DragonEx Hacking Theft: Difference between revisions

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Jump to navigation Jump to search
(Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/dragonexhackingtheft.php}} thumb|DragonExSingapore-based exchange DragonEx was breached through an elaborate corporate spearfishing attack, blamed on the North Korean Lazarus Group. This included creating a fake development company, and pitching the sale of a trading bot. This brought staff to download and install malware on their computers, which compromised all the hot wall...")
 
No edit summary
Line 1: Line 1:
{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/dragonexhackingtheft.php}}
{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/dragonexhackingtheft.php}}
{{Unattributed Citations}}


[[File:Dragonex.jpg|thumb|DragonEx]]Singapore-based exchange DragonEx was breached through an elaborate corporate spearfishing attack, blamed on the North Korean Lazarus Group. This included creating a fake development company, and pitching the sale of a trading bot. This brought staff to download and install malware on their computers, which compromised all the hot wallets. The platform appears to be back online at the moment. Some reports indicated that some of the funds had been returned, and there was a later article with a compensation plan. It appears that DragonEx briefly shut off withdrawals on Oct 21st, which was blamed on the attack.
[[File:Dragonex.jpg|thumb|DragonEx]]Singapore-based exchange DragonEx was breached through an elaborate corporate spearfishing attack, blamed on the North Korean Lazarus Group. This included creating a fake development company, and pitching the sale of a trading bot. This brought staff to download and install malware on their computers, which compromised all the hot wallets. The platform appears to be back online at the moment. Some reports indicated that some of the funds had been returned, and there was a later article with a compensation plan. It appears that DragonEx briefly shut off withdrawals on Oct 21st, which was blamed on the attack.


This exchange or platform is based in Singapore, or the incident targeted people primarily in Singapore.
This exchange or platform is based in Singapore, or the incident targeted people primarily in Singapore.
<ref name="coindesk-29" /><ref name="coindesk-47" /><ref name="cryptoglobe-48" /><ref name="dragonex-51" /><ref name="cryptonews-88" /><ref name="breakermag-68" /><ref name="ciphertrace-99" /><ref name="cointelegraph-130" /><ref name="fintechnews-164" /><ref name="bitcoinexchangeguide-218" /><ref name="slowmisthacked-1160" /><ref name="8btc-2257" /><ref name="bitcoinmagazine-2258" /><ref name="cryptoxdirectory-2276" /><ref name="dragonex-4802" /><ref name="dragonexentelegram-4803" /><ref name="slowmisthacked-678" /><ref name="crunchbase-4804" /><ref name="cryptowisser-4805" /><ref name="dragonexnetworklinkedin-4806" /><ref name="cointelegraph-4807" /><ref name="cointelligence-4808" /><ref name="coindesk-4809" /><ref name="cointelegraph-4810" /><ref name="technologyreview-4811" />


== About DragonEx ==
== About DragonEx ==
Line 61: Line 63:


Don't Include:
Don't Include:
* Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
* Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
* Anything that wasn't reasonably knowable at the time of the event.
* Anything that wasn't reasonably knowable at the time of the event.
Line 83: Line 84:
|-
|-
|March 24th, 2019 12:00:00 AM
|March 24th, 2019 12:00:00 AM
|First Event
|Main Event
|This is an expanded description of what happened and the impact. If multiple lines are necessary, add them here.
|Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.
|-
|
|
|
|-
|-
|
|
Line 96: Line 93:


== Total Amount Lost ==
== Total Amount Lost ==
The total amount lost is unknown.
The total amount lost has been estimated at $7,000,000 USD.


How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?
How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?
Line 107: Line 104:


== Total Amount Recovered ==
== Total Amount Recovered ==
It is unknown how much was recovered.
There do not appear to have been any funds recovered in this case.


What funds were recovered? What funds were reimbursed for those affected users?
What funds were recovered? What funds were reimbursed for those affected users?
Line 118: Line 115:


== References ==
== References ==
[https://www.coindesk.com/upbit-is-the-sixth-major-crypto-exchange-hack-of-2019 Upbit Is the Seventh Major Crypto Exchange Hack of 2019 - CoinDesk] (Feb 3)
<references><ref name="coindesk-29">[https://www.coindesk.com/upbit-is-the-sixth-major-crypto-exchange-hack-of-2019 Upbit Is the Seventh Major Crypto Exchange Hack of 2019 - CoinDesk] (Feb 3, 2020)</ref>


[https://www.coindesk.com/singapore-based-crypto-exchange-dragonex-has-been-hacked Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk] (Feb 5)
<ref name="coindesk-47">[https://www.coindesk.com/singapore-based-crypto-exchange-dragonex-has-been-hacked Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk] (Feb 5, 2020)</ref>


[https://www.cryptoglobe.com/latest/2019/03/dragonex-hacked-users-crypto-transferred-and-stolen/ DragonEx Hacked: Users’ Crypto ‘Transferred and Stolen’ | CryptoGlobe] (Feb 5)
<ref name="cryptoglobe-48">[https://www.cryptoglobe.com/latest/2019/03/dragonex-hacked-users-crypto-transferred-and-stolen/ DragonEx Hacked: Users’ Crypto ‘Transferred and Stolen’ | CryptoGlobe] (Feb 5, 2020)</ref>


[https://dragonex.io/en-us/news?curIdx=1&curBlock=Announcement DragonEx Announcements] (Feb 6)
<ref name="dragonex-51">[https://dragonex.io/en-us/news?curIdx=1&curBlock=Announcement DragonEx Announcements] (Feb 6, 2020)</ref>


[https://cryptonews.com/news/dragonex-hack-usd-7-million-in-crypto-stolen-compensations-i-3605.htm DragonEx Hack: USD 7 million in Crypto Stolen, Compensations in Sight] (Feb 14)
<ref name="cryptonews-88">[https://cryptonews.com/news/dragonex-hack-usd-7-million-in-crypto-stolen-compensations-i-3605.htm DragonEx Hack: USD 7 million in Crypto Stolen, Compensations in Sight] (Feb 14, 2020)</ref>


[https://breakermag.com/dragonex-was-hacked-heres-what-we-know-so-far/ DragonEx Was Hacked. Here’s What We Know So Far] (Feb 7)
<ref name="breakermag-68">[https://breakermag.com/dragonex-was-hacked-heres-what-we-know-so-far/ DragonEx Was Hacked. Here’s What We Know So Far] (Feb 7, 2020)</ref>


[https://ciphertrace.com/articles/q1-2019-cryptocurrency-anti-money-laundering-report/ Q1 2019 Cryptocurrency Anti-Money Laundering Report - CipherTrace] (Feb 19)
<ref name="ciphertrace-99">[https://ciphertrace.com/articles/q1-2019-cryptocurrency-anti-money-laundering-report/ Q1 2019 Cryptocurrency Anti-Money Laundering Report - CipherTrace] (Feb 19, 2020)</ref>


[https://cointelegraph.com/news/most-significant-hacks-of-2019-new-record-of-twelve-in-one-year Most Significant Hacks of 2019 — New Record of Twelve in One Year] (Feb 22)
<ref name="cointelegraph-130">[https://cointelegraph.com/news/most-significant-hacks-of-2019-new-record-of-twelve-in-one-year Most Significant Hacks of 2019 — New Record of Twelve in One Year] (Feb 22, 2020)</ref>


[https://fintechnews.sg/23594/blockchain/cryptocurrency-hack-binance/ A Look Back on Some of the Most Devastating Crypto Hacks | Fintech Singapore] (Feb 26)
<ref name="fintechnews-164">[https://fintechnews.sg/23594/blockchain/cryptocurrency-hack-binance/ A Look Back on Some of the Most Devastating Crypto Hacks | Fintech Singapore] (Feb 26, 2020)</ref>


[https://bitcoinexchangeguide.com/bitcoin/scams-hacks/ Bitcoin Scams and Cryptocurrency Hacks List - BitcoinExchangeGuide.com] (Mar 4)
<ref name="bitcoinexchangeguide-218">[https://bitcoinexchangeguide.com/bitcoin/scams-hacks/ Bitcoin Scams and Cryptocurrency Hacks List - BitcoinExchangeGuide.com] (Mar 5, 2020)</ref>


[https://hacked.slowmist.io/en/?c=Exchange SlowMist Hacked - SlowMist Zone] (Jun 25)
<ref name="slowmisthacked-1160">[https://hacked.slowmist.io/en/?c=Exchange SlowMist Hacked - SlowMist Zone] (Jun 25, 2021)</ref>


[https://news.8btc.com/dragonex-hacked-investigation-is-undergoing DragonEx Hacked, Investigation is Undergoing | NEWS.8BTC.COM] (Aug 6)
<ref name="8btc-2257">[https://news.8btc.com/dragonex-hacked-investigation-is-undergoing DragonEx Hacked, Investigation is Undergoing | NEWS.8BTC.COM] (Aug 6, 2021)</ref>


[https://bitcoinmagazine.com/culture/lazarus-hacker-group-continues-target-crypto-using-faked-trading-software Lazarus Hacker Group Continues to Target Crypto Using Faked Trading Software - Bitcoin Magazine: Bitcoin News, Articles, Charts, and Guides] (Aug 7)
<ref name="bitcoinmagazine-2258">[https://bitcoinmagazine.com/culture/lazarus-hacker-group-continues-target-crypto-using-faked-trading-software Lazarus Hacker Group Continues to Target Crypto Using Faked Trading Software - Bitcoin Magazine: Bitcoin News, Articles, Charts, and Guides] (Aug 7, 2021)</ref>


[https://cryptoxdirectory.com/hacked_2019 The 23 exchange hacks of 2019] (Aug 7)
<ref name="cryptoxdirectory-2276">[https://cryptoxdirectory.com/hacked_2019 The 23 exchange hacks of 2019] (Aug 7, 2021)</ref>


[https://dragonex.io/en-us/ https://dragonex.io/en-us/] (Dec 24)
<ref name="dragonex-4802">[https://dragonex.io/en-us/ https://dragonex.io/en-us/] (Dec 24, 2021)</ref>


[https://t.me/DragonEx_EN/5095 Telegram: Contact @DragonEx_EN] (Dec 25)
<ref name="dragonexentelegram-4803">[https://t.me/DragonEx_EN/5095 Telegram: Contact @DragonEx_EN] (Dec 25, 2021)</ref>


[https://hacked.slowmist.io/en/?c=ETH%20DApp SlowMist Hacked - SlowMist Zone] (May 17)
<ref name="slowmisthacked-678">[https://hacked.slowmist.io/en/?c=ETH%20DApp SlowMist Hacked - SlowMist Zone] (May 17, 2021)</ref>


[https://www.crunchbase.com/organization/dragonex https://www.crunchbase.com/organization/dragonex] (Dec 25)
<ref name="crunchbase-4804">[https://www.crunchbase.com/organization/dragonex https://www.crunchbase.com/organization/dragonex] (Dec 25, 2021)</ref>


[https://www.cryptowisser.com/exchange/dragonex/ DragonEX – Reviews, Trading Fees & Cryptos (2022) | Cryptowisser] (Dec 25)
<ref name="cryptowisser-4805">[https://www.cryptowisser.com/exchange/dragonex/ DragonEX – Reviews, Trading Fees & Cryptos (2022) | Cryptowisser] (Dec 25, 2021)</ref>


[https://www.linkedin.com/company/dragonex-network/about/ https://www.linkedin.com/company/dragonex-network/about/] (Dec 25)
<ref name="dragonexnetworklinkedin-4806">[https://www.linkedin.com/company/dragonex-network/about/ https://www.linkedin.com/company/dragonex-network/about/] (Dec 25, 2021)</ref>


[https://cointelegraph.com/news/dragonex-crypto-exchange-considering-shutdown-amid-okex-crisis-of-trust DragonEx crypto exchange considering shutdown amid OKEx 'crisis of trust'] (Dec 26)
<ref name="cointelegraph-4807">[https://cointelegraph.com/news/dragonex-crypto-exchange-considering-shutdown-amid-okex-crisis-of-trust DragonEx crypto exchange considering shutdown amid OKEx 'crisis of trust'] (Dec 26, 2021)</ref>


[https://www.cointelligence.com/exchanges_list/dragonex/ DragonEx Review and Analysis: Is it safe or a scam? We've checked and verified!] (Dec 26)
<ref name="cointelligence-4808">[https://www.cointelligence.com/exchanges_list/dragonex/ DragonEx Review and Analysis: Is it safe or a scam? We've checked and verified!] (Dec 26, 2021)</ref>


[https://www.coindesk.com/markets/2019/03/26/singapore-based-crypto-exchange-dragonex-has-been-hacked/ Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk] (Dec 26)
<ref name="coindesk-4809">[https://www.coindesk.com/markets/2019/03/26/singapore-based-crypto-exchange-dragonex-has-been-hacked/ Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk] (Dec 26, 2021)</ref>


[https://cointelegraph.com/news/north-korean-hackers-created-realistic-trading-bot-to-steal-money Report: North Korean Hackers Created Realistic Trading Bot to Steal Money] (Dec 26)
<ref name="cointelegraph-4810">[https://cointelegraph.com/news/north-korean-hackers-created-realistic-trading-bot-to-steal-money Report: North Korean Hackers Created Realistic Trading Bot to Steal Money] (Dec 26, 2021)</ref>


[https://www.technologyreview.com/2020/01/24/276082/lazarus-group-dragonex-chainalysis/ https://www.technologyreview.com/2020/01/24/276082/lazarus-group-dragonex-chainalysis/] (Dec 26)
<ref name="technologyreview-4811">[https://www.technologyreview.com/2020/01/24/276082/lazarus-group-dragonex-chainalysis/ https://www.technologyreview.com/2020/01/24/276082/lazarus-group-dragonex-chainalysis/] (Dec 26, 2021)</ref></references>

Revision as of 02:01, 17 February 2023

Notice: This page is a freshly imported case study from the original repository. The original content was in a different format, and may not have relevant information for all sections. Please help restructure the content by moving information from the 'About' section to other sections, and add any missing information or sources you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!

DragonEx

Singapore-based exchange DragonEx was breached through an elaborate corporate spearfishing attack, blamed on the North Korean Lazarus Group. This included creating a fake development company, and pitching the sale of a trading bot. This brought staff to download and install malware on their computers, which compromised all the hot wallets. The platform appears to be back online at the moment. Some reports indicated that some of the funds had been returned, and there was a later article with a compensation plan. It appears that DragonEx briefly shut off withdrawals on Oct 21st, which was blamed on the attack.

This exchange or platform is based in Singapore, or the incident targeted people primarily in Singapore. [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]

About DragonEx

"DragonEX is a cryptocurrency exchange based in Singapore. It has been active since 2017." "Singapore-based DragonEx [is] one of the top 50 cryptocurrency exchanges by trading volume." "DragonEx is a trading platform for issuing cryptocurrencies. Provide safe and convenient digital asset trading services for new users and Chinese users.Dragon Net is also known as the Dragon Exchange. The English name is Dragonex, which is a digital currency trading platform registered in Singapore. The platform adopts a leading design pattern andissues Dragon Token (DT), which will distribute the commission income of the trading platform to all Dragoncoin holders according to the Dragon Coin holding ratio."

"Launched on 2 November 2017 in Singapore, DragonEx is a cryptocurrency exchange with an accumulative transaction volume of $25.5 billion. DragonEx is the pioneer of the transaction mining model, and 100% of trading commission income is promised to share with DT holders. Since DT was first launched on November 2nd, 2017, DragonEx has been shared $51 million dividends with DT holders. DragonEx is a community-driven exchange with over 300,000 KYC-verified users and aims to become the best community exchange. As of Jun 2019, there are over 18 wechat communities, 8 QQ Communities, and 2 telegram communities for DragonEx. DragonEx focuses on the Asian market but is expanding the oversea market. DragonEx has reached a deep cooperation with Bitfinex in August 2019."

"DragonEX is a cryptocurrency exchange / digital asset exchange based in Singapore. A DragonEX exchange review reveals that they serve the crypto community via no less than a 103 active markets. They also seem to provide trading access to various crypto-to-crypto currency pairs. The main currencies seem to include Tether (USDT), Bitcoin (BTC), Ethereum (ETH) and their own token, namely Dragon Token (Ticker symbol: DT)."

"DragonEX also seems to support the development of games based on blockchain technology. For example, they provide access to GoDice - a blockchain-based dice-betting game based that is fair and transparent. GoDice supports EOS, DT and USDT. A DragonEX exchange review also reveals that Dragon Token or DT is a dividend token based on the ERC20 token standard. DT holders qualify for a share of the total revenues generated via the DragonEX platform. It seems that the DT token can also be used to participate in the “DK Super Lotto” and in voting, both community voting and voting required when it comes to the listing of new projects and/or digital assets."

"In addition, it seems that Dragon Token has a max supply of 37,339,500 tokens (not considering the effect of burned tokens). A DragonEX exchange review also reveals that DT tokens can be obtained via direct exchange or via transaction fee mining at this crypto-asset exchange – a controversial “mining” activity as it encourages wash trades or wash trading."

"At the time of writing (UTC 12:04 PM) [on March 26th, 2019], the exchange is ranked as 25th by adjusted (38th by reported) trading volume (USD 183.4 million in the past 24 hours) on coinpaprika.com."

"DragonEX was subject to a hacker attack on 24 March. The hackers stole private keys and transferred assets from the exchange." "Dragonex, based in Singapore, reported on March 25 that hackers had stolen funds owned by both users and the company." "On March 24th, DragonEx has encountered attacks from hackers, our users’ crypto assets and Platform crypto assets were transferred and stolen. Part of the assets were retrieved back, and we will do our best to retrieve back the rest of stolen assets," the exchange said on its Telegram channel on Monday, adding that "all platform services will be closed and the accurate assets loss recovery situation will be announced in a week.

"On Sunday, apparently as the breach was first being discovered, DragonEx first took its platform offline saying it was upgrading its systems. Later the same day, it announced that it was “still working on system maintenance,” before finally disclosing that it had been hacked yesterday."

"As CryptoGlobe reported, DragonEx was hacked in March 2019, announced via Telegram that hackers managed to steal cryptocurrency belonging to both the cryptocurrency exchange and its users. The exchange quickly released all of the cryptocurrency wallets the funds, worth over $7 million at the time, moved to." “DragonEx via Telegram reported that part of the crypto taken has been transferred to unnamed major regulated digital exchanges, and hopes that the strict KYC rules would allow the team to garner help in recouping the stolen funds. If any measures were taken, it has not yet been publicly disclosed.”

"[T]he company said that the stolen assets from DragonEx were transferred to [multiple] addresses, which includes 20 digital assets, including bitcoin, ether, XRP, NEO, litecoin and others." "It’s estimated that the value of the funds stolen is around 7 million $"

"After tracking and investigation, DragonEx found that part of funds has flown into other exchanges. DragonEx has been working on retrieving back more assets and communicating with the leaders of those exchanges for more support," the exchange said in an update on their Telegram channel. "At the moment, the stolen assets transferred to Huobi and gate.io are blocked already," according to Long.

They claim that "several judicial administrations were informed about this cyber crime case including Estonia, Thailand, Singapore, Hong Kong etc. and we’re assisting policemen to do investigation." "DragonEx has asked several judicial administrations for assistance and has been keeping in touch for the update on the case. It’s a preliminary judgment that DragonEx is attacked by APT." "DragonEx has asked domestic and overseas policemen for help. The policemen has been investigating the case and searching for more evidence." "Police from Estonia, Thailand and Singapore are involved in the case."

"In order to get more assistance from more nodes, DragonEx has submitted the relevant materials to The EOSIO Core Arbitration Forum (ECAF) and found that until now, there has been about 450,000 EOS controlled by the hacker." "The admin added that stolen crypto assets transferred by the hackers to the Huobi and gate.io exchanges have already been blocked."

"DragonEx will take this lesson, upgrade the security level of the platform, cooperate with the third-party agency to do security supervision and audit, spare no effort to resume services after the Compensation Plan and Security Text are approved," it said without specifying.

"While the DragonEx hack was relatively small, it was notable for the lengths Lazarus Group went in order to infiltrate the exchange’s systems in a sophisticated phishing attack." "One of the attacks involved the creation of a fake, but realistic trading bot website that was offered to employees of DragonEx exchange." "The group used a sophisticated phishing attack where they created a realistic website and social media presence for a fake company named WFC Proof. The supposed company had created Worldbit-bot, a trading bot that was then offered to DragonEx employees."

"Though the software allegedly resembled an actual trading bot, it contained malware that could hijack the computer it infected. Eventually the software was installed on a machine that contained the private keys to DragonEx’s hot wallet, allowing the hackers to steal the funds. The attack is notable for its highly specific target and execution. The hackers appear to be very well versed in cryptocurrencies, even placing an ironic warning on its website to not let anyone access personal private keys."

"Now, DragonEx is negotiating a preliminary Compensation Plan that all assets stolen could be converted into credit and DT based on the actual assets loss." "For the loss caused to our users, DragonEx will take the responsibility no matter what," the company said. "[T]he company said it is working on "a preliminary Compensation plan."" "[S]tolen assets will be converted into USDT credit or Dragon Token (DT), the native token of the exchange, depending on preferences of the exchange's users, according to Joanne Long, Chief Information Officer at the exchange. Every day, 100% of the trading fees earned by DragonEx are distributed to users according to how much DT they hold, according to the website of the exchange."

"The company has also denied that it went bankrupt." "It’s a fake news that DragonEx has gone bankrupt. Actually, DragonEx established an incident response team to promptly work on investigation, security inspection, assets appraisal and audit, etc."

"With all supports and helps around the world, DragonEx feels grateful and more confident to overcome this hardship. DragonEx will continue to find the truth of the case and retrieve back those assets stolen. Meanwhile, DragonEx will take this lesson, upgrade the security level of the platform, cooperate with the third-party agency to do security supervision and audit, spare no effort to resume services after the Compensation Plan and Security Text are approved."

"The company’s executives wrote that after more than a year of hard work, the stolen assets have not been recovered." "In an official announcement on Oct. 21, DragonEx said that the OKEx freeze triggered a “crisis of trust” in centralized exchanges among its customers, which in turn fueled a run on funds and deteriorated the platform's service."

This exchange or platform is based in Singapore, or the incident targeted people primarily in Singapore.

The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.

Include:

  • Known history of when and how the service was started.
  • What problems does the company or service claim to solve?
  • What marketing materials were used by the firm or business?
  • Audits performed, and excerpts that may have been included.
  • Business registration documents shown (fake or legitimate).
  • How were people recruited to participate?
  • Public warnings and announcements prior to the event.

Don't Include:

  • Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
  • Anything that wasn't reasonably knowable at the time of the event.

There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.

The Reality

This sections is included if a case involved deception or information that was unknown at the time. Examples include:

  • When the service was actually started (if different than the "official story").
  • Who actually ran a service and their own personal history.
  • How the service was structured behind the scenes. (For example, there was no "trading bot".)
  • Details of what audits reported and how vulnerabilities were missed during auditing.

What Happened

The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.

Key Event Timeline - DragonEx Hacking Theft
Date Event Description
March 24th, 2019 12:00:00 AM Main Event Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.

Total Amount Lost

The total amount lost has been estimated at $7,000,000 USD.

How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?

Immediate Reactions

How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?

Ultimate Outcome

What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?

Total Amount Recovered

There do not appear to have been any funds recovered in this case.

What funds were recovered? What funds were reimbursed for those affected users?

Ongoing Developments

What parts of this case are still remaining to be concluded?

Prevention Policies

While the most secure storage by far is a multi-signature wallet with all keys properly held by trained individuals, security of hot wallets can be improved by having additional experts review the security of systems. Our proposed framework sees 2 reviews prior to launch, and regular reviews on an ongoing basis. In the event of a breach, a comprehensive industry insurance fund would be available, which handles fraud and covers additional events beyond self-insurance.

References

  1. Upbit Is the Seventh Major Crypto Exchange Hack of 2019 - CoinDesk (Feb 3, 2020)
  2. Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk (Feb 5, 2020)
  3. DragonEx Hacked: Users’ Crypto ‘Transferred and Stolen’ | CryptoGlobe (Feb 5, 2020)
  4. DragonEx Announcements (Feb 6, 2020)
  5. DragonEx Hack: USD 7 million in Crypto Stolen, Compensations in Sight (Feb 14, 2020)
  6. DragonEx Was Hacked. Here’s What We Know So Far (Feb 7, 2020)
  7. Q1 2019 Cryptocurrency Anti-Money Laundering Report - CipherTrace (Feb 19, 2020)
  8. Most Significant Hacks of 2019 — New Record of Twelve in One Year (Feb 22, 2020)
  9. A Look Back on Some of the Most Devastating Crypto Hacks | Fintech Singapore (Feb 26, 2020)
  10. Bitcoin Scams and Cryptocurrency Hacks List - BitcoinExchangeGuide.com (Mar 5, 2020)
  11. SlowMist Hacked - SlowMist Zone (Jun 25, 2021)
  12. DragonEx Hacked, Investigation is Undergoing | NEWS.8BTC.COM (Aug 6, 2021)
  13. Lazarus Hacker Group Continues to Target Crypto Using Faked Trading Software - Bitcoin Magazine: Bitcoin News, Articles, Charts, and Guides (Aug 7, 2021)
  14. The 23 exchange hacks of 2019 (Aug 7, 2021)
  15. https://dragonex.io/en-us/ (Dec 24, 2021)
  16. Telegram: Contact @DragonEx_EN (Dec 25, 2021)
  17. SlowMist Hacked - SlowMist Zone (May 17, 2021)
  18. https://www.crunchbase.com/organization/dragonex (Dec 25, 2021)
  19. DragonEX – Reviews, Trading Fees & Cryptos (2022) | Cryptowisser (Dec 25, 2021)
  20. https://www.linkedin.com/company/dragonex-network/about/ (Dec 25, 2021)
  21. DragonEx crypto exchange considering shutdown amid OKEx 'crisis of trust' (Dec 26, 2021)
  22. DragonEx Review and Analysis: Is it safe or a scam? We've checked and verified! (Dec 26, 2021)
  23. Singapore-Based Crypto Exchange DragonEx Has Been Hacked - CoinDesk (Dec 26, 2021)
  24. Report: North Korean Hackers Created Realistic Trading Bot to Steal Money (Dec 26, 2021)
  25. https://www.technologyreview.com/2020/01/24/276082/lazarus-group-dragonex-chainalysis/ (Dec 26, 2021)