Bitstamp Hot Wallet Hack: Difference between revisions
(Another 30 minutes complete. Additional sources merged in.) |
(Another 30 minutes complete. Integrated blockchain transaction data to get actual date of breach. Timeline information. Prevention. Other sources integrated further.) |
||
| (4 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
{{Case Study Under Construction}}{{Unattributed Sources}} | {{Case Study Under Construction}}{{Unattributed Sources}} | ||
[[File:Bitstamp.jpg|thumb|Bitstamp Logo/Homepage]] | [[File:Bitstamp.jpg|thumb|Bitstamp Logo/Homepage]]Bitstamp was one of the largest and most widely used exchanges at the time. Multiple services such as ATMs sourced their liquidity from Bitstamp. A phishing attack tricked Bitstamp into releasing wallet backup files and pass phrases. Bitstamp has since set up multi-signature hot wallets through BitGo, while the majority of funds remain in cold storage. No customers of the exchange appear to have lost their funds in the incident as Bitstamp has reportedly covered all losses. | ||
<ref name="bravenewcoin-207" /><ref name="coindesk-208" /><ref>http://www.reuters.com/article/2015/01/06/us-bitstamp-cybersecurity-idUSKBN0KF0UH20150106<nowiki/>Dec 11, 2023)( | |||
</ref> | </ref><ref>[https://thedatascientist.com/cryptocurrency-security-threats-from-mt-gox-to-bitstamp/#:~:text=In%20January%202015%2C%20hackers%20targeted,(%245%20million)%20were%20stolen. Cryptocurrency Security Threats: From Mt Gox To Bitstamp - The Data Scientist] (Jan 3, 2024)</ref><ref>[https://web.archive.org/web/20221105221349/https://www.scribd.com/doc/270137312/Bitstamp-Incident-Report-2-20-15 Bitstamp Incident Report Content Removed] (Jan 3, 2024)</ref> | ||
https://web.archive.org/web/20150702005806/https://www.scribd.com/word/removal/270137312 | |||
https://www.pymnts.com/news/2015/bitstamp-goes-dark-after-possible-hack/ | |||
https://davidgerard.co.uk/blockchain/2017/11/22/correction-huobi-wasnt-hacked-in-2015-but-the-2015-bitstamp-hacker-did-withdraw-12000-btc-from-huobi/ | |||
https://www.reddit.com/r/Bitcoin/comments/2re2pw/18864_coins_stolen_from_stamp_that_doesnt_look/ | |||
https://www.reddit.com/r/CryptoCurrency/comments/7eho5y/tether_was_hacked_by_the_same_person_who_hacked/ | |||
https://www.ccn.com/bitcoin-exchange-just-lose-12-bitcoins-possible-bitstamp-hack-address-contains-18866-stolen-btc/ | |||
https://web.archive.org/web/20221206090614/http://www.reddit.com/r/Bitcoin/comments/2re2pw/18864_coins_stolen_from_stamp_that_doesnt_look/ | |||
https://web.archive.org/web/20221109113756/https://www.reddit.com/r/Bitcoin/comments/3bpdb4/bitstamp_incident_report_22015/ | |||
https://web.archive.org/web/20220909002622/https://www.reddit.com/user/coinleak/ | |||
== About Bitstamp == | == About Bitstamp == | ||
Bitstamp | Bitstamp was originally founded in 2011<ref name="coinsutra-202" />, reportedly by the "Merlak brothers"<ref name="cointelegraph-197" />. Bitstamp has been reported as being based in Slovenia<ref name="coinsutra-202" /><ref name="cointelegraph-197" /> and based in Luxembourg. Bitstamp is the world's longest-running cryptocurrency exchange<ref name="wikipedia-4367" />. | ||
A significant portion of the initial investment in Bitstamp at the time came from Pantera Capital<ref name=":0">[https://blog.bitstamp.net/post/bitstamp-is-open-for-business-better-than-ever/ Bitstamp is open for business - better than ever! - Bitstamp] (Dec 13, 2023)</ref>. | |||
"Bitstamp is a cryptocurrency exchange based in Luxembourg. It allows trading between fiat currency, bitcoin and other cryptocurrencies. It allows USD, EUR, GBP, bitcoin, ALGO, XRP, Ether, litecoin, bitcoin cash, XLM, Link, OMG Network, USD Coin or PAX deposits and withdrawals." | "Bitstamp is a cryptocurrency exchange based in Luxembourg. It allows trading between fiat currency, bitcoin and other cryptocurrencies. It allows USD, EUR, GBP, bitcoin, ALGO, XRP, Ether, litecoin, bitcoin cash, XLM, Link, OMG Network, USD Coin or PAX deposits and withdrawals." | ||
| Line 19: | Line 39: | ||
Homepage: bitstamp.net<ref name="bitstamp-4366" /> | Homepage: bitstamp.net<ref name="bitstamp-4366" /> | ||
Twitter: Bitstamp | |||
== The Reality == | == The Reality == | ||
At the time of the attack, no cryptocurrency platforms were yet using multi-signature wallets. Bitstamp's staff stored backups of the private keys and passphrase on networked computers. The system administrator was not properly trained to defend against phishing attacks. | |||
A wallet file (named wallet.dat) was encrypted with only a simple passphrase, which was also stored online. | |||
== What Happened == | == What Happened == | ||
Bitstamp lost | Bitstamp lost close to 19,000 BTC from the exchange’s hot wallet after a successful phishing attack against staff. | ||
{| class="wikitable" | {| class="wikitable" | ||
|+Key Event Timeline - Bitstamp Hot Wallet Hack | |+Key Event Timeline - Bitstamp Hot Wallet Hack | ||
| Line 31: | Line 55: | ||
!Description | !Description | ||
|- | |- | ||
|January | |January 3rd, 2015 7:37:44 AM MST | ||
| | |First Blockchain Transaction | ||
| | |The first blockchain transaction occurs removing 3100 bitcoin from the Bitstamp hot wallet<ref>[https://www.blockchain.com/explorer/transactions/btc/a32697f1796b7b87d953637ac827e11b84c6b0f9237cff793f329f877af50aea First Theft Transaction Withdrawing 3100 BTC - Blockchain Explorer] (Jan 3, 2024)</ref>. | ||
|- | |||
|January 4th, 2015 1:32:03 AM MST | |||
|Large Blockchain Transaction | |||
|The thefts continue. There are more transactions, including a large one for 1193.77829184 bitcoin<ref>[https://www.blockchain.com/explorer/transactions/btc/b2226ff35d689ff1280f117bd550de3b182ed01c6c81af12856234514991af13 Theft Transaction Withdrawing 1193.77829184 BTC] (Jan 3, 2024)</ref>. | |||
|- | |||
|January 4th, 2015 6:51:22 AM MST | |||
|Large Blockchain Transaction | |||
|The thefts continue. There are more transactions, including a large one for 4021.56993171 bitcoin<ref>[https://www.blockchain.com/explorer/transactions/btc/526aeaaa36a2ad9e10f6b593713a0e1fd2204970ec7f3987639ff025e095827c Theft Transaction Withdrawing 4021.58042222 BTC] (Jan 3, 2024)</ref>. | |||
|- | |||
|January 4th, 2015 7:57:44 AM MST | |||
|Large Blockchain Transaction | |||
|The thefts continue. There are more transactions, including a large one for 3000 bitcoin<ref>[https://www.blockchain.com/explorer/transactions/btc/5c5ecbb47a99cc649f5ea9f28a3c06a04e2755e44211781007ee41360e31a0a4 Theft Transaction Withdrawing 3000 BTC] (Jan 3, 2024)</ref>. | |||
|- | |||
|January 4th, 2015 | |||
|Breach Occurs | |||
|Bitstamp reports that the breach happened on January 4th<ref name="bitstamp-196" />. | |||
|- | |||
|January 5th, 2015 2:00:00 AM MST | |||
|Withdrawals Reportedly Suspended | |||
|Withdrawals were reportedly suspended at 9 AM UTC on January 5th<ref name="coinsutra-202" />. | |||
|- | |- | ||
|January 5th, 2015 3:29:35 PM MST | |January 5th, 2015 3:29:35 PM MST | ||
| Line 46: | Line 90: | ||
|Bank Info Security Article | |Bank Info Security Article | ||
|The Bank Info Security article author promotes it with another tweet<ref>[https://twitter.com/gen_sec/status/553045973459820544 gen_sec - "#Bitcoin Exchange Reports #Data #Breach: http://bit.ly/143bbxy - @databreachtoday" - Twitter] (Dec 11, 2023)</ref>. TBD - Check if article was updated in the meantime. | |The Bank Info Security article author promotes it with another tweet<ref>[https://twitter.com/gen_sec/status/553045973459820544 gen_sec - "#Bitcoin Exchange Reports #Data #Breach: http://bit.ly/143bbxy - @databreachtoday" - Twitter] (Dec 11, 2023)</ref>. TBD - Check if article was updated in the meantime. | ||
|- | |||
|January 9th, 2015 10:52:35 AM MST | |||
|Bitstamp Resumes Service | |||
|Bitstamp announces the resumption of service in a blog post. The security breach resulted in a loss of less than 19,000 BTC, but the exchange assures customers that the overwhelming majority of its bitcoin reserves, stored in secure offline cold storage, remain unaffected<ref name=":0" />. Bitstamp suspended services to fully investigate the incident, engage with law enforcement, and rebuild systems from a secure backup onto entirely new hardware. The exchange has implemented additional security measures, including the integration of BitGo multi-sig technology, deployment on Amazon Web Services, and a commission-free trading period until January 17th as a gesture of gratitude to loyal customers. Bitstamp expresses confidence in its ability to emerge from this experience with even higher standards for trust and confidence in its services<ref name=":0" />. | |||
|- | |||
|January 9th, 2015 12:42:00 PM MST | |||
|BitGo Promotion Announcement | |||
|BitGo takes the opportunity to announce their partnership with Bitstamp on Twitter<ref name=":1">[https://twitter.com/BitGo/status/553637864085663744 BitGo - "BREAKING. @Bitstamp partners with @BitGo for multi-sig #bitcoin security and relaunches exchange" - Twitter] (Dec 13, 2023)</ref>. | |||
|- | |- | ||
|January 9th, 2015 3:50:00 PM MST | |January 9th, 2015 3:50:00 PM MST | ||
|BitStamp Back Online | |BitStamp Back Online | ||
|BitStamp is reportedly back online<ref>[https://twitter.com/gen_sec/status/553685173955727362 gen_sec - "#Bitstamp Back Online After #Breach: http://bit.ly/1x5tTvE - @databreachtoday" - Twitter] (Dec 11, 2023)</ref><ref>[https://www.databreachtoday.com/bitstamp-back-online-after-breach-a-7771 Bitstamp Back Online After Breach - DataBreachToday] (Dec 11, 2023)</ref>. | |BitStamp is reportedly back online<ref>[https://twitter.com/gen_sec/status/553685173955727362 gen_sec - "#Bitstamp Back Online After #Breach: http://bit.ly/1x5tTvE - @databreachtoday" - Twitter] (Dec 11, 2023)</ref><ref>[https://www.databreachtoday.com/bitstamp-back-online-after-breach-a-7771 Bitstamp Back Online After Breach - DataBreachToday] (Dec 11, 2023)</ref>. | ||
|- | |||
|January 12th, 2015 7:24:18 PM MST | |||
|Relaunch FAQ Published | |||
|Bitstamp posts a "Relaunch FAQ" on their website, which covers over many details of what happened and the path forward<ref name="bitstamp-196" />. The date of the breach is provided as January 4th, and the post justifies the temporary suspension of services on January 5th for forensic analysis, investigation, and system redeployment. The breach affected a small fraction of Bitstamp's total bitcoin reserves, and the majority of customer funds were held in secure offline cold storage systems. No customer bitcoins held prior to the suspension were compromised, and Bitstamp is committed to reimbursing all legitimate deposits affected by the breach. As a gesture of gratitude to loyal customers, Bitstamp waived all commission fees for one week. The exchange has implemented additional security measures, including moving to Amazon Web Services, integrating multi-sig technology, and changing hosting locations. Bitstamp is working with law enforcement agencies on the investigation and has no evidence of compromised customer data. Trading resumed on January 9th, and customers can deposit and withdraw bitcoins securely<ref name="bitstamp-196" />. | |||
|- | |- | ||
|October 19th, 2017 2:11:44 AM MDT | |October 19th, 2017 2:11:44 AM MDT | ||
|CoinSutra Biggest Bitcoin Hacks | |CoinSutra Biggest Bitcoin Hacks | ||
|CoinSutra publishes an article titled "Top 6 Biggest Bitcoin Hacks Ever", which discusses significant historical Bitcoin hacks to emphasize the importance of securing private keys. | |CoinSutra publishes an article titled "Top 6 Biggest Bitcoin Hacks Ever", which discusses significant historical Bitcoin hacks to emphasize the importance of securing private keys. Bitstamp is included among the mentioned hacks as a Slovenian Bitcoin exchange founded in 2011, with a hack date of January 4, 2015. During this incident, an anonymous hacker compromised Bitstamp's operational hot wallet, resulting in the loss of 19,000 bitcoins, equivalent to $5 million at the time. Bitstamp suspended operations temporarily but resumed with enhanced security measures, such as implementing BitGo multisig wallets. Despite the setback, Bitstamp managed to regain user trust and continues to operate successfully. The article serves as a cautionary tale, urging readers to prioritize securing their private keys and advocating for the use of hardware wallets to safeguard cryptocurrencies<ref name="coinsutra-202" />. | ||
|- | |- | ||
|November 21st, 2017 12:45:47 PM MST | |November 21st, 2017 12:45:47 PM MST | ||
|CCN Article Linking To Tether Hack | |CCN Article Linking To Tether Hack | ||
|A CCN article has managed to trace the funds to be linked to a [[Tether USDT Token Theft|$31m hack of the Tether stablecoin]]. "This same wallet" which "had received .01 BTC shortly before the hack" "was first used to steal more than 18,500 BTC — worth $5 million then but more than $150 million today — from Bitstamp in January 2015."<ref name="ccn-195" /> | |A CCN article has managed to trace the funds to be linked to a [[Tether USDT Token Theft|$31m hack of the Tether stablecoin]]. "This same wallet" which "had received .01 BTC shortly before the hack" "was first used to steal more than 18,500 BTC — worth $5 million then but more than $150 million today — from Bitstamp in January 2015."<ref name="ccn-195" /> | ||
|- | |||
|August 31st, 2018 8:07:00 AM MDT | |||
|CoinTelegraph Article On Breaches | |||
|CoinTelegraph publishes an article with additional information on many breaches of major exchanges including Bitstamp<ref name="cointelegraph-197" />. This article describes the phishing attack as "banal", suggesting that there was no novelty in the method of attack. It appears to be a spear phishing attack where "exchange employees [reportedly] received personal emails and messages in Skype from seemingly friendly sources". The attack was even successful against the "system administrator Luka Kodrich", who reportedly "clicked the link and downloaded malware onto the working computer". They report that "[c]ompensation did not followed (sic)", which suggests that no recovery was provided for affected users. Information on the steps taken to better secure the platform are also highlighted<ref name="cointelegraph-197" />. | |||
|- | |- | ||
|February 27th, 2019 11:31:32 AM MST | |February 27th, 2019 11:31:32 AM MST | ||
| Line 73: | Line 133: | ||
== Technical Details == | == Technical Details == | ||
The attack against Bitstamp was a spearphishing campaign<ref name="cointelegraph-197" />. Multiple employees of the platform appear to have been targeted with friendly emails and Skype communication<ref name="cointelegraph-197" />. The most significant part of the attack was a successful phishing of the system administrator, an individual named Luka Kodrich<ref name="cointelegraph-197" />. | |||
Luka was tricked into clicking on a link and downloading malware onto the Bitstamp work computer<ref name="cointelegraph-197" />, allowing the attacker to access multiple PCs. While the wallet and passphrase were stored on separate computers, computers in the system were all networked together, and the attacker with system administrator level access was able to get both the wallet.dat file and the passphrase required to unlock it. These were copied to a server run by a German hosting provider and subsequently used to withdraw close to 19,000 bitcoin. | |||
=== Spearphishing Campaign === | |||
"Surprisingly, a banal phishing attack was used by hackers — the exchange employees received personal emails and messages in Skype from seemingly friendly sources.”<ref name="cointelegraph-197" /> | |||
“Six employees of Bitstamp were targeted in a weeks-long phishing attempt leading up to the theft of roughly $5m in bitcoin in January, according to an unconfirmed incident report said to be drafted internally by the bitcoin exchange.” | |||
“What’s maybe even more surprising is that the person responsible for security, Bitstamp system administrator Luka Kodrich, clicked the link and downloaded malware onto the working computer, after which the exchange was hacked. Bitstamp hurried to notify traders about what was happening, however, the attackers had already stolen the funds.”<ref name="cointelegraph-197" /> | |||
=== Wallet/Passphrase Files Copied === | |||
A wallet file (named wallet.dat) was encrypted with only a simple passphrase, which was also stored online. | |||
“On this occasion, Mr.Kodric[h] was certain that these logins were not made by him, and must therefore have been the attacker. Analysis indicates that the attacker accessed LNXSRVBTC, where the wallet.dat file was held, and the DORNATA server, where the passphrase for the bitcoin wallet was stored, before data was transferred out to both servers to IP 1**.**.***.**8, which is part of a range owned by a German hosting provider. We suspect that the the attacker copied the Bitcoin wallet file and passphrase at this stage [...]” | |||
=== Withdrawal of Funds === | |||
“Together the wallet and passphrase would have enabled the attacker to steal bitcoins from the Bitcoin wallet.” | |||
=== Links To Tether Hack === | |||
“A wallet associated with [the] $31 million Tether hack has been linked to previous bitcoin exchange thefts numbering in the tens of thousands of bitcoins.” | “A wallet associated with [the] $31 million Tether hack has been linked to previous bitcoin exchange thefts numbering in the tens of thousands of bitcoins.” | ||
<blockquote>No, the team and physical operations remain in the EU. Some of our team was in the US during the breach, but no operations were moved.<ref name="bitstamp-196" /></blockquote> | |||
=== Blockchain Information === | |||
Thief Wallet Address: [https://www.blockchain.com/explorer/addresses/btc/1L2JsXHPMYuAa9ugvHGLwkdstCPUDemNCf 1L2JsXHPMYuAa9ugvHGLwkdstCPUDemNCf]<ref>[https://www.blockchain.com/explorer/addresses/btc/1L2JsXHPMYuAa9ugvHGLwkdstCPUDemNCf Bitstamp Theft Address - Blockchain Explorer] (Jan 3, 2024)</ref> | |||
First Blockchain Transaction: [https://www.blockchain.com/explorer/transactions/btc/a32697f1796b7b87d953637ac827e11b84c6b0f9237cff793f329f877af50aea a32697f1796b7b87d953637ac827e11b84c6b0f9237cff793f329f877af50aea] | |||
== Total Amount Lost == | == Total Amount Lost == | ||
| Line 91: | Line 166: | ||
Various sources have reported this amount as "equivalent to $5 million", "$5.000k"<ref name="bitcoinexchangeguide-218" />, "5,000,000.00"<ref name="kylegibson-86" />, "$5 million"<ref name="coinsutra-202" />, "more than $5 million"<ref name="bankinfosecurity-4369" />, and "about $5.1m at press time"<ref name="coindesk-216" />. | Various sources have reported this amount as "equivalent to $5 million", "$5.000k"<ref name="bitcoinexchangeguide-218" />, "5,000,000.00"<ref name="kylegibson-86" />, "$5 million"<ref name="coinsutra-202" />, "more than $5 million"<ref name="bankinfosecurity-4369" />, and "about $5.1m at press time"<ref name="coindesk-216" />. | ||
There is no reason to believe that any personal information was compromised<ref name="bitstamp-196" />. | |||
The total amount lost has been estimated at $5,100,000 USD. | The total amount lost has been estimated at $5,100,000 USD. | ||
| Line 96: | Line 173: | ||
== Immediate Reactions == | == Immediate Reactions == | ||
=== Halting Of Platform === | |||
The compromise affected some of Bitstamp's operational wallets, leading to the suspension of deposits and ultimately a temporary shutdown of the platform<ref name="coindesk-216" />. BitStamp temporarily suspended its services and urged customers not to deposit funds into previously issued Bitcoin deposit addresses<ref name="bankinfosecurity-4369" />. The exchange assured customers that the breach, affecting some operational wallets, would not impact consumer assets, as the overwhelming majority of Bitstamp's Bitcoin reserves are stored in secure offline cold storage systems<ref name="bankinfosecurity-4369" />. | |||
The Bitstamp platform was taken offline on January 5th<ref name="bitstamp-196" />. Bitstamp provided a justification for this on multiple occasions<ref name="bitstamp-196" /><ref name=":0" />:<blockquote> | |||
We took the decision to rebuild our systems from the ground up from a secure backup for a few reasons. By redeploying our system from a secure backup onto entirely new hardware, we were able to preserve the evidence for a full forensic investigation of the crime. We have also taken this time to implement a number of new security measures and protocols so that customers can resume using Bitstamp with full confidence and trust. While this decision means we have not been able to provide you with services for a number of days, we feel this extra measure of precaution was in the best interest of our customers.</blockquote><blockquote> | |||
As an additional security measure, we suspended our systems and disabled our website to preserve the forensic environment, to engage with authorities to fully investigate the incident, and to redeploy from a secure backup a totally new instance of our code and platform on totally new hardware. We also moved our hosting location from a local hosting site to Amazon Web Services (in the EU) and implemented multi-sig technology to further improve security—the first major exchange to do so.</blockquote> | |||
=== Report of Platform Breach === | |||
Bitstamp, reported the security breach resulting in the loss of less than 19,000 BTC (approximately $5.1 million)<ref name="coindesk-216" />. Bitstamp assured customers that funds held prior to the service suspension would not be affected, emphasizing that the majority of its Bitcoin reserves are stored in secure offline cold storage systems<ref name="coindesk-216" />. The exchange reported they were actively collaborating with law enforcement in an ongoing investigation<ref name="coindesk-216" />. Bitstamp's CEO, Nejc Kodrič, stated that the breach represents only a small fraction of the total Bitcoin reserves, and efforts are underway to transfer a secure backup of the platform to a new environment, with plans to resume services in the coming days<ref name="coindesk-216" />.<blockquote>"Bitstamp customers can rest assured that their bitcoins held with us prior to temporary suspension of services on January 5th (at 9 am UTC) are completely safe and will be honored in 'full. | |||
On January 4th, some of Bitstamp's operational wallets were compromised, resulting in a loss of less than 19,000 BTC. Upon learning of the breach, we immediately notified all customers that they should no longer make deposits to previously issued bitcoin deposit addresses. As an additional security measure. we suspended our systems while we fully investigate the incident and actively engage with law enforcement officials. | |||
This breach represents a small fraction of Bitstamp's total bitcoin reserves, the overwhelming majority of which are are held in secure offline cold storage systems. We would like to reassure all Bitstamp customers that their balances held prior to our temporary suspension of services will not be affected and will be honored in full. | |||
We appreciate customers' patience during this disruption of services. We are working to transfer a secure backup of the Bitstamp site onto a new safe environment and will be bringing this online in the corning days. Customers can stay informed via updates on our website, on Twitter (@Bitstamp) and through Bitstamp customer support at support@bitstamp.net."</blockquote> | |||
== Ultimate Outcome == | |||
Trading on the Bitstamp platform was resumed on January 9th. A Relaunch FAQ was posted shortly afterward on January 12th. Bitstamp ultimately improved their platform security as a result, implementing multi-signature security. The same attacker appears to have succeeded at breaching Tether, however those funds were quickly frozen. | |||
=== Redeployment on New Hardware === | |||
Bitstamp redeployed "on 100% new hardware deployed from a completely secure backup of our code and data"<ref name=":0" />. | |||
This new hardware was apparently using Amazon Web Services. "Bitstamp is now running on Amazon’s world-class AWS cloud infrastructure, architected to be one of the most secure and reliable cloud computing environments available."<ref name=":0" /> | |||
=== Implementation of Multi-Sig Wallet === | |||
Bitstamp implemented a multi-signature wallet, in partnership with BitGo<ref name=":1" />. Bitstamp described themselves as "the first and only major bitcoin exchange to incorporate the industry's best security practices available today"<ref name=":0" />. | |||
=== Resumption of Trading === | |||
Trading resumed on January 9th, and customers can deposit and withdraw bitcoins securely<ref name="bitstamp-196" />. | |||
Customers were given a full week of commission-free trading on the platform<ref name=":0" />.<blockquote>On a personal note, I’d like to thank the incredible teams at Bitstamp and at our lead investor Pantera Capital who have worked around-the-clock from multiple time zones in the last few days. I’m incredibly proud of the herculean work of this extended team, and grateful to the phenomenal show of support from customers, friends, and partners in the bitcoin community.</blockquote> | |||
== | === Relaunch FAQ Posted === | ||
The platform shared a "Relaunch FAQ" post after the site was already back online. This covered over the reason for suspension, that the breach only affected a small fraction of Bitstamp's total bitcoin reserves, and that the majority of customer funds were held in secure offline cold storage systems. Bitstamp assured that no customer bitcoins held prior to the suspension were compromised, and Bitstamp is committed to reimbursing all legitimate deposits affected by the breach. As a gesture of gratitude to loyal customers, Bitstamp waived all commission fees for one week. The exchange has implemented additional security measures, including moving to Amazon Web Services, integrating multi-sig technology, and changing hosting locations<ref name="bitstamp-196" />. | |||
=== Improved Security Policies === | |||
According to Bitcoin Magazine, as a result of this theft, Bitstamp's security policies changed to store 98% of bitcoin in cold storage<ref name="bitcoinmagazine-6" />. CoinTelegraph reports that "carrying out transactions on Bitstamp [now] requires using multisignature, and 98 percent of the cryptocurrency is stored in a cold wallet"<ref name="cointelegraph-197" />. | |||
=== Third Party Coverage === | |||
The incident was included in SlowMist<ref name="slowmisthacked-1160" /> and listed as one of the six biggest hacks of all time by CoinSutra<ref name="coinsutra-202" />. | |||
=== Same Wallets Used In Hack Of Tether Stablecoin === | === Same Wallets Used In Hack Of Tether Stablecoin === | ||
| Line 118: | Line 219: | ||
== Total Amount Recovered == | == Total Amount Recovered == | ||
It is unclear whether customer funds were covered by the Bitstamp platform. A CoinTelegraph article reports that "[c]ompensation did not followed (sic)"<ref name="cointelegraph-197" />, however other sources seem to suggest that the platform continued operating and fully reimbursed customers<ref name="coinsutra-202" />. | |||
“all BTC held with [Bitstamp] prior to the temporary suspension of services were honored in full.” | |||
"We would like to reassure all Bitstamp customers that their balances held prior to our temporary suspension of services will not be affected and will be honored in full."<ref name="coinsutra-202" /> | |||
It is unclear if Bitstamp has made any progress on recovering the funds which were taken. | |||
== Ongoing Developments == | == Ongoing Developments == | ||
TBD | TBD | ||
=== Investigation With Law Enforcement === | |||
Bitstamp is reportedly working with law enforcement agencies on an investigation<ref name="bitstamp-196" />. On their FAQ, they stated they are "working closely with US and international law enforcement agencies specializing in digital-currency" but did not elaborate on which law enforcement agencies are involved<ref name="bitstamp-196" />. | |||
== General Prevention Policies == | == General Prevention Policies == | ||
Coming soon. | Coming soon. | ||
== Individual Prevention Policies == | == Individual Prevention Policies == | ||
{{Prevention:Individuals: | {{Prevention:Individuals:Avoid Third Party Custodians}} | ||
{{Prevention:Individuals:Store Funds Offline}} | |||
{{Prevention:Individuals:End}} | {{Prevention:Individuals:End}} | ||
== Platform Prevention Policies == | == Platform Prevention Policies == | ||
{{Prevention:Platforms: | {{Prevention:Platforms:Implement Multi-Signature}} | ||
{{Prevention:Platforms:Regular Audit Procedures}} | |||
{{Prevention:Platforms:Establish Industry Insurance Fund}} | |||
{{Prevention:Platforms:End}} | {{Prevention:Platforms:End}} | ||
== Regulatory Prevention Policies == | == Regulatory Prevention Policies == | ||
{{Prevention:Regulators: | {{Prevention:Regulators:Platform Security Assessments}} | ||
{{Prevention:Regulators:Establish Industry Insurance Fund}} | |||
{{Prevention:Regulators:End}} | {{Prevention:Regulators:End}} | ||
| Line 142: | Line 261: | ||
<references> | <references> | ||
<ref name="bitcoinmagazine-6">[https://bitcoinmagazine.com/articles/infographic-overview-compromised-bitcoin-exchange-events Infographic: An Overview of Compromised Bitcoin Exchange Events - Bitcoin Magazine] (Jan 30, 2020)</ref> | <ref name="bitcoinmagazine-6">[https://bitcoinmagazine.com/articles/infographic-overview-compromised-bitcoin-exchange-events Infographic: An Overview of Compromised Bitcoin Exchange Events - Bitcoin Magazine] (Jan 30, 2020)</ref> | ||
<ref name="kylegibson-86">[https://medium.com/@kylegibson/100-crypto-thefts-a-timeline-of-hacks-glitches-exit-scams-and-other-lost-cryptocurrency-873c87fd5522 100 Crypto Thefts: A Timeline of Hacks, Glitches, Exit Scams, and other Lost Cryptocurrency Incidents] (Jan 25, 2020)</ref> | <ref name="kylegibson-86">[https://medium.com/@kylegibson/100-crypto-thefts-a-timeline-of-hacks-glitches-exit-scams-and-other-lost-cryptocurrency-873c87fd5522 100 Crypto Thefts: A Timeline of Hacks, Glitches, Exit Scams, and other Lost Cryptocurrency Incidents - Kyle Gibson] (Jan 25, 2020)</ref> | ||
<ref name="ccn-195">[https://www.ccn.com/31-million-tether-hack-linked-to-27000-btc-in-previous-exchange-thefts/ $31 Million Tether Hack Linked to 27,000 BTC in Previous Bitcoin Theft - CCN] (Mar 2, 2020)</ref> | <ref name="ccn-195">[https://www.ccn.com/31-million-tether-hack-linked-to-27000-btc-in-previous-exchange-thefts/ $31 Million Tether Hack Linked to 27,000 BTC in Previous Bitcoin Theft - CCN] (Mar 2, 2020)</ref> | ||
<ref name="bitstamp-196">[https://www.bitstamp.net/article/relaunch-faq/ | <ref name="bitstamp-196">[https://www.bitstamp.net/article/relaunch-faq/ Relaunch FAQ - Bitstamp] (Mar 2, 2020)</ref> | ||
<ref name="cointelegraph-197">[https://cointelegraph.com/news/crypto-exchange-hacks-in-review-proactive-steps-and-expert-advice Crypto Exchange Hacks in Review: Proactive Steps and Expert Advice] (Mar 2, 2020)</ref> | <ref name="cointelegraph-197">[https://cointelegraph.com/news/crypto-exchange-hacks-in-review-proactive-steps-and-expert-advice Crypto Exchange Hacks in Review: Proactive Steps and Expert Advice - CoinTelegraph] (Mar 2, 2020)</ref> | ||
<ref name="coinsutra-202">[https://coinsutra.com/biggest-bitcoin-hacks/ Top 6 Biggest Bitcoin Hacks Ever - CoinSutra] (Mar 2, 2020)</ref> | <ref name="coinsutra-202">[https://coinsutra.com/biggest-bitcoin-hacks/ Top 6 Biggest Bitcoin Hacks Ever - CoinSutra] (Mar 2, 2020)</ref> | ||
<ref name="bravenewcoin-207">[https://bravenewcoin.com/insights/bitstamp-hack-result-of-phishing-attack-says-leaked-internal-report Brave New Coin] (Mar 2, 2020)</ref> | <ref name="bravenewcoin-207">[https://bravenewcoin.com/insights/bitstamp-hack-result-of-phishing-attack-says-leaked-internal-report Brave New Coin] (Mar 2, 2020)</ref> | ||
Latest revision as of 12:33, 3 January 2024
Notice: This page is a new case study and some aspects have not been fully researched. Some sections may be incomplete or reflect inaccuracies present in initial sources. Please check the References at the bottom for further information and perform your own additional assessment. Please feel free to contribute by adding any missing information or sources you come across. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.
Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!
Bitstamp was one of the largest and most widely used exchanges at the time. Multiple services such as ATMs sourced their liquidity from Bitstamp. A phishing attack tricked Bitstamp into releasing wallet backup files and pass phrases. Bitstamp has since set up multi-signature hot wallets through BitGo, while the majority of funds remain in cold storage. No customers of the exchange appear to have lost their funds in the incident as Bitstamp has reportedly covered all losses.
https://web.archive.org/web/20150702005806/https://www.scribd.com/word/removal/270137312
https://www.pymnts.com/news/2015/bitstamp-goes-dark-after-possible-hack/
https://www.reddit.com/r/Bitcoin/comments/2re2pw/18864_coins_stolen_from_stamp_that_doesnt_look/
https://web.archive.org/web/20220909002622/https://www.reddit.com/user/coinleak/
About Bitstamp
Bitstamp was originally founded in 2011[6], reportedly by the "Merlak brothers"[7]. Bitstamp has been reported as being based in Slovenia[6][7] and based in Luxembourg. Bitstamp is the world's longest-running cryptocurrency exchange[8].
A significant portion of the initial investment in Bitstamp at the time came from Pantera Capital[9].
"Bitstamp is a cryptocurrency exchange based in Luxembourg. It allows trading between fiat currency, bitcoin and other cryptocurrencies. It allows USD, EUR, GBP, bitcoin, ALGO, XRP, Ether, litecoin, bitcoin cash, XLM, Link, OMG Network, USD Coin or PAX deposits and withdrawals."
"Bitstamp makes trading easy, fast & reliable. With 24/7 support, staking and bank-grade security & insurance. Since 2011."
"The company was founded as a European-focused alternative to then-dominant bitcoin exchange Mt. Gox. While the company trades in US dollars, it accepts fiat money deposits for free only via the European Union's Single Euro Payments Area, a mechanism for transferring money between European bank accounts."
Wikipedia: [8]
Homepage: bitstamp.net[10]
Twitter: Bitstamp
The Reality
At the time of the attack, no cryptocurrency platforms were yet using multi-signature wallets. Bitstamp's staff stored backups of the private keys and passphrase on networked computers. The system administrator was not properly trained to defend against phishing attacks.
A wallet file (named wallet.dat) was encrypted with only a simple passphrase, which was also stored online.
What Happened
Bitstamp lost close to 19,000 BTC from the exchange’s hot wallet after a successful phishing attack against staff.
| Date | Event | Description |
|---|---|---|
| January 3rd, 2015 7:37:44 AM MST | First Blockchain Transaction | The first blockchain transaction occurs removing 3100 bitcoin from the Bitstamp hot wallet[11]. |
| January 4th, 2015 1:32:03 AM MST | Large Blockchain Transaction | The thefts continue. There are more transactions, including a large one for 1193.77829184 bitcoin[12]. |
| January 4th, 2015 6:51:22 AM MST | Large Blockchain Transaction | The thefts continue. There are more transactions, including a large one for 4021.56993171 bitcoin[13]. |
| January 4th, 2015 7:57:44 AM MST | Large Blockchain Transaction | The thefts continue. There are more transactions, including a large one for 3000 bitcoin[14]. |
| January 4th, 2015 | Breach Occurs | Bitstamp reports that the breach happened on January 4th[15]. |
| January 5th, 2015 2:00:00 AM MST | Withdrawals Reportedly Suspended | Withdrawals were reportedly suspended at 9 AM UTC on January 5th[6]. |
| January 5th, 2015 3:29:35 PM MST | CoinDesk Article Published | CoinDesk reports on the security breach resulting in the loss of less than 19,000 BTC (approximately $5.1 million). The compromise affected some of Bitstamp's operational wallets, leading to the suspension of deposits and ultimately a temporary shutdown of the platform. Bitstamp assured customers that funds held prior to the service suspension would not be affected, emphasizing that the majority of its Bitcoin reserves are stored in secure offline cold storage systems. The exchange is actively collaborating with law enforcement in an ongoing investigation. Bitstamp's CEO, Nejc Kodrič, stated that the breach represents only a small fraction of the total Bitcoin reserves, and efforts are underway to transfer a secure backup of the platform to a new environment, with plans to resume services in the coming days. The incident underscores the challenges and vulnerabilities faced by cryptocurrency exchanges, raising concerns about the security and mainstream viability of digital assets[16]. |
| January 6th, 2015 2:38:00 PM MST | Bank Info Security Article | Bank Info Security reports that European Bitcoin exchange Bitstamp experienced a data breach on January 4, leading to the theft of 19,000 Bitcoins valued at over $5 million[17]. Following the incident, BitStamp temporarily suspended its services and urged customers not to deposit funds into previously issued Bitcoin deposit addresses. The exchange assured customers that the breach, affecting some operational wallets, would not impact consumer assets, as the overwhelming majority of Bitstamp's Bitcoin reserves are stored in secure offline cold storage systems. Bitstamp is collaborating with law enforcement officials to investigate the incident, and the exchange plans to transfer a secure backup of its website to a new environment in the coming days. The breach highlights the ongoing vulnerabilities in the Bitcoin ecosystem and raises questions about the viability of Bitcoin as a mainstream alternative, particularly in terms of consumer protection[18]. TBD - Any new information in here. |
| January 7th, 2015 9:30:00 PM MST | Bank Info Security Article | The Bank Info Security article author promotes it with another tweet[19]. TBD - Check if article was updated in the meantime. |
| January 9th, 2015 10:52:35 AM MST | Bitstamp Resumes Service | Bitstamp announces the resumption of service in a blog post. The security breach resulted in a loss of less than 19,000 BTC, but the exchange assures customers that the overwhelming majority of its bitcoin reserves, stored in secure offline cold storage, remain unaffected[9]. Bitstamp suspended services to fully investigate the incident, engage with law enforcement, and rebuild systems from a secure backup onto entirely new hardware. The exchange has implemented additional security measures, including the integration of BitGo multi-sig technology, deployment on Amazon Web Services, and a commission-free trading period until January 17th as a gesture of gratitude to loyal customers. Bitstamp expresses confidence in its ability to emerge from this experience with even higher standards for trust and confidence in its services[9]. |
| January 9th, 2015 12:42:00 PM MST | BitGo Promotion Announcement | BitGo takes the opportunity to announce their partnership with Bitstamp on Twitter[20]. |
| January 9th, 2015 3:50:00 PM MST | BitStamp Back Online | BitStamp is reportedly back online[21][22]. |
| January 12th, 2015 7:24:18 PM MST | Relaunch FAQ Published | Bitstamp posts a "Relaunch FAQ" on their website, which covers over many details of what happened and the path forward[15]. The date of the breach is provided as January 4th, and the post justifies the temporary suspension of services on January 5th for forensic analysis, investigation, and system redeployment. The breach affected a small fraction of Bitstamp's total bitcoin reserves, and the majority of customer funds were held in secure offline cold storage systems. No customer bitcoins held prior to the suspension were compromised, and Bitstamp is committed to reimbursing all legitimate deposits affected by the breach. As a gesture of gratitude to loyal customers, Bitstamp waived all commission fees for one week. The exchange has implemented additional security measures, including moving to Amazon Web Services, integrating multi-sig technology, and changing hosting locations. Bitstamp is working with law enforcement agencies on the investigation and has no evidence of compromised customer data. Trading resumed on January 9th, and customers can deposit and withdraw bitcoins securely[15]. |
| October 19th, 2017 2:11:44 AM MDT | CoinSutra Biggest Bitcoin Hacks | CoinSutra publishes an article titled "Top 6 Biggest Bitcoin Hacks Ever", which discusses significant historical Bitcoin hacks to emphasize the importance of securing private keys. Bitstamp is included among the mentioned hacks as a Slovenian Bitcoin exchange founded in 2011, with a hack date of January 4, 2015. During this incident, an anonymous hacker compromised Bitstamp's operational hot wallet, resulting in the loss of 19,000 bitcoins, equivalent to $5 million at the time. Bitstamp suspended operations temporarily but resumed with enhanced security measures, such as implementing BitGo multisig wallets. Despite the setback, Bitstamp managed to regain user trust and continues to operate successfully. The article serves as a cautionary tale, urging readers to prioritize securing their private keys and advocating for the use of hardware wallets to safeguard cryptocurrencies[6]. |
| November 21st, 2017 12:45:47 PM MST | CCN Article Linking To Tether Hack | A CCN article has managed to trace the funds to be linked to a $31m hack of the Tether stablecoin. "This same wallet" which "had received .01 BTC shortly before the hack" "was first used to steal more than 18,500 BTC — worth $5 million then but more than $150 million today — from Bitstamp in January 2015."[23] |
| August 31st, 2018 8:07:00 AM MDT | CoinTelegraph Article On Breaches | CoinTelegraph publishes an article with additional information on many breaches of major exchanges including Bitstamp[7]. This article describes the phishing attack as "banal", suggesting that there was no novelty in the method of attack. It appears to be a spear phishing attack where "exchange employees [reportedly] received personal emails and messages in Skype from seemingly friendly sources". The attack was even successful against the "system administrator Luka Kodrich", who reportedly "clicked the link and downloaded malware onto the working computer". They report that "[c]ompensation did not followed (sic)", which suggests that no recovery was provided for affected users. Information on the steps taken to better secure the platform are also highlighted[7]. |
| February 27th, 2019 11:31:32 AM MST | Inclusion In Kyle Gibson Timeline | Kyle Gibson includes the incident in his "100 Crypto Thefts: A Timeline of Hacks, Glitches, Exit Scams, and other Lost Cryptocurrency Incidents"[24]. Curiously, this incident is listed as a "Theft - Exit Scam" and it notes that "prompting [Bitstamp] to halt deposits and later shut down its platform entirely". The Bitstamp platform was still operating at the time of publication. |
| May 7th, 2019 7:49:57 PM MDT | Inclusion In BitcoinExchangeGuide | The incident is included as a "Hack / Theft" in a published list by BitcoinExchangeGuide.com[25]. |
| May 24th, 2019 12:56:03 PM MDT | Bitcoin Magazine Inclusion | The incident is included in an infographic put together by Bitcoin Magazine[26]. The Bitstamp hack occupies a central position on their chart of bitcoin price versus amount lost. Limited information is provided, with the hack data only listed as "January 2015", however it mentions that "[a]s a result of the theft, Bitstamp began to keep 98 percent of its bitcoin in cold storage"[26]. |
Technical Details
The attack against Bitstamp was a spearphishing campaign[7]. Multiple employees of the platform appear to have been targeted with friendly emails and Skype communication[7]. The most significant part of the attack was a successful phishing of the system administrator, an individual named Luka Kodrich[7].
Luka was tricked into clicking on a link and downloading malware onto the Bitstamp work computer[7], allowing the attacker to access multiple PCs. While the wallet and passphrase were stored on separate computers, computers in the system were all networked together, and the attacker with system administrator level access was able to get both the wallet.dat file and the passphrase required to unlock it. These were copied to a server run by a German hosting provider and subsequently used to withdraw close to 19,000 bitcoin.
Spearphishing Campaign
"Surprisingly, a banal phishing attack was used by hackers — the exchange employees received personal emails and messages in Skype from seemingly friendly sources.”[7]
“Six employees of Bitstamp were targeted in a weeks-long phishing attempt leading up to the theft of roughly $5m in bitcoin in January, according to an unconfirmed incident report said to be drafted internally by the bitcoin exchange.”
“What’s maybe even more surprising is that the person responsible for security, Bitstamp system administrator Luka Kodrich, clicked the link and downloaded malware onto the working computer, after which the exchange was hacked. Bitstamp hurried to notify traders about what was happening, however, the attackers had already stolen the funds.”[7]
Wallet/Passphrase Files Copied
A wallet file (named wallet.dat) was encrypted with only a simple passphrase, which was also stored online.
“On this occasion, Mr.Kodric[h] was certain that these logins were not made by him, and must therefore have been the attacker. Analysis indicates that the attacker accessed LNXSRVBTC, where the wallet.dat file was held, and the DORNATA server, where the passphrase for the bitcoin wallet was stored, before data was transferred out to both servers to IP 1**.**.***.**8, which is part of a range owned by a German hosting provider. We suspect that the the attacker copied the Bitcoin wallet file and passphrase at this stage [...]”
Withdrawal of Funds
“Together the wallet and passphrase would have enabled the attacker to steal bitcoins from the Bitcoin wallet.”
Links To Tether Hack
“A wallet associated with [the] $31 million Tether hack has been linked to previous bitcoin exchange thefts numbering in the tens of thousands of bitcoins.”
No, the team and physical operations remain in the EU. Some of our team was in the US during the breach, but no operations were moved.[15]
Blockchain Information
Thief Wallet Address: 1L2JsXHPMYuAa9ugvHGLwkdstCPUDemNCf[27]
First Blockchain Transaction: a32697f1796b7b87d953637ac827e11b84c6b0f9237cff793f329f877af50aea
Total Amount Lost
Despite the initial announcement from Bitstamp being clear that the amount was "less than 19,000 BTC"[6], the amount lost is consistently reported as 19,000 BTC across almost all major sources[18][24][25][26][6].
Various sources have reported this amount as "equivalent to $5 million", "$5.000k"[25], "5,000,000.00"[24], "$5 million"[6], "more than $5 million"[18], and "about $5.1m at press time"[16].
There is no reason to believe that any personal information was compromised[15].
The total amount lost has been estimated at $5,100,000 USD.
Immediate Reactions
Halting Of Platform
The compromise affected some of Bitstamp's operational wallets, leading to the suspension of deposits and ultimately a temporary shutdown of the platform[16]. BitStamp temporarily suspended its services and urged customers not to deposit funds into previously issued Bitcoin deposit addresses[18]. The exchange assured customers that the breach, affecting some operational wallets, would not impact consumer assets, as the overwhelming majority of Bitstamp's Bitcoin reserves are stored in secure offline cold storage systems[18].
The Bitstamp platform was taken offline on January 5th[15]. Bitstamp provided a justification for this on multiple occasions[15][9]:
We took the decision to rebuild our systems from the ground up from a secure backup for a few reasons. By redeploying our system from a secure backup onto entirely new hardware, we were able to preserve the evidence for a full forensic investigation of the crime. We have also taken this time to implement a number of new security measures and protocols so that customers can resume using Bitstamp with full confidence and trust. While this decision means we have not been able to provide you with services for a number of days, we feel this extra measure of precaution was in the best interest of our customers.
As an additional security measure, we suspended our systems and disabled our website to preserve the forensic environment, to engage with authorities to fully investigate the incident, and to redeploy from a secure backup a totally new instance of our code and platform on totally new hardware. We also moved our hosting location from a local hosting site to Amazon Web Services (in the EU) and implemented multi-sig technology to further improve security—the first major exchange to do so.
Report of Platform Breach
Bitstamp, reported the security breach resulting in the loss of less than 19,000 BTC (approximately $5.1 million)[16]. Bitstamp assured customers that funds held prior to the service suspension would not be affected, emphasizing that the majority of its Bitcoin reserves are stored in secure offline cold storage systems[16]. The exchange reported they were actively collaborating with law enforcement in an ongoing investigation[16]. Bitstamp's CEO, Nejc Kodrič, stated that the breach represents only a small fraction of the total Bitcoin reserves, and efforts are underway to transfer a secure backup of the platform to a new environment, with plans to resume services in the coming days[16].
"Bitstamp customers can rest assured that their bitcoins held with us prior to temporary suspension of services on January 5th (at 9 am UTC) are completely safe and will be honored in 'full.
On January 4th, some of Bitstamp's operational wallets were compromised, resulting in a loss of less than 19,000 BTC. Upon learning of the breach, we immediately notified all customers that they should no longer make deposits to previously issued bitcoin deposit addresses. As an additional security measure. we suspended our systems while we fully investigate the incident and actively engage with law enforcement officials.
This breach represents a small fraction of Bitstamp's total bitcoin reserves, the overwhelming majority of which are are held in secure offline cold storage systems. We would like to reassure all Bitstamp customers that their balances held prior to our temporary suspension of services will not be affected and will be honored in full.
We appreciate customers' patience during this disruption of services. We are working to transfer a secure backup of the Bitstamp site onto a new safe environment and will be bringing this online in the corning days. Customers can stay informed via updates on our website, on Twitter (@Bitstamp) and through Bitstamp customer support at support@bitstamp.net."
Ultimate Outcome
Trading on the Bitstamp platform was resumed on January 9th. A Relaunch FAQ was posted shortly afterward on January 12th. Bitstamp ultimately improved their platform security as a result, implementing multi-signature security. The same attacker appears to have succeeded at breaching Tether, however those funds were quickly frozen.
Redeployment on New Hardware
Bitstamp redeployed "on 100% new hardware deployed from a completely secure backup of our code and data"[9].
This new hardware was apparently using Amazon Web Services. "Bitstamp is now running on Amazon’s world-class AWS cloud infrastructure, architected to be one of the most secure and reliable cloud computing environments available."[9]
Implementation of Multi-Sig Wallet
Bitstamp implemented a multi-signature wallet, in partnership with BitGo[20]. Bitstamp described themselves as "the first and only major bitcoin exchange to incorporate the industry's best security practices available today"[9].
Resumption of Trading
Trading resumed on January 9th, and customers can deposit and withdraw bitcoins securely[15].
Customers were given a full week of commission-free trading on the platform[9].
On a personal note, I’d like to thank the incredible teams at Bitstamp and at our lead investor Pantera Capital who have worked around-the-clock from multiple time zones in the last few days. I’m incredibly proud of the herculean work of this extended team, and grateful to the phenomenal show of support from customers, friends, and partners in the bitcoin community.
Relaunch FAQ Posted
The platform shared a "Relaunch FAQ" post after the site was already back online. This covered over the reason for suspension, that the breach only affected a small fraction of Bitstamp's total bitcoin reserves, and that the majority of customer funds were held in secure offline cold storage systems. Bitstamp assured that no customer bitcoins held prior to the suspension were compromised, and Bitstamp is committed to reimbursing all legitimate deposits affected by the breach. As a gesture of gratitude to loyal customers, Bitstamp waived all commission fees for one week. The exchange has implemented additional security measures, including moving to Amazon Web Services, integrating multi-sig technology, and changing hosting locations[15].
Improved Security Policies
According to Bitcoin Magazine, as a result of this theft, Bitstamp's security policies changed to store 98% of bitcoin in cold storage[26]. CoinTelegraph reports that "carrying out transactions on Bitstamp [now] requires using multisignature, and 98 percent of the cryptocurrency is stored in a cold wallet"[7].
Third Party Coverage
The incident was included in SlowMist[28] and listed as one of the six biggest hacks of all time by CoinSutra[6].
Same Wallets Used In Hack Of Tether Stablecoin
“A wallet associated with [the] $31 million Tether hack has been linked to previous bitcoin exchange thefts numbering in the tens of thousands of bitcoins.”
In 2017, a $31 million Tether hack was linked to the previous Bitstamp theft involving tens of thousands of bitcoins[23]. The Tether development team disclosed the hack of its hot wallet, and an analyst discovered a connection between the wallet used in the Tether hack and those involved in the 2015 Bitstamp bitcoin exchange theft of over 18,500 BTC, valued at $5 million then and over $150 million today[23]. The hacker, who seems to have stolen at least $250 million in current value, brazenly linked wallets from multiple hacks, even connecting them to LocalBitcoins transactions from 2015[23]. The analyst suggests that the hacker either disregards the power of blockchain analytics tools or is ignorant of their capabilities[23].
Total Amount Recovered
It is unclear whether customer funds were covered by the Bitstamp platform. A CoinTelegraph article reports that "[c]ompensation did not followed (sic)"[7], however other sources seem to suggest that the platform continued operating and fully reimbursed customers[6].
“all BTC held with [Bitstamp] prior to the temporary suspension of services were honored in full.”
"We would like to reassure all Bitstamp customers that their balances held prior to our temporary suspension of services will not be affected and will be honored in full."[6]
It is unclear if Bitstamp has made any progress on recovering the funds which were taken.
Ongoing Developments
TBD
Investigation With Law Enforcement
Bitstamp is reportedly working with law enforcement agencies on an investigation[15]. On their FAQ, they stated they are "working closely with US and international law enforcement agencies specializing in digital-currency" but did not elaborate on which law enforcement agencies are involved[15].
General Prevention Policies
Coming soon.
Individual Prevention Policies
When using any third party custodial platform (such as for trading), it is important to verify that the platform has a full backing of all assets, and that assets have been secured in a proper multi-signature wallet held by several trusted and trained individuals. If this can't be validated, then users should avoid using that platform. Unfortunately, most centralized platforms today still do not provide the level of transparency and third party validation which would be necessary to ensure that assets have been kept secure and properly backed. Therefore, the most effective strategy at present remains to learn proper self custody practices and avoid using any third party custodial platforms whenever possible.
Store the majority of funds offline. By offline, it means that the private key and/or seed phrase is exclusively held by you and not connected to any networked device. Examples of offline storage include paper wallets (seed phrase or key written down and deleted from all electronic media), hardware wallets, steel wallet devices, etc...
For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.
Platform Prevention Policies
All wallets, minting functions, and critical infrastructure should be implemented with a multi-signature requirement, with a recommended minimum of 3 signatures required. This means that making important changes or approving spending will require the keys held by at least 3 separate individuals within the organization to approve. The multi-signature should be implemented at the lowest layer possible, all key holders should have security training, and all key holders should be empowered and encouraged to exercise diligence.
All aspects of any platform should undergo a regular validation/inspection by experts. This validation should include a security audit of any smart contracts, reporting any risks to the backing (of any customer assets, ensuring treasuries or minting functions are properly secured under the control of a multi-signature wallet, and finding any inadequacies in the level of training or integrity of the team. The recommended interval is twice prior to launch or significant system upgrade, once after 3 months, and every 6 months thereafter. It is recommended that the third party performing the inspection not be repeated within a 14 month period.
Work with other industry platforms to set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.
For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.
Regulatory Prevention Policies
All platforms should undergo published security and risk assessments by independent third parties. Two assessments are required at founding or major upgrade, one after 3 months, and one every 6 months thereafter. The third parties must not repeat within the past 14 months. A risk assessment needs to include what assets back customer deposits and the risk of default from any third parties being lent to. The security assessment must include ensuring a proper multi-signature wallet, and that all signatories are properly trained. Assessments must be performed on social media, databases, and DNS security.
Set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services within the country, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.
For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.
References
- ↑ Brave New Coin (Mar 2, 2020)
- ↑ Details of $5 Million Bitstamp Hack Revealed - CoinDesk (Mar 2, 2020)
- ↑ http://www.reuters.com/article/2015/01/06/us-bitstamp-cybersecurity-idUSKBN0KF0UH20150106Dec 11, 2023)(
- ↑ Cryptocurrency Security Threats: From Mt Gox To Bitstamp - The Data Scientist (Jan 3, 2024)
- ↑ Bitstamp Incident Report Content Removed (Jan 3, 2024)
- ↑ 6.0 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 Top 6 Biggest Bitcoin Hacks Ever - CoinSutra (Mar 2, 2020)
- ↑ 7.00 7.01 7.02 7.03 7.04 7.05 7.06 7.07 7.08 7.09 7.10 7.11 Crypto Exchange Hacks in Review: Proactive Steps and Expert Advice - CoinTelegraph (Mar 2, 2020)
- ↑ 8.0 8.1 Bitstamp - Wikipedia (Dec 12, 2021)
- ↑ 9.0 9.1 9.2 9.3 9.4 9.5 9.6 9.7 Bitstamp is open for business - better than ever! - Bitstamp (Dec 13, 2023)
- ↑ Bitstamp Homepage (Dec 12, 2021)
- ↑ First Theft Transaction Withdrawing 3100 BTC - Blockchain Explorer (Jan 3, 2024)
- ↑ Theft Transaction Withdrawing 1193.77829184 BTC (Jan 3, 2024)
- ↑ Theft Transaction Withdrawing 4021.58042222 BTC (Jan 3, 2024)
- ↑ Theft Transaction Withdrawing 3000 BTC (Jan 3, 2024)
- ↑ 15.00 15.01 15.02 15.03 15.04 15.05 15.06 15.07 15.08 15.09 15.10 Relaunch FAQ - Bitstamp (Mar 2, 2020)
- ↑ 16.0 16.1 16.2 16.3 16.4 16.5 16.6 Bitstamp Claims $5 Million Lost in Hot Wallet Hack - CoinDesk (Mar 4, 2020)
- ↑ gen_sec - "#Bitcoin Exchange Reports #Data #Breach: http://bit.ly/1DuW4Kb - @databreachtoday" - Twitter (Dec 11, 2023)
- ↑ 18.0 18.1 18.2 18.3 18.4 Bitcoin Exchange Reports Data Breach - BankInfoSecurity (Dec 12, 2021)
- ↑ gen_sec - "#Bitcoin Exchange Reports #Data #Breach: http://bit.ly/143bbxy - @databreachtoday" - Twitter (Dec 11, 2023)
- ↑ 20.0 20.1 BitGo - "BREAKING. @Bitstamp partners with @BitGo for multi-sig #bitcoin security and relaunches exchange" - Twitter (Dec 13, 2023)
- ↑ gen_sec - "#Bitstamp Back Online After #Breach: http://bit.ly/1x5tTvE - @databreachtoday" - Twitter (Dec 11, 2023)
- ↑ Bitstamp Back Online After Breach - DataBreachToday (Dec 11, 2023)
- ↑ 23.0 23.1 23.2 23.3 23.4 $31 Million Tether Hack Linked to 27,000 BTC in Previous Bitcoin Theft - CCN (Mar 2, 2020)
- ↑ 24.0 24.1 24.2 100 Crypto Thefts: A Timeline of Hacks, Glitches, Exit Scams, and other Lost Cryptocurrency Incidents - Kyle Gibson (Jan 25, 2020)
- ↑ 25.0 25.1 25.2 Bitcoin Scams and Cryptocurrency Hacks List - BitcoinExchangeGuide.com Archive April 13th, 2020 7:45:28 AM MDT (Mar 5, 2020)
- ↑ 26.0 26.1 26.2 26.3 Infographic: An Overview of Compromised Bitcoin Exchange Events - Bitcoin Magazine (Jan 30, 2020)
- ↑ Bitstamp Theft Address - Blockchain Explorer (Jan 3, 2024)
- ↑ SlowMist Hacked - SlowMist Zone (Jun 26, 2021)