{"id":47131,"date":"2021-08-03T14:29:49","date_gmt":"2021-08-03T11:29:49","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=47131"},"modified":"2025-09-01T19:49:59","modified_gmt":"2025-09-01T16:49:59","slug":"hodl-hodl-launches-liquidation-of-select-contracts-amid-potential-security-concerns","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/hodl-hodl-launches-liquidation-of-select-contracts-amid-potential-security-concerns\/","title":{"rendered":"Hodl Hodl launches liquidation of select contracts amid potential security concerns"},"content":{"rendered":"<p>The P2P platform Hodl Hodl, which facilitates the buying and selling of Bitcoin, <a href=\"https:\/\/hodlhodl.medium.com\/?source=post_page-----abf3a796b780--------------------------------\">said<\/a> there were potential security issues, and has launched a migration and liquidation of contracts.<\/p>\n<p>During a recent audit, the platform found that some user passwords may have been compromised, Hodl Hodl representatives said.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abWe began migrating\/liquidating user contracts to prevent potential loss of funds\u00bb, the blog said.<\/p>\n<\/blockquote>\n<p>In a conversation with ForkLog, Hodl Hodl CEO Max Kaidun stressed that this concerns only certain contracts.<\/p>\n<p>On Twitter the company said it would initiate liquidation of contracts that are still in execution but deemed &#8216;high-risk&#8217;.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">You can always recreate the contract on the same terms after the Liquidation with no fees.<\/p>\n<p>Please check your contract&#8217;s chat for more details.<\/p>\n<p>\u2014 Hodl Hodl (@hodlhodl) <a href=\"https:\/\/twitter.com\/hodlhodl\/status\/1421975057027448834?ref_src=twsrc%5Etfw\">August 1, 2021<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Users were alarmed by letters from the platform that urged them to close contracts within two hours in a very scammy style.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Guys what is going on with <a href=\"https:\/\/twitter.com\/hodlhodl?ref_src=twsrc%5Etfw\">@hodlhodl<\/a> ?<\/p>\n<p>We are getting mail with a very scammy style, where they are pushing us to close contracts in the next 2 hours (!!) does somebody know what&#8217;s going on?<\/p>\n<p>Have they been compromised?<a href=\"https:\/\/twitter.com\/stephanlivera?ref_src=twsrc%5Etfw\">@stephanlivera<\/a> i tag you cause i knew of them thx to you<\/p>\n<p>\u2014 \ud83c\udf0b WARTIME \u26cf\ufe0f dende.hodl | upgrade to 0.21.1 \ud83d\udfe9 (@HodlBits) <a href=\"https:\/\/twitter.com\/HodlBits\/status\/1421914873617952772?ref_src=twsrc%5Etfw\">August 1, 2021<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Hodl Hodl apologized for the poorly worded communications and confirmed that the letters were genuine.<\/p>\n<p>The platform continues to study the issue and works with external auditors. Hodl Hodl&#8217;s CEO told ForkLog that after obtaining a full picture of the incident, the team will publish details in the blog.<\/p>\n<p>Last year, Hodl Hodl became the first non-custodial P2P platform available in a mobile app, and <a href=\"https:\/\/forklog.com\/en\/news\/hodl-hodl-launches-defi-project-for-bitcoin-backed-loans\">launched the Lend at Hodl Hodl<\/a> platform for Bitcoin-backed loans.<\/p>\n<p>Follow ForkLog&#8217;s Bitcoin news on our <a href=\"\/\/telegram.me\/forklog\" target=\"\u201c_blank\u201d\" rel=\"\u201cnofollow\u201d noopener\">Telegram<\/a> \u2014 cryptocurrency news, rates and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The P2P platform Hodl Hodl, which facilitates the buying and selling of Bitcoin, said there were potential security issues, and has launched a migration and liquidation of contracts.<\/p>\n","protected":false},"author":1,"featured_media":26216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,698],"class_list":["post-47131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-hodlhodl"],"aioseo_notices":[],"amp_enabled":true,"views":"24","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=47131"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47131\/revisions"}],"predecessor-version":[{"id":47132,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/47131\/revisions\/47132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/26216"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=47131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=47131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=47131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}