Coinbase Advanced Market Vulnerability: Difference between revisions
(Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/coinbaseadvancedmarketvulnerability.php}} thumb|CoinbaseCoinbase had a critical bug in their centralized trading platform, which would have allowed hackers to swap assets for one another arbitrarily in making trades. For example, a user could trade BTC to USD, but actually offer up only an equivalent amount of Shiba Inu token. No funds were lost as the issue was reported by a...") |
No edit summary |
||
| Line 1: | Line 1: | ||
{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/coinbaseadvancedmarketvulnerability.php}} | {{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/coinbaseadvancedmarketvulnerability.php}} | ||
{{Unattributed Sources}} | |||
[[File:Coinbase.jpg|thumb|Coinbase]]Coinbase had a critical bug in their centralized trading platform, which would have allowed hackers to swap assets for one another arbitrarily in making trades. For example, a user could trade BTC to USD, but actually offer up only an equivalent amount of Shiba Inu token. No funds were lost as the issue was reported by a white hacker to CoinBase, in exchange for a $250k bounty. | [[File:Coinbase.jpg|thumb|Coinbase]]Coinbase had a critical bug in their centralized trading platform, which would have allowed hackers to swap assets for one another arbitrarily in making trades. For example, a user could trade BTC to USD, but actually offer up only an equivalent amount of Shiba Inu token. No funds were lost as the issue was reported by a white hacker to CoinBase, in exchange for a $250k bounty. | ||
This exchange or platform is based in United States, or the incident targeted people primarily in United States. | This exchange or platform is based in United States, or the incident targeted people primarily in United States. | ||
<ref name="reddit-6727" /><ref name="thecryptobasic-6728" /><ref name="coinbase-4114" /><ref name="coinbase-4115" /><ref name="morioh-4116" /><ref name="treeofalphatwitter-6729" /><ref name="treeofalphatwitter-6730" /><ref name="brianarmstrongtwitter-6731" /><ref name="portswigger-6732" /><ref name="coinbaseblog-6733" /><ref name="coindesk-6734" /><ref name="brianarmstrongtwitter-6735" /><ref name="coinbasesupporttwitter-6736" /><ref name="hackerone-6737" /> | |||
== About Coinbase == | == About Coinbase == | ||
| Line 83: | Line 85: | ||
!Description | !Description | ||
|- | |- | ||
|February 11th, 2022 11:16:00 AM | |February 11th, 2022 11:16:00 AM MST | ||
|Main Event | |Main Event | ||
|Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. | |Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. | ||
| Line 112: | Line 114: | ||
== Ongoing Developments == | == Ongoing Developments == | ||
What parts of this case are still remaining to be concluded? | What parts of this case are still remaining to be concluded? | ||
== Individual Prevention Policies == | |||
{{Prevention:Individuals:Placeholder}} | |||
== Prevention Policies == | {{Prevention:Individuals:End}} | ||
== Platform Prevention Policies == | |||
{{Prevention:Platforms:Placeholder}} | |||
{{Prevention:Platforms:End}} | |||
== Regulatory Prevention Policies == | |||
{{Prevention:Regulators:Placeholder}} | |||
{{Prevention:Regulators:End}} | |||
== References == | == References == | ||
[https://www.reddit.com/r/CryptoCurrencies/comments/szbh5a/hacker_revealed_a_coinbase_bug_that_allowed_him/ Reddit - Dive into anything] (Feb 23) | <references><ref name="reddit-6727">[https://www.reddit.com/r/CryptoCurrencies/comments/szbh5a/hacker_revealed_a_coinbase_bug_that_allowed_him/ Reddit - Dive into anything] (Feb 23, 2022)</ref> | ||
[https://thecryptobasic.com/2022/02/23/hacker-revealed-a-coinbase-bug-that-allowed-him-to-buy-50-bitcoins-for-50-shiba-inu/ Hacker Revealed A Coinbase Bug That Allowed Him To Buy 50 Bitcoins For 50 Shiba Inu - The Crypto Basic] (Feb 23) | <ref name="thecryptobasic-6728">[https://thecryptobasic.com/2022/02/23/hacker-revealed-a-coinbase-bug-that-allowed-him-to-buy-50-bitcoins-for-50-shiba-inu/ Hacker Revealed A Coinbase Bug That Allowed Him To Buy 50 Bitcoins For 50 Shiba Inu - The Crypto Basic] (Feb 23, 2022)</ref> | ||
[https://www.coinbase.com/ https://www.coinbase.com/] (Dec | <ref name="coinbase-4114">[https://www.coinbase.com/ https://www.coinbase.com/] (Dec 4, 2021)</ref> | ||
[https://www.coinbase.com/about https://www.coinbase.com/about] (Dec | <ref name="coinbase-4115">[https://www.coinbase.com/about https://www.coinbase.com/about] (Dec 4, 2021)</ref> | ||
[https://morioh.com/p/2490cc6cf89a Morioh] (Dec | <ref name="morioh-4116">[https://morioh.com/p/2490cc6cf89a Morioh] (Dec 4, 2021)</ref> | ||
[https://twitter.com/Tree_of_Alpha/status/1495014902582362112 @Tree_of_Alpha Twitter] (Feb 26) | <ref name="treeofalphatwitter-6729">[https://twitter.com/Tree_of_Alpha/status/1495014902582362112 @Tree_of_Alpha Twitter] (Feb 26, 2022)</ref> | ||
[https://twitter.com/Tree_of_Alpha/status/1492201011955519495 @Tree_of_Alpha Twitter] (Feb 26) | <ref name="treeofalphatwitter-6730">[https://twitter.com/Tree_of_Alpha/status/1492201011955519495 @Tree_of_Alpha Twitter] (Feb 26, 2022)</ref> | ||
[https://twitter.com/brian_armstrong/status/1492219896658219008 @brian_armstrong Twitter] (Feb 26) | <ref name="brianarmstrongtwitter-6731">[https://twitter.com/brian_armstrong/status/1492219896658219008 @brian_armstrong Twitter] (Feb 26, 2022)</ref> | ||
[https://portswigger.net/daily-swig/jaw-dropping-coinbase-security-bug-allowed-users-to-steal-unlimited-cryptocurrency Jaw-dropping Coinbase security bug allowed users to steal unlimited cryptocurrency | The Daily Swig] (Feb 26) | <ref name="portswigger-6732">[https://portswigger.net/daily-swig/jaw-dropping-coinbase-security-bug-allowed-users-to-steal-unlimited-cryptocurrency Jaw-dropping Coinbase security bug allowed users to steal unlimited cryptocurrency | The Daily Swig] (Feb 26, 2022)</ref> | ||
[https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060 https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060] (Feb 26) | <ref name="coinbaseblog-6733">[https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060 https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060] (Feb 26, 2022)</ref> | ||
[https://www.coindesk.com/business/2022/02/12/coinbase-trading-vulnerability-exposed-by-repeat-white-hat-hacker/ Coinbase Trading Vulnerability Exposed by White-Hat Hacker] (Feb 26) | <ref name="coindesk-6734">[https://www.coindesk.com/business/2022/02/12/coinbase-trading-vulnerability-exposed-by-repeat-white-hat-hacker/ Coinbase Trading Vulnerability Exposed by White-Hat Hacker] (Feb 26, 2022)</ref> | ||
[https://twitter.com/brian_armstrong/status/1492254488186347522 @brian_armstrong Twitter] (Feb 27) | <ref name="brianarmstrongtwitter-6735">[https://twitter.com/brian_armstrong/status/1492254488186347522 @brian_armstrong Twitter] (Feb 27, 2022)</ref> | ||
[https://twitter.com/CoinbaseSupport/status/1492274154061586433 @CoinbaseSupport Twitter] (Feb 27) | <ref name="coinbasesupporttwitter-6736">[https://twitter.com/CoinbaseSupport/status/1492274154061586433 @CoinbaseSupport Twitter] (Feb 27, 2022)</ref> | ||
[https://hackerone.com/coinbase?type=team HackerOne] (Feb 27) | <ref name="hackerone-6737">[https://hackerone.com/coinbase?type=team HackerOne] (Feb 27, 2022)</ref></references> | ||
Revision as of 19:31, 5 March 2023
Notice: This page is a freshly imported case study from the original repository. The original content was in a different format, and may not have relevant information for all sections. Please help restructure the content by moving information from the 'About' section to other sections, and add any missing information or sources you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.
Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!
Coinbase had a critical bug in their centralized trading platform, which would have allowed hackers to swap assets for one another arbitrarily in making trades. For example, a user could trade BTC to USD, but actually offer up only an equivalent amount of Shiba Inu token. No funds were lost as the issue was reported by a white hacker to CoinBase, in exchange for a $250k bounty.
This exchange or platform is based in United States, or the incident targeted people primarily in United States. [1][2][3][4][5][6][7][8][9][10][11][12][13][14]
About Coinbase
"Coinbase is a secure platform that makes it easy to buy, sell, and store cryptocurrency like Bitcoin, Ethereum, and more." "As the leading mainstream cryptocurrency exchange in the United States, Coinbase has become a standard on-ramp for new crypto investors. Coinbase offers a wide variety of products including cryptocurrency investing, an advanced trading platform, custodial accounts for institutions, a wallet for retail investors, and its own U.S. dollar stable-coin."
"Coinbase was founded in 2012 and is a fully regulated and licensed cryptocurrency exchange supporting all U.S. states except Hawaii. Coinbase initially only allowed for Bitcoin trading but quickly began adding cryptocurrencies that fit its decentralized criteria."
"Its list expanded to include Ethereum, Litecoin, Bitcoin Cash, XRP, and many others with the promise of more as long as its requirements are met."
"Recently a hacker known as “Tree of Alpha” won a Coinbase bounty for finding and reporting a bug that could have severely harmed Coinbase."
"Anyone here can get me a direct line with someone at @coinbase, preferably management or dev team, possibly @brian_armstrong himself?"
"I'm submitting a hacker1 report but I'm afraid this can't wait. Can't say more either, this is potentially market-nuking."
"On February 11, 2022, we received a report from a third-party researcher indicating that they had uncovered a flaw in Coinbase’s trading interface. We promptly mobilized our security incident response team to identify and patch the bug, and resolved the underlying system issue without any impact to customer funds."
"Tree of Alpha stated that it was tinkering with the new advanced Coinbase trading platform to understand how orders were sent and executed. He said he placed an order on the ETH/EUR pair and noticed that the API needed a product identification, source, and recipient account."
"At first, I decided to poke around the new Advanced Trading platform to find out how orders are sent and what a successful one looks like."
"I put an ETH-EUR order from the UI, and grabbed the request that was sent."
"I noticed the API needs product, source and target account ids."
"In order to get a failed message, I changed the product_id to BTC-USD, but did not change the two account ids (source is my ETH wallet, target is my EUR wallet)."
"Expecting an error because my account is not allowed to trade the BTC-USD pair, the order just … goes through."
"I just used 0.0243 ETH to sell 0.0243 BTC on the BTC-USD pair, a pair I do not have access to, without holding any BTC."
"Hoping this is a UI bug, I check the fills on the order, and they match the API: those trades really happened, on the live order book."
"[T]here aren't many things quite as sobering yet terrifying as realizing you just put a 50 BTC limit sell order using 50 SHIB and everyone else can see it. 5 minutes later, I was sending this initial tweet."
"The consequences would have been so worst and beyond imagination, if any black hat hacker had found the nug, but thanks to Tree of Alpha, he not only saved Coinbase but all the traders that are trusting Coinbase security and trading billions of dollars on it."
"Thanks to the researcher who responsibly disclosed this issue, Coinbase was able to fix this bug in a matter of hours, and conclusively determine that it has never been maliciously exploited. We have also implemented additional checks to ensure that it cannot happen again."
"Around 11 p.m. UTC (6 p.m. ET), Coinbase tweeted that it had “re-enabled full service for retail advanced trading.”"
"Coinbase strongly supports independent security research, and when those researchers uncover serious issues, we want to ensure that they are rewarded accordingly. As a result, we are paying our largest-ever bug bounty for this finding: $250,000."
"The hacker himself told the case on his Twitter account, where he talked about how he got the “biggest bug bounty in history.” Tree of Alpha received a total of $250K for identifying a fatal bug."
This exchange or platform is based in United States, or the incident targeted people primarily in United States.
The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.
Include:
- Known history of when and how the service was started.
- What problems does the company or service claim to solve?
- What marketing materials were used by the firm or business?
- Audits performed, and excerpts that may have been included.
- Business registration documents shown (fake or legitimate).
- How were people recruited to participate?
- Public warnings and announcements prior to the event.
Don't Include:
- Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
- Anything that wasn't reasonably knowable at the time of the event.
There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.
The Reality
This sections is included if a case involved deception or information that was unknown at the time. Examples include:
- When the service was actually started (if different than the "official story").
- Who actually ran a service and their own personal history.
- How the service was structured behind the scenes. (For example, there was no "trading bot".)
- Details of what audits reported and how vulnerabilities were missed during auditing.
What Happened
The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.
| Date | Event | Description |
|---|---|---|
| February 11th, 2022 11:16:00 AM MST | Main Event | Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. |
Total Amount Lost
No funds were lost.
How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?
Immediate Reactions
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?
Ultimate Outcome
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?
A bounty of $250,000 USD was paid for the discovery.
Total Amount Recovered
There do not appear to have been any funds recovered in this case.
What funds were recovered? What funds were reimbursed for those affected users?
Ongoing Developments
What parts of this case are still remaining to be concluded?
Individual Prevention Policies
No specific policies for individual prevention have yet been identified in this case.
For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.
Platform Prevention Policies
Policies for platforms to take to prevent this situation have not yet been selected in this case.
For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.
Regulatory Prevention Policies
No specific regulatory policies have yet been identified in this case.
For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.
References
- ↑ Reddit - Dive into anything (Feb 23, 2022)
- ↑ Hacker Revealed A Coinbase Bug That Allowed Him To Buy 50 Bitcoins For 50 Shiba Inu - The Crypto Basic (Feb 23, 2022)
- ↑ https://www.coinbase.com/ (Dec 4, 2021)
- ↑ https://www.coinbase.com/about (Dec 4, 2021)
- ↑ Morioh (Dec 4, 2021)
- ↑ @Tree_of_Alpha Twitter (Feb 26, 2022)
- ↑ @Tree_of_Alpha Twitter (Feb 26, 2022)
- ↑ @brian_armstrong Twitter (Feb 26, 2022)
- ↑ Jaw-dropping Coinbase security bug allowed users to steal unlimited cryptocurrency | The Daily Swig (Feb 26, 2022)
- ↑ https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060 (Feb 26, 2022)
- ↑ Coinbase Trading Vulnerability Exposed by White-Hat Hacker (Feb 26, 2022)
- ↑ @brian_armstrong Twitter (Feb 27, 2022)
- ↑ @CoinbaseSupport Twitter (Feb 27, 2022)
- ↑ HackerOne (Feb 27, 2022)