VERSE PRESS

Crypto News, Global First.

Kraken Refuses Extortion Demand After Criminal Group Threatens to Release Videos of Internal Access

Kraken says roughly 2,000 user accounts were affected in a two-stage insider incident, but no funds were touched and the exchange has declined to pay any ransom.

Kraken Refuses Extortion Demand After Criminal Group Threatens to Release Videos of Internal Access
|

Crypto exchange Kraken confirmed on April 13 that an unnamed criminal group attempted to extort the platform by threatening to release videos showing support staff accessing internal client support systems. The exchange refused to negotiate, stated that no customer funds were ever at risk, and said it is now cooperating with law enforcement to identify and arrest those responsible.

The incident unfolded in two stages over roughly 14 months. In February 2025, Kraken received an external tip that a recording appeared to be circulating on criminal forums, showing an employee navigating internal support tools. The employee's access was revoked and security controls were tightened. A second near-identical case surfaced in April 2026, with another support team member's credentials terminated after detection. Shortly after that second account was shut down, the criminal group issued its threat: pay up, or the videos go to media outlets and social platforms.

Kraken's Chief Security and Information Officer, Nick Percoco, rejected the demand outright. "Our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors," Percoco said in a statement reported by CoinDesk. The exchange said the affected accounts total approximately 2,000, representing about 0.02% of its user base of more than 15 million people across 190-plus countries. The data accessed was limited to what support staff can view in internal client support systems, not the core trading or custody infrastructure.

The refusal to pay is consistent with Kraken's established posture. In June 2024, when researchers at security firm CertiK exploited a zero-day vulnerability and extracted approximately $3 million from the exchange, Kraken declined to negotiate in that instance as well.

Part of a Broader Pattern

The Kraken attempt fits a well-documented wave of insider-recruitment attacks targeting major exchanges. In May 2025, Coinbase disclosed that hackers had bribed overseas support agents at BPO firm TaskUs, operating out of Indore, India, to extract data on less than 1% of the platform's monthly active users. Those workers earned between $500 and $700 per month, and one security analyst described human support staff as "the weakest point in the chain," noting the wage gap made them structurally vulnerable to cash offers from criminal networks. Total bribery payments to TaskUs employees exceeded $500,000. Coinbase also refused a ransom, this one set at $20 million. The incident ultimately cost the exchange an estimated $180 million to $400 million in remediation. Around the same time, Binance reported that bribery approaches were made to its own support agents via Telegram, but said its internal AI systems flagged the messages before any data was compromised.

Kraken itself surfaced in a separate dark web incident in January 2026, when a vendor on a Russian-language forum claimed to be selling access to Kraken's customer support panel, including KYC documents (government-issued IDs, selfies, proof of address) and transaction histories. CSO Nick Percoco personally investigated the listing and concluded it was not legitimate, according to Protos.

Social engineering, the practice of manipulating people rather than exploiting code, accounted for 55.3% of all crypto losses in 2025, totaling approximately $1.39 billion, according to industry data cited by MEXC, a competitor exchange. Total industry losses for 2025 reached $3.4 billion.

What It Means for Users Outside the US

For users in South Asia, the regional dimension is direct. The Coinbase case established that outsourced support hubs in India are active recruitment targets for criminal networks, with payment offers that can dwarf local monthly wages. Kraken has not disclosed where its support staff are based, but the industry-wide reliance on cost-effective overseas operations in South and Southeast Asia makes the pattern relevant regardless. Security researchers have also documented North Korean state-linked networks deploying fake recruiters to approach support workers in high-wage-gap markets, including those across South and Southeast Asia, a threat vector flagged as particularly acute in regions where cryptocurrency adoption is outpacing institutional oversight. Users in India, Pakistan, and neighboring markets should check whether they have received a notification from Kraken and, as a precaution, should rotate passwords and audit active sessions.

African users face a different but related concern. In markets where Kraken operates openly, primarily South Africa under FSCA oversight and Kenya under a still-developing regulatory framework, the core risk is KYC data exposure. Support-level access includes the kind of identity documentation that, in less mature data protection environments, can enable downstream fraud with limited legal recourse for affected users. According to data cited by SQ Magazine and referenced by the World Economic Forum, 63% of sub-Saharan African organizations lack critical cybersecurity expertise, a gap that compounds the institutional risk when exchanges experience support-layer breaches. Nigerian traders, who largely access Kraken through VPNs or non-KYC workarounds (access that may conflict with the platform's terms of service) given the exchange's restrictions on that jurisdiction, have limited formal exposure to this specific incident but also limited formal recourse if they are affected.

Percoco offered a broader framing of the threat environment. "Attackers aren't breaking in, they're being invited in," he said, as reported by CoinTelegraph. He argued that the real security challenge is no longer about building higher walls but about training people to recognize manipulation before it succeeds.

What Comes Next

Kraken says it has gathered enough evidence to support arrests and is working with law enforcement. The exchange has not named the criminal group and has not disclosed which law enforcement agency or jurisdiction is handling the investigation. For developers and teams building on Kraken's API or custody services, the company has been clear that this incident was confined to the support layer and did not touch core infrastructure.

The harder question for the industry is structural. Industry observers note that as long as exchanges rely on large, geographically distributed support workforces operating in high-wage-gap environments, the human layer will remain the easiest point of entry. Percoco's own framing points to the same conclusion: the threat is not a technical failure but a human one, and no firewall addresses it.