our current email marketing provider and over the coming weeks, we will be carefully reviewing all security measures and processes including vendor risk management."

"While we minimize the need for trust in the ultimate security of client funds through our approach to custody, our clients still put an immense amount of trust in us to protect their privacy and to ensure these incidents do not occur. As bitcoiners and clients of Unchained Capital ourselves, we have taken on these responsibilities with a clear understanding of the weight of our obligations. While we carry the gravity of this disclosure and security incident with us, we will learn from mistakes and strive to do better."

Unchained Capital Announcement

Unchained Capital announced the breach with a detailed announcement on their website.

We are letting our clients and community know about a security incident that occurred at one of the vendors we previously used for email marketing, resulting in the compromise of Unchained Capital client and marketing data detailed below. Importantly, there is no impact whatsoever to Unchained Capital’s systems, nor were client assets secured through our platform ever at risk.

ActiveCampaign (“AC”), a third-party email marketing provider that Unchained Capital used until early in 2022, was the subject of a social engineering attack last week. This attack occurred after Unchained Capital had closed its AC account and requested that all data be purged. While the attack occurred on a third party, it has impacted our clients and it was ultimately the result of our decision to work with this vendor. Regardless of any failures by third parties, we are accountable to our clients in all cases. In this instance, we have let them down and it is necessary that we share details of the security incident which occurred on Thursday, March 10th.

What information was NOT compromised

The social engineering attack took place on the AC platform, and involved AC personnel, procedures, systems and applications. None of Unchained Capital’s systems, applications, employees, or accounts (admin or client) were compromised. Because none of Unchained Capital’s systems were compromised, the following information was NOT subject to the compromise: client profile information containing personally identifiable information (e.g. addresses, SSN, DOB, IDs, phone numbers used in our KYC process), bank account numbers, passwords, bitcoin addresses, bitcoin balances, loan balances, trading activity, vault statements, loan statements.

None of this information was provided to ActiveCampaign and was therefore never subject to compromise through the attack on AC. Given our bitcoin custody is built on multisig and cold storage, through which clients hold their own keys, no funds were ever at risk but it is critical that clients be diligent and on high alert for reasons described below.

What information was compromised

Unchained Capital used AC until February 2022 to support our marketing and sales functions. As a result, limited data was shared with AC depending on the nature of services clients or prospective clients were interested in or used. Elements of this data were compromised and exported by an unauthorized user as described below.

For clients, this data included: email addresses, usernames, account status (active/inactive) and whether the client had an active vault or loan with Unchained Capital (yes or no).

For individuals that purchased a service directly through our website, such as Concierge Onboarding, scheduled a consultation, or signed up on our website for updates and our newsletter, this data included: their name, email address, and IP address (but no shipping addresses were ever stored in AC).

What steps clients should consider taking

It is always important that our clients be diligent about confirming all communications and any requests that appear to come from Unchained Capital. Given the data leak, clients should be on high alert for any spear phishing attempts. Be especially careful about clicking on any links—always ensure that they are HTTPS links to unchained.com. If any email or communication looks suspicious, please contact us at clientservices@unchained.com or call us at 1-844-486-2424 to confirm its authenticity. Please be diligent, and where there is any doubt, it is best to always err on the side of caution and reach out to us for confirmation. Specifically, if clients receive suspicious emails requesting to change passwords, perform any actions to sign transactions or replace any keys that secure your bitcoin, please do not take any such actions and reach out to us immediately. Our client services team and executives are on standby to take calls and answer all questions clients have. We will also be hosting a continuing education webinar on spear phishing and general best practices to avoid any associated risks.

Details of security incident

The attack was conducted through a live chat tool on AC’s public website, which did not require any user authentication, on Thursday March 10th between approximately 8-9am CST.

An attacker impersonating an Unchained Capital employee socially engineered an AC support chat representative to reactivate Unchained Capital’s account which had been closed on February 17th, 2022. Subsequently, the attacker(s) then socially engineered a second AC support chat representative to add an administrative user using a username and password provided by the attacker. The attacker then gained unauthorized access to the reopened Unchained Capital account without needing a valid email and was able to export data from our previously closed AC account.

Though we had requested this data be deleted, it was not. Unfortunately, we only learned that AC had not deleted this data after discovering the social engineering attack. Within 20 minutes of the attack, an Unchained Capital administrator received emails with the fraudulent chat transcripts and took immediate measures to restrict further access. After the attack was identified, Unchained Capital worked to gather these relevant facts. Ultimately, on Tuesday, March 15th, AC confirmed unauthorized access did occur and that the attacker was able to export the data described above.

Duty to our clients

Regardless of any actions or failures by third parties, our commitments are to our clients, prospective clients, and partners that put their trust in Unchained Capital and to each of them, we take responsibility. Furthermore, we have an obligation—not an option—to make this disclosure to help ensure the security of our clients regardless of the negative impact it may have on our business.

While we minimize the need for trust in the ultimate security of client funds through our approach to custody, our clients still put an immense amount of trust in us to protect their privacy and to ensure these incidents do not occur. As bitcoiners and clients of Unchained Capital ourselves, we have taken on these responsibilities with a clear understanding of the weight of our obligations. While we carry the gravity of this disclosure and security incident with us, we will learn from mistakes and strive to do better.

Working to do better

We go to great lengths to secure client data through our internal infrastructure, proprietary applications, and the third parties we rely upon to run our business. We utilize encryption, access control, user management, and are extremely conservative about what information we share with third parties, far more conservative than the standard in our industry. We perform due diligence before engaging any new vendor to process data for us, including a review of any independent security audits (such as SOC II reports), and hold our vendors to a high standard.

Our high standards for client privacy ensured that we limited the amount of data we shared with ActiveCampaign. But with these same high standards, any exposure of client data is unacceptable to us. We have ensured that this social engineering attack vector is not possible with our current email marketing provider and over the coming weeks, we will be carefully reviewing all security measures and processes including vendor risk management.

We are deeply sorry this incident occurred as we take our client’s privacy very seriously. Our mission is to grow bitcoin adoption and to empower our clients to hold their own private keys, eliminating us or any financial institution as a single point of failure. We want to reinforce the fact that, due to our collaborative custody model, no such incidents could ever put any client funds at risk.

Ultimate Outcome

TBD

"Though [Unchained] had requested this data be deleted, it was not. Unfortunately, we only learned that AC had not deleted this data after discovering the social engineering attack. Within 20 minutes of the attack, an Unchained Capital administrator received emails with the fraudulent chat transcripts and took immediate measures to restrict further access. After the attack was identified, Unchained Capital worked to gather these relevant facts. Ultimately, on Tuesday, March 15th, AC confirmed unauthorized access did occur and that the attacker was able to export the data described above."

Total Amount Recovered

There do not appear to have been any funds lost in this case.

Ongoing Developments

TBD

Individual Prevention Policies

Most companies have insecurities. Any information provided to a company may be breached or abused.

Protection Of Personal Information

Obviously, anything you can do to minimize the amount of information which you provide to websites will reduce your risk.

Set up separate email addresses for each service, and avoid providing your phone number whenever possible. Any received emails or phone calls must be viewed with scrutiny, especially if unsolicited. Interact with companies only through their official websites and confirm anything with the company directly via multiple official sources, especially if it promises a significant incentive to take an action or threatens access to your funds if an action is not taken. It would be recommended to also establish a network of multiple trusted individuals who use the same services and have a strong level of security knowledge.

Never Give Access To Your Funds

In a typical cryptocurrency fraud, malicious actors try to use the available information to convince you to give them authorization to access or transfer funds. This can be accomplished via tricking you into providing a private key or seed phrase, signing a transaction that grants them permission to move funds, or installing malware on your device. In most cases, this will be accomplished via a greed or fear trigger, and you should be on extra guard when experiencing those emotions.

Private keys can be obtained through seed phrases, mnemonics, private key files, mobile synchronization screens, wallet export features, wallet backups, etc... Never ever send these to anyone else who you do not intend to allow to take all of your money. Attackers will use a wide variety of tactics to convince you like pretending to be your wallet software, pretending they work for the wallet software, or asking you to screen share. Don't fall for them.

Any time untrusted software is being run is an opportunity for abuse. It is recommended to always interact with cryptocurrency in a fully controlled environment, which is an environment where you have understanding of every piece of software running there. Using a hardware wallet, spare computer with all software wiped, and/or virtual machine with only the needed software greatly reduces your attack surface. Take the time to verify downloaded files come from the correct and expected source and match available hashes if provided. Any time you encounter a new file, always check if it can contain executable code prior to using it.

Store the majority of funds offline. By offline, it means that the private key and/or seed phrase is exclusively held by you and not connected to any networked device. Examples of offline storage include paper wallets (seed phrase or key written down and deleted from all electronic media), hardware wallets, steel wallet devices, etc...

For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.

Platform Prevention Policies

The situation involved a failure to verify the identity of the account holder, and a failure to remove customer data which was requested to be removed already. Beyond this, access to the entire mailing list was possible for a single employee of the company. Greater security can be achieved when the actual contact information is not directly handled by employees without multi-signature approval, especially to access full mailing lists.

Platforms should put in place multi-signature access control on all customer data, which requires the approval of multiple people to enable the download of data. An external security review should be conducted regularly. If information is lost in a breach, the level of damage can be minimized by educating users about potential scams and frauds that they may encounter. Platforms should be prepared to assist with victims, which could be done through an industry insurance fund.

Never take for granted the limited knowledge of users of your service and their tendency to skip past provided information. It is recommended to design a simple tutorial and quiz for new users which explains the basics of seed phrases, strong password generation, secure two-factor authentication, common fraud schemes, how ponzi schemes work, as well as other risks which are unique to the cryptocurrency space. This tutorial and quiz should ensure their understanding and be a standard part of the sign-up or download process which is difficult or impossible to skip.

All wallets, minting functions, and critical infrastructure should be implemented with a multi-signature requirement, with a recommended minimum of 3 signatures required. This means that making important changes or approving spending will require the keys held by at least 3 separate individuals within the organization to approve. The multi-signature should be implemented at the lowest layer possible, all key holders should have security training, and all key holders should be empowered and encouraged to exercise diligence.

All aspects of any platform should undergo a regular validation/inspection by experts. This validation should include a security audit of any smart contracts, reporting any risks to the backing (of any customer assets, ensuring treasuries or minting functions are properly secured under the control of a multi-signature wallet, and finding any inadequacies in the level of training or integrity of the team. The recommended interval is twice prior to launch or significant system upgrade, once after 3 months, and every 6 months thereafter. It is recommended that the third party performing the inspection not be repeated within a 14 month period.

All points along the communication and supply chain should be inspected for vulnerabilities. Common vulnerability points may include DNS, Discord, and customer information. What steps are required to access and/or modify the component? Do any third party companies or organizations implement a proper multi-signature approach? What additional security options are available?

Work with other industry platforms to set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.

For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.

Regulatory Prevention Policies

While the best solution is to reduce the amount of information collected, a combination of increased education, improved security, and a collective industry insurance fund can also prevent and mitigate the outcome of a similar data breach.

Private Identity Key Protocol

A key challenge is the increased reliance on an incredible amount of personal data by financial firms. Having this information shared as part of a normal business relationship and floating around on multiple platforms poses a severe risk to all users when it comes to identity theft, phishing attacks, and other targeted criminal activities. While various frameworks have been proposed for how platforms can safeguard this information, they all suffer from the problem of depending on individuals within the organization who can be coerced, bribed, or tricked into violating the policies. They also do not address situations in which customers divulge information to unregulated platforms, either deliberately or by being tricked via a phishing attack. Criminals only need to breach one platform, and the information is permanently exposed to the black market. As an alternative, a single digital access token could be used to validate identity, with the associated personal information stored in a single secure location. The personal information is much less likely to be breached. If the token is breached on any third party platform, the access token can be revoked and swapped with a new token, while criminals have no way of utilizing the old token.

Increased Education For Cryptocurrency Users

Create a standard tutorial and quiz for all new cryptocurrency participants, which is required to be completed once per participant. This tutorial and quiz should cover the basics of proper seed phrase protection, strong password generation, secure two-factor authentication, common fraud schemes, how to detect and guard against phishing attacks, how ponzi schemes work, as well as other risks which are unique to the cryptocurrency space.

Third Party Security Assessments

All platforms should undergo published security and risk assessments by independent third parties. Two assessments are required at founding or major upgrade, one after 3 months, and one every 6 months thereafter. The third parties must not repeat within the past 14 months. A risk assessment needs to include what assets back customer deposits and the risk of default from any third parties being lent to. The security assessment must include ensuring a proper multi-signature wallet, and that all signatories are properly trained. Assessments must be performed on social media, databases, and DNS security.

Establish Industry Insurance Fund

Work with other industry platforms to set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.

For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.

References

Cite error: <ref> tag with name "bitcoinmagazine-8600" defined in <references> is not used in prior text.