Top 10 Crypto Crimes

Outstanding incidents of this type of crime since 2011

Blog Top 10 Crypto Crimes

| 7 min read

Contact us

After an introduction to the cryptocurrency paradigm and related criminality in the previous blog post, we move on here to briefly describe some crypto crime incidents that have stood out since 2011. (If you are not acquainted with concepts such as blockchain and DeFi protocols, we invite you to read that post first.) We took as a primary basis the data reported by Crystal, a company that, from January 2011 to February 2023, has recorded 461 incidents in which around $16.7 billion has been stolen.

Four hundred sixty-one are so many cases to choose from to define a top 10. What we did was base it largely on the amount of money stolen, but we also considered variety in the type of crime and the frequency of reference to the cases in other sources. For this reason, some incidents with higher amounts of stolen funds are not shown here. Additionally, it is worth mentioning that, in a couple of cases, we grouped several incidents aimed at the same target but placed more emphasis on the most important of them.

  1. PancakeBunny (DeFi breach / 2021 / $49.1m)

PancakeBunny is a DeFi (decentralized finance) protocol mainly for Binance Coin (BNB). Associated with PancakeBunny are three incidents, all in the same year, but the first of them accounted for the most stolen funds: $45 million. In this case, which occurred in May 2021, the hackers involved carried out a flash loan attack. They initially borrowed a large sum of BNBs from the pools of the PancakeSwap exchange. They then used a bug to manipulate the exchange rates USDT/BNB and BUNNY/BNB (USDT is short for crypto Tether, and BUNNY is the PancakeBunny token) and acquired a large amount of BUNNY and dumped them to the market, which caused their price to plummet. In a series of complex procedures, the hackers managed to acquire tokens at one price, sell them at another, make a huge profit and repay the initial loan.

  1. KuCoin (breach / 2020 / $281m)

KuCoin is an Asian cryptocurrency exchange founded in 2017. In this case, hackers managed to obtain some private keys and gain access to several hot wallets of this exchange. (Unlike cold wallets, hot wallets are connected to the Internet, so they are considered less secure). There were then massive thefts of ERC-20 tokens and various cryptocurrencies, most notably Bitcoin (BTC) and Ethereum (ETH). KuCoin reacted quickly, transferring the remaining funds to new hot wallets, getting rid of the affected ones, and freezing deposits and withdrawals. It is said that the exchange managed to recover around $240 million. However, another source of information suggests that the recovery was complete thanks to the cooperation with partners, security institutions, and other organizations. Later, some researchers attributed this theft to the North Korean attacker crew called Lazarus Group, mainly based on their observations about how the criminals laundered the stolen funds.

  1. Wormhole (DeFi breach / 2022 / $326m)

Wormhole is a cross-chain message-passing protocol. On its network, Portal acts as a token bridge between the blockchains of the cryptocurrencies Ethereum and Solana (SOL). In this case, hackers exploited a vulnerability in the signature verification code of the Wormhole network to, without depositing funds in a contract on the source chain, successfully mint 120 thousand Wormhole-wrapped ETH on the target chain, i.e., Solana. These ETH tokens, therefore, were not collateralized or backed by deposits on the Ethereum side of the bridge. From there, the criminals sent about 93 thousand tokens back to Ethereum, where they could exchange them for native ETH. On the other hand, the remaining tokens were exchanged for SOLs on Solana. Shortly thereafter, Jump Crypto, a team involved in the development of Wormhole, replenished the missing funds. A year later, Jump Crypto allegedly counterattacked the Wormhole exploiters to recover ETHs stolen from them successfully.

  1. Coincheck (breach / 2018 / $535m)

Coincheck is a Japanese cryptocurrency exchange, which in early 2018 had around 500 million NEM tokens (i.e., XEM, the cryptocurrency running on the New Economy Movement blockchain) stolen from its digital hot wallets (apparently they did not use cold wallets), which were transferred to more or less 20 accounts. As noted in the subtitle, this sum corresponded to more than $500 million. From there, Coincheck had to freeze several deposit, trading and withdrawal services. According to this exchange, the hackers were able to access their systems due to a shortage of employees. Still, the incident was more associated with limited security controls and vulnerability exploitation. The perpetrators of the theft were apparently never identified, but in 2021, there were reports of 30 people accused of exchanging a significant portion of the XEM stolen in that hack. Coincheck eventually managed to use its capital to compensate its 260,000 customers for the losses and, obviously, was forced to improve its security protocols, including, for example, enhanced "know your customer" procedures.

  1. FTX (breach / 2022 / $600m)

Here's the case of what was once one of the largest cryptocurrency exchanges in the world: FTX, which, based in the Bahamas, had its native cryptocurrency called FTT. This company, just one day after having filed for bankruptcy (apparently due to lack of liquidity and the failure of a deal with Binance), reported it was investigating unauthorized access and transactions from its accounts. This incident came to make things worse at a time when the collapse of FTX had already meant losses of billions of dollars in cryptos for the customers. It seems the perpetrator was either a hacker or an insider with special access who intended to abscond with hundreds of millions of dollars, and they took it upon themselves to move and convert the looted tokens to ETH quickly. From administration, this company recommended customers delete FTX applications and not log in to its website to prevent further theft, allegedly because there was already malware associated with them. In addition, it said it had accelerated the transfer of remaining funds to cold wallets. Almost a year after the incident, according to data related to the chain, a few million dollars were reported to have been moved from the alleged perpetrator's wallet.

Get started with Fluid Attacks' Secure Code Review solution right now

  1. Poly Network (DeFi breach / 2021 / $614m)

Poly Network is an international cross-chain protocol that, as suggested by its name, serves for the interoperability of diverse blockchains. This DeFi platform was confronted with one of the biggest cryptocurrency heists in history at the hands of a hacker who, it seems, did it just for fun. He managed to exploit a vulnerability in Poly Network's code to steal hundreds of millions of dollars in ETH, Binance Smart Chains (BSC) and Polygon cryptos. However, according to his intentions, the hacker, nicknamed Mr. White Hat, was gradually returning the stolen funds since, according to him, "I am not very interested in money!" He just wanted this to serve as a lesson for them. Mr. White Hat was even in frequent and public dialogue with Poly Network about it. Indeed, the company ended up offering him a $500k reward for helping it identify weaknesses in its systems and, bizarrely enough, a job as "chief security advisor." Despite all this, in the middle of this year, it was reported that Poly Network had been hacked again. This time, the perpetrator had taken advantage of a vulnerability that allowed them to create new tokens.

  1. Mt. Gox (breach-fraud / 2011-4 / $615m)

The first of the crypto crime incidents with Mt. Gox is often referred to as the oldest. In fact, it is called the "first crypto exchange hack." Mt. Gox was a Japanese BTC exchange launched in 2010 that once handled 70% of transactions in this cryptocurrency. In 2011, cybercriminals compromised the private keys and, consequently, the account of one of the platform's administrators and flooded Mt. Gox with vast amounts of fake BTCs. As a result, the price of this cryptocurrency dropped sharply, apparently to 1 cent! Then, the culprits created sell orders on the accounts of Mt. Gox users and, from there, were able to buy and withdraw more than two thousand bitcoins at a very low cost. That was the first case. However, months later, 2,609 BTCs were destroyed due to a programming error. Finally, in 2014, the platform's operations ceased because, throughout those years, the thefts had reached the enormous magnitude of around 850 thousand BTCs, which corresponded to hundreds of millions of dollars. In mid-2023, the U.S. Department of Justice issued a press release charging two Russian citizens for hacking Mt. Gox.

  1. Ronin (DeFi breach / 2022 / $650m)

According to the Crystal data we used for reference, this is the largest DeFi hack ever. Ronin, another cross-chain bridge, was reportedly hacked by the aforementioned Lazarus Group. It took six days for Ronin to identify and report what was the result of exploiting human weakness through social engineering. Explicitly, the hackers obtained the private cryptographic keys of some of the bridge's validator nodes (the mere five needed to approve transactions). It was then that the U.S. Treasury's Office of Foreign Assets Control (OFAC) sanctioned their Ethereum address so that no transactions could be made from it. However, it was confirmed that part of the stolen funds had already been transferred to Tornado Cash, one of the most popular smart contracts for laundering cryptoassets on the Ethereum blockchain. Ronin then had to freeze deposit and withdrawal services temporarily, and its developer team, Sky Mavis, promised to reimburse victims and, if possible, recover the stolen funds.

  1. Thodex (fraud / 2021 / $2b)

Now, to close this list, we have a couple of scams that lead us to talk about abysmal figures of over one billion dollars. Thodex was a cryptocurrency exchange platform founded by Faruk Fatih Özer in 2017 that became one of the most successful in Turkey. In 2021, when this exchange already had around 390 thousand active users, Özer suddenly shut down the platform (stating on its website that it would only be for a few days) and fled Turkey with a sum of around $2 billion in investors' assets. Before long, many users were already filing criminal complaints against Thodex for being unable to access their accounts and funds. In mid-2022, Özer was arrested in Albania and, in 2023, deported to his home country, where he was sentenced to 11,196 years in prison for organized crime, fraud and money laundering. Özer's brother and sister were also convicted on the same charges.

  1. PlusToken (fraud / 2019 / $2.9b)

PlusToken was a cryptocurrency wallet founded in 2018 by Chen Bo that, as a Ponzi scheme, promised its users high rates of return for the purchase of its tokens associated with Bitcoin or Ethereum. Although operating mainly in China and South Korea, it expanded to other Asian countries thanks to Bo's recruitment of members. In 2019, users started to report problems when extracting their funds from the platform. Apparently, the scammers then withdrew the collected funds in different cryptocurrencies and posted the ruthless message, "Sorry, we have run." Although the authorities at the time managed to arrest six people involved, the transactions made it clear that many were still fugitives. The criminals were eventually chasing out several million in different exchanges until, in mid-2020, the Chinese government put an end to the fraud by arresting 109 traders, of whom 27 were the alleged masterminds. Chen Bo and other perpetrators were sentenced to between two and 11 years in prison and received fines ranging from $18,000 to $900,000.

Subscribe to our blog

Sign up for Fluid Attacks' weekly newsletter.

Recommended blog posts

You might be interested in the following related posts.

Photo by Clay Banks on Unsplash

Protecting your PoS systems from cyber threats

Photo by Charles Etoroma on Unsplash

Top seven successful cyberattacks against this industry

Photo by Anima Visual on Unsplash

Challenges, threats, and best practices for retailers

Photo by photo nic on Unsplash

Be more secure by increasing trust in your software

Photo by Dmitry Ant on Unsplash

How it works and how it improves your security posture

Photo by The Average Tech Guy on Unsplash

Sophisticated web-based attacks and proactive measures

Photo by Randy Fath on Unsplash

The importance of API security in this app-driven world

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.