According to a month-long investigation, it appears the recent know-your-customer (KYC) data leak involving data from Binance traders is linked to the Binance hackĀ in May that resulted in over 7,000 stolen Bitcoin.
Although the investigation is still ongoing, CoinDesk says it can confirm that two out of more than a hundred allegedly leaked profiles originally created in February 2018 belong to actual Binance customers who had completed the KYC checks required by the crypto trading platform, which Binance says was handled by a third-party firm.Ā
Information about the security breach was made public on Wednesday when a hacker who goes by the pseudonym āBnatov Platonā started posting what he claims are photos and information about Binance users.
CoinDesk reports that Platon who calls himself an ethical “whitehat hacker” seeking a bug bounty from Binance, is effectively demanding 300 Bitcoin (BTC) worth approximately $3.5 million in exchange for the leaked KYC data and images, uploaded the data to an open website and then shared those images on Telegram.
Platon claims he has 60,000 pieces of KYC information belonging to Binanceās customers.Ā
Binance KYC leaked? A telegram group sharing the KYC details of customers has just surfaced. @cz_binance suggests itās old data from the 2018 hack and warns to not fall for the FUD, @binance is currently investigating. #Bitcoin #BTC #Binance pic.twitter.com/EtZYOiLRdD
— TheBTCSpeculator | Smol Size To Size? (@TheBTCSpec) August 7, 2019
https://twitter.com/LocalEthereum/status/1158985365719400448
At the time of the May hack, Binance described it as a ālarge-scale security breachā that allowed hackers āto obtain a large number of user API keys, 2FA codes and potentially other infoā and made no allusion to compromised images of customers holding up passports. Meanwhile, Platon denies any involvement in the May hack. Instead, he says he hacked an āinsiderā working for the exchange who was allegedly involved in the May theft of Binance’s stolen Bitcoin.
While one of the images analyzed by CoinDesk seems to have been modified, the news outlet confirms that the individual whose identity was revealed was registered on Binance at the time of the KYC data leaks.
Platon alleges that a Binance insider assisted in making several APIs public, which gave hackers direct access to customer accounts. Platon says he managed to obtain the text files used by the hackers to keep clientsā API keys, which are codes for remotely accessing their accounts.
According to Platon, the files ācontain extremely serious informationā such as usersā email addresses and passwords. The clients, who may be at risk, created Binance accounts during the past two years, Platon said.Ā
The hackers took advantage of the leaked personal information by using it to create malicious scripts that allowed them to make many small withdrawals of 0.002 BTC, Platon reveals. He also notes that the scripts issued buy orders for a BlockMason Credit token that was instantly converted to Bitcoin.
The stolen cryptocurrency was stored in a wallet created on Blockchain.com, Platon claims. He also mentions that the hackers laundered around 2,000 Bitcoins from this wallet through crypto derivatives exchange BitMEX, and several other digital asset trading platforms including Huobi, KuCoin and Yobit.Ā
Platon, who has reportedly shared 636 files with CoinDesk, is allegedly hoping that publicly revealed sensitive customer data will create enough media attention to force Binance into announcing the true extent of the security breach. He also wants the hackers who stole the large amount of Bitcoin to be caught and punished.
Platon also shared code with CoinDesk that he claims was used to access Binanceās services through a back door. Viktor Shpak, CTO at blockchain startup VisibleMagic, confirms that Platon was correct.
Shpak notes,
āThis is highly likely to be an API key attack. They harvested API keys from somewhere.ā
API keys allow users to authenticate, or verify, services on crypto exchanges and other applications. If a hacker acquires these keys, then they can purchase cryptocurrency from the victimās account and transfer it to external wallets.
Commenting on how the leaked code might be used, Platon said,
āMost likely an insider created a handler to get access to user API keys then they harvested those API keys and got access to user data and have built nice toolkit to work through this.ā
When this information was presented to a Binance representative, they stated,
āAs of the latest from the team, there is currently no evidence that these are KYC images from Binance and they are not watermarked per our system process.ā
Meanwhile, Platon says,
āI personally wanted to make Binance worldās first exchange that capture hackers. It will be extremely positive for Binanceās reputation.ā
He adds,
āI informed [Lin, Binanceās chief growth officer] that I have got insider information such as insiderās detail, insiderās communication details with outsiders and even insiderās photo. I informed him that I have details of hackers ā server information, their identity, their phone numbers and etc.ā
According to CoinDesk, Lin told Platon that Binance would be willing to pay for information that would lead to the arrest of the hackers. However, he says the exchange will not pay 300 BTC for the leaked KYC data.
āAs I said, we donāt react to extortions,ā Lin states.Ā
Platon claims he doesnāt need money as he currently owns an exchange that is one-third the size of Binance. Says Platon,
āWhen I require money, I can just hack out one exchange account balance (hackerās). I could retrieve more than 600 or 700 coins easily by hacking hackerās wallet.ā
He continues,
āPeople keep asking, āWhy are you releasing those KYC photos?ā āHow did you get them?ā The reason I am releasing those KYC is simple: To warn you people who are dealing on Binance. If I needed money, I would sell it underground, not to publish it.ā
[the_ad id="42537"] [the_ad id="42536"]