May 13, 2019 By Douglas Bonderud 2 min read

Cryptocurrency exchange Binance lost $41 million after attackers compromised its “hot wallet” to grab more than 7000 bitcoin.

On Tuesday, May 7, Binance, the world’s largest cryptocurrency exchange, announced that malicious actors had compromised user application programming interface (API) keys and two-factor authentication (2FA) codes, enabling them to access the company’s hot wallet and steal more than 7,000 bitcoin (BTC). According to Coindesk, this resulted in the immediate suspension of all withdrawals and deposits, and Binance pledged to cover all customer losses using its emergency fund.

Along with immediate concerns the surrounding the Binance hack, this hot wallet heist has stoked the fire on another conversation: bitcoin rollbacks.

Behind the Binance Hack

Cryptocurrency thefts have already topped 1.2 billion this year as hackers ramp up targeted attacks on high-value exchanges like Binance. According to the company’s official statement, “The hackers had the patience to wait, and execute well-orchestrated actions through multiple seemingly independent accounts at the most opportune time.”

Using 44 individual transactions bundled together — likely designed to mimic typical exchange behavior — the attackers were able to withdraw 7,000 BTC. The withdrawal itself triggered security alarms, but Binance was unable to stop the transaction.

The firm noted that only 2 percent of its total bitcoin value was stolen, and all BTC in their offline “cold wallets” remains secure, but the incident has spurred debate about finding and redistributing the missing funds.

According to CCN, the stolen currency is now stored in seven anonymous wallets, prompting speculation about a blockchain reorganization or rollback. While theoretically possible, such a reorganization would undermine the uncensored, supply-capped nature of bitcoin and cause significant repercussions for the market at large. Fortunately, Binance didn’t suggest the idea and has no plans to initiate a rollback.

How Can Companies Protect Cryptocurrency Wallets?

Beyond breaking the blockchain network, how can companies reduce the risk of cryptocurrency hacks? First, it’s critical to deploy discrete security measures — such as 2FA and anomalous transaction detection — that are capable of blocking most attacks before they reach bitcoin wallets. Binance CEO Changpeng Zhao noted that “significant changes” are coming to its API, 2FA and withdrawal validation processes before the company resumes bitcoin business as usual.

Security experts also highlight the increasing need for a holistic security approach that includes test-driven development, standardized defensive techniques and improved regulation. As the Binance hack demonstrates, even small cracks in crypto security can break the bitcoin vault wide open for attackers.

More from

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

How I got started: Incident responder

3 min read - As a cybersecurity incident responder, life can go from chill to chaos in seconds. What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role?With our How I Got Started series, we learn from experts in their field and find out how they got started and what advice they have for anyone looking to get into the field.In this Q&A, we spoke with IBM’s own Dave Bales, co-lead X-Force Incident Command…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today