Flexcoin Hot Wallet Hack

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Revision as of 17:58, 1 March 2024 by Azoundria (talk | contribs) (Another 30 minutes completed. About section spread around. Integrating information from different sources. Got to the blockchain information section. Prevention finished.)
Jump to navigation Jump to search

Notice: This page is a new case study and some aspects have not been fully researched. Some sections may be incomplete or reflect inaccuracies present in initial sources. Please check the References at the bottom for further information and perform your own additional assessment. Please feel free to contribute by adding any missing information or sources you come across. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!

Flexcoin Logo/Homepage

Flexcoin was a service that allowed users to send their bitcoins to other users quickly and more conveniently than through standard bitcoin. The platform had an issue where submitting multiple withdrawal requests close together could allow the user to withdraw more funds than they had. On March 2nd, 2014, a hacker exploited this bug to steal all of the wallet funds. Only customers who had utilized the available cold storage service (available for an extra charge) were able to retrieve their funds. The company walked away and did nothing to assist the hot wallet users, however at least they were quick about it.

[1][2][3][4][5][6]

About Flexcoin

Flexcoin was a bitcoin storage service based in Alberta, Canada[7]. Flexcoin presented itself as the solution to a major problem with Bitcoin by offering a centralized platform for managing bitcoins across various devices[8]. Traditionally, bitcoins are only accessible from the device they were initially received on, limiting their usability[8]. With Flexcoin, users can access their bitcoins from any web-connected device, enabling easy transactions and payments without technical expertise[8]. Flexcoin described themselves as the world's first bitcoin bank, allowing users to send and receive bitcoins seamlessly[8].

By centralizing bitcoin storage and offering accessibility from any web-connected device, Flexcoin promised to revolutionize how bitcoins are managed and utilized[8]. Additionally, Flexcoin rewarded users with "discount payments" on positive bitcoin balances, further positioning itself as a leader in bitcoin banking[8].


“Alberta-based bitcoin storage specialist” “Flexcoin aimed to differentiate itself from other electronic wallet providers by incentivizing users for keeping their bitcoin balances on the site.”

Flexcoin had previously emphasized the security of its bitcoin storage practices, asserting that it held zero coins in other companies or exchanges[7]. This stance aimed to differentiate Flexcoin from other electronic wallet providers, with the company incentivizing users to keep their bitcoin balances on its platform[7].

6 days after bragging that “We hold zero coins in other companies, exchanges etc. While the MtGox closure is unfortunate, we at Flexcoin have not lost anything.”


, has after falling victim to a cyberattack resulting in the theft of 896 BTC, valued at roughly $600,000. Despite branding itself as the "first bitcoin bank," Flexcoin clarified that it was not legally classified as such.


One of Flexcoin's key features was its emphasis on security, implementing a ZERO link policy in emails to prevent phishing attempts[8]. The Flexcoin homepage described Flexcoin as "a leader in bitcoin security"[8].

Flexcoin is also a leader in bitcoin security, for example Flexcoin is the first to implement a ZERO link policy in e-mails. No e-mail sent from Flexcoin contains a link or image. If you receive one that does, it's a phishing attempt.

Homepage: [8]

The Reality

Despite branding itself as the "first bitcoin bank," Flexcoin clarified that it was not legally classified as such[7][8]. Flexcoin noted on their homepage that they do not accept traditional currencies and are not regulated by government entities like FDIC[8].

Legal Notice: We are not a true bank that accepts USD or any national currency, only bitcoins which by their nature are not regulated, we're not FDIC insured or regulated by any government entity.

A bug existed on the Flexcoin platform where transfers between accounts could be conducted multiple times before balances were updated. This allowed a large balance to be built up in an account by repeatedly sending transfer requests to that account. The sending accounts would be able to have their balance go well below zero, and the recipient account could then withdraw the extra funds.

What Happened

The Flexcoin wallets were emptied out by a hacker exploiting an account transfer bug to a total value of 896 bitcoin.

Key Event Timeline - Flexcoin Hot Wallet Hack
Date Event Description
February 25th, 2014 Mt. Gox Unaffected Flexcoin had previously assured its users that it remained unaffected by the closure of Mt. Gox, asserting on February 25 that it had not incurred any losses due to the latter's shutdown[6].
March 2nd, 2014 5:15:12 AM MST Hacker Withdraws 500 Bitcoin The largest blockchain transaction happens to withdraw 500 bitcoin from Flexcoin[9].
March 4th, 2014 9:07:00 AM MST CoinDesk Article Published CoinDesk reports on Flexcoin announcing its closure after falling victim to the cyberattack. Losses are mentioned as 896 BTC, valued at roughly $600,000. The company disclosed the theft on its homepage and conceded that it lacked the resources to recover from the significant loss, leading to the immediate cessation of its operations. Flexcoin has already provided the wallet addresses associated with the hackers, revealing that the stolen funds had been transferred out of the compromised accounts. Customers who stored bitcoins in Flexcoin's cold storage were assured that they would be able to retrieve their funds, with the company facilitating the transfer free of charge upon verification of their identities.
March 5th, 2014 1:33:00 AM MST Reuters Article Published Some high level details of the attack method are also mentioned[6].

Technical Details

The attack on Flexcoin exploited a flaw in its code related to transfers between users, involving a flood of simultaneous requests to transfer coins between accounts. Despite the company's efforts to maintain server security through regular testing and repelling numerous attacks over the years, it proved insufficient in preventing this breach[6].

“The site was itself broken from the ground up. The hackers simply got it to do what it was programmed to do, a lot faster than normal.”

Technical Analysis On Flexcoin Homepage

FlexCoin published an analysis on their homepage of the attacker's activity[10].

The attacker logged into the flexcoin front end from IP address 207.12.89.117 under a newly created username and deposited to address 1DSD3B3uS2wGZjZAwa2dqQ7M9v7Ajw2iLy

The coins were then left to sit until they had reached 6 confirmations.

The attacker then successfully exploited a flaw in the code which allows transfers between flexcoin users. By sending thousands of simultaneous requests, the attacker was able to "move" coins from one user account to another until the sending account was overdrawn, before balances were updated.

This was then repeated through multiple accounts, snowballing the amount, until the attacker withdrew the coins.

Blockchain Transactions/Addresses

Attacker addresses[10]:

1NDkevapt4SWYFEmquCDBSf7DLMTNVggdu

1QFcC5JitGwpFKqRDd9QNH3eGN56dCNgy6

Transaction example:[9]

Total Amount Lost

Losses are mentioned by CoinDesk as 896 BTC, valued at roughly $600,000[7].


“Flexcoin also provided the wallet addresses of the alleged hackers. The largest wallet of which received 592.1 BTC from the breach, while the smaller of the two held at one point 304 BTC supposedly taken from the website.”

The total amount lost has been estimated at $600,000 USD.

Immediate Reactions

Flexcoin, a Canadian-based bitcoin bank, announced its closure following the loss of approximately $600,000 worth of bitcoins due to a hacker attack facilitated by vulnerabilities in its software code. The company revealed that all 896 bitcoins stored online were stolen, prompting its immediate shutdown. The incident occurred shortly after the bankruptcy filing of Mt. Gox, once the leading bitcoin exchange globally, which reported the potential loss of around 850,000 bitcoins to hacking. Flexcoin cited its lack of resources to recover from the significant loss as the reason for its closure, acknowledging that it could not withstand the financial impact[6].

Flexcoin stated its collaboration with law enforcement agencies to trace the origin of the hack and pledged to return bitcoins stored offline, known as "cold storage," to its users. Cold storage coins, held in computers disconnected from the internet, are considered more secure against hacking attempts.[6]


In response to the breach, Flexcoin announced their closure and provided the wallet addresses associated with the hackers, revealing that the stolen funds had been transferred out of the compromised accounts[7]. Customers who stored bitcoins in Flexcoin's cold storage were assured that they would be able to retrieve their funds, with the company facilitating the transfer free of charge upon verification of their identities[7].

Flexcoin conceded that it lacked the resources to recover the significant amount of funds lost, leading to the immediate cessation of its operations[7].


"Flexcoin has announced that it will shut down following an attack and subsequent robbery that saw cybercriminals abscond with 896 BTC (roughly $600,000 at press time) stored in the company’s hot wallets."

“As Flexcoin does not have the resources, assets or otherwise to come back from this loss, we are closing our doors immediately.”

“Flexcoin also provided the wallet addresses of the alleged hackers. The largest wallet of which received 592.1 BTC from the breach, while the smaller of the two held at one point 304 BTC supposedly taken from the website.”

“As Flexcoin does not have the resources, assets, or otherwise to come back from this loss, we are closing our doors immediately.”


The cyberattack and subsequent theft underscored long-standing concerns within the bitcoin community regarding the security of wallet storage services like Flexcoin[7].

Ultimate Outcome

[1]

The incident was featured in the Bitcoin Exchange Guide[11].

Total Amount Recovered

Only funds held in a special "cold storage" wallet were returned. Users who kept their funds in cold storage were required to pay a 0.5% fee. Customers who stored bitcoins in Flexcoin's cold storage were assured that they would be able to retrieve their funds, with the company facilitating the transfer free of charge upon verification of their identities[7].

Flexcoin conceded that it lacked the resources to recover the significant amount of funds lost, leading to the immediate cessation of its operations[7].

“Flexcoin held some bitcoins in “cold storage”, keeping them on devices not connected to the internet. Those bitcoins are safe, but only users who explicitly requested their bitcoins be held in cold storage (and paid a 0.5% fee) benefit.” “Users who put their coins into cold storage will be contacted by Flexcoin and asked to verify their identity. Once identified, cold storage coins will be transferred out free of charge. Cold storage coins were held offline and not within reach of the attacker. All other users will be directed to Flexcoin's "Terms of service" located at "Flexcoin.com/118.html" a document which was agreed on, upon signing up with Flexcoin.”

Ongoing Developments

Flexcoin provided the wallet addresses of the alleged hackers. It is not clear what tracing has been done on those funds.

Individual Prevention Policies

When using any third party custodial platform (such as for trading), it is important to verify that the platform has a full backing of all assets, and that assets have been secured in a proper multi-signature wallet held by several trusted and trained individuals. If this can't be validated, then users should avoid using that platform. Unfortunately, most centralized platforms today still do not provide the level of transparency and third party validation which would be necessary to ensure that assets have been kept secure and properly backed. Therefore, the most effective strategy at present remains to learn proper self custody practices and avoid using any third party custodial platforms whenever possible.

Store the majority of funds offline. By offline, it means that the private key and/or seed phrase is exclusively held by you and not connected to any networked device. Examples of offline storage include paper wallets (seed phrase or key written down and deleted from all electronic media), hardware wallets, steel wallet devices, etc...

For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.

Platform Prevention Policies

All aspects of any platform should undergo a regular validation/inspection by experts. This validation should include a security audit of any smart contracts, reporting any risks to the backing (of any customer assets, ensuring treasuries or minting functions are properly secured under the control of a multi-signature wallet, and finding any inadequacies in the level of training or integrity of the team. The recommended interval is twice prior to launch or significant system upgrade, once after 3 months, and every 6 months thereafter. It is recommended that the third party performing the inspection not be repeated within a 14 month period.

All wallets, minting functions, and critical infrastructure should be implemented with a multi-signature requirement, with a recommended minimum of 3 signatures required. This means that making important changes or approving spending will require the keys held by at least 3 separate individuals within the organization to approve. The multi-signature should be implemented at the lowest layer possible, all key holders should have security training, and all key holders should be empowered and encouraged to exercise diligence.

Work with other industry platforms to set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.

For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.

Regulatory Prevention Policies

All platforms should undergo published security and risk assessments by independent third parties. Two assessments are required at founding or major upgrade, one after 3 months, and one every 6 months thereafter. The third parties must not repeat within the past 14 months. A risk assessment needs to include what assets back customer deposits and the risk of default from any third parties being lent to. The security assessment must include ensuring a proper multi-signature wallet, and that all signatories are properly trained. Assessments must be performed on social media, databases, and DNS security.

Set up a multi-signature wallet with private keys held separately by delegate signatories from seven prominent platforms and services within the industry. Establish requirements for contributions by all platforms and services within the country, designed to be affordable for small platforms yet large enough to cover anticipated breach events. Any breach event can be brought forth by a member platform or a petition of 100 signatures for consideration by the delegate signatories. A vote of 4 or more delegate signatures is required to release any funds, which could partially or fully restore lost funds based on their assessment.

For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.

References