{"id":65165,"date":"2022-08-01T13:00:00","date_gmt":"2022-08-01T10:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=65165"},"modified":"2025-09-06T18:29:33","modified_gmt":"2025-09-06T15:29:33","slug":"millions-spent-on-security-how-gate-io-protects-customer-funds","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/millions-spent-on-security-how-gate-io-protects-customer-funds\/","title":{"rendered":"Millions Spent on Security: How Gate.io Protects Customer Funds"},"content":{"rendered":"<p>According to HedgewithCrypto, over the past decade hackers have hacked 49 crypto exchanges and stolen $2.7 billion. Nevertheless, venues continue to improve security \u2014 major thefts are becoming rarer. In 2020 there were nine hacks, last year four, and this year only one.<\/p>\n<p>Together with <a class=\\\"tracking_link\\\" href=\\\"https:\/\/gate.io\/?ch=forklog_20220728&#038;utm_campaign=TR_PBz06vfZ&#038;utm_content=&#038;utm_medium=CPM&#038;utm_source=CH_wxcni494&#038;utm_term=\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Gate.io<\/a> we explain which attack vectors hackers most often use, how the platform protects client funds, and what the largest crypto exchanges fear.<\/p>\n<h2 class=\\\"wp-block-heading\\\">What goes into exchange security<\/h2>\n<p>The most common reason for exchanges being hacked is vulnerabilities in the storage of private keys for hot wallets. According to HedgewithCrypto, hackers also exploited:<\/p>\n<ul class=\\\"wp-block-list\\\">\n<li>bugs in the trading platform;<\/li>\n<li>phishing;<\/li>\n<li>breaches in server security;<\/li>\n<li>the distribution of malware;<\/li>\n<li>employee bribery.<\/li>\n<\/ul>\n<p>To protect clients, platforms must close these vulnerabilities and develop incident-response scenarios for different threats. Some exchanges employ unique measures:<\/p>\n<ul>\n<li>Gate.io has developed a program for on-chain auditing of reserves and, as the first of mainstream crypto exchanges, <a class=\\\"tracking_link\\\" href=\\\"https:\/\/www.gate.io\/article\/27110\/?ch=forklog2_20220728&#038;utm_campaign=TR_j82PLsBk&#038;utm_content=&#038;utm_medium=CPM&#038;utm_source=CH_wxcni494&#038;utm_term=\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">provided<\/a> proof of 100% backing of user balances;<\/li>\n<li>BitMEX <a href=\\\"https:\/\/www.bitmex.com\/security\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">implemented<\/a> a post-trade balance reconciliation in the trading engine and a circuit breaker to halt operations if a trader&#8217;s account does not reconcile with their trade history;<\/li>\n<li>Coinbase <a href=\\\"https:\/\/www.coinbase.com\/ru\/compliance\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">launched<\/a> Coinbase Tracer \u2014 a proprietary service for verifying the integrity of transactions;<\/li>\n<li>Kraken <a href=\\\"https:\/\/www.kraken.com\/uk-ua\/features\/security\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">installed<\/a> surveillance in server rooms and stationed armed guards.<\/li>\n<\/ul>\n<p>A comprehensive security program is costly: Gate.io spends millions of dollars a year on it. The exact figure remains confidential.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Protecting hot and cold wallets<\/h2>\n<p>Exchanges use two types of wallets: hot for daily operations such as deposits and withdrawals, and cold for secure asset storage.<\/p>\n<p>Keys to hot wallets are typically kept on an internet-connected computer so the platform can sign transactions quickly. This is dangerous \u2014 hackers can access the machine, steal the private key, or redirect transactions to their addresses.<\/p>\n<p>To manage hot and cold wallets Gate.io uses <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-multisignature-what-is-a-ring-signature\">multisignature<\/a>, meaning the theft of a single key will not lead to loss of control over assets.<\/p>\n<p>In addition, Gate.io keeps keys and backups in Hardware Security Modules for business tasks. All cold wallets are offline.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Site and server security<\/h2>\n<p>In 2020 hackers <a href=\"https:\/\/forklog.com\/en\/news\/bitcoin-price-on-livecoin-exchange-surges-to-220000-platform-suspected-of-exit-scam\">gained<\/a> access to Livecoin&#8217;s servers, raised Bitcoin and Ethereum quotes to $220,000 and $65,000 respectively, and then stole more than $2 million. Since 2014 such breaches have affected eight exchanges.<\/p>\n<p>To counter such attacks, Gate.io <a class=\\\"tracking_link\\\" href=\\\"https:\/\/www.gate.io\/security#compliance\/?ch=forklog3_20220728&#038;utm_campaign=TR_RIaf3xUT&#038;utm_content=&#038;utm_medium=CPM&#038;utm_source=CH_wxcni494&#038;utm_term=\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">uses<\/a>:<\/p>\n<ul class=\\\"wp-block-list\\\">\n<li>the HTTPS protocol for secure data transmission between users and servers;<\/li>\n<li>its own anti-<span data-descr=\\\"Distributed Denial-of-Service \u2014 a flood of requests intended to overwhelm the service infrastructure and render it unavailable to users.\\\" class=\\\"old_tooltip\\\">DDoS<\/span> and CloudFlare firewall to protect against traffic that could slow or disable the platform;<\/li>\n<li>Web Application Firewall (WAF) to counter network attacks \u2014 <span data-descr=\\\"Structured Query Language, the language of structured queries used by applications to access databases.\\\" class=\\\"old_tooltip\\\">SQL<\/span>-injections, token tampering, executing malicious code in the browser, and password-guessing attempts;<\/li>\n<li>secured <span data-descr=\\\"Domain Name System \u2014 the service that routes traffic to the physical addresses of websites by their domain names.\\\" class=\\\"old_tooltip\\\">DNS<\/span> to prevent hackers from redirecting users to phishing sites.<\/li>\n<\/ul>\n<p>The Gate.io trading core consists of modular components. This approach prevents hackers from implementing a scenario of quote manipulation, instrument profitability or any other parameter of the platform.<\/p>\n<p>To ensure internal security the exchange has implemented corporate firewalls and an access-control system for corporate resources. If one workstation is infected, the system will detect the virus at the first attempt to read data.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Account security<\/h2>\n<p>If an attacker gains access to a user account, they could steal funds despite wallet and platform protections. Therefore Gate.io requires users to enable two-factor authentication by one of the methods:<\/p>\n<ul>\n<li>a code via SMS or email;<\/li>\n<li>Google Authenticator;<\/li>\n<li>sign-in via a hardware security key such as <a href=\\\"https:\/\/www.yubico.com\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">YubiKey<\/a>, Gate.io hardware wallet Wallet S1 with a fingerprint scanner or another device supporting the FIDO2 standard.<\/li>\n<\/ul>\n<p>The user also sets a trading password. The platform prompts for it before any operation with assets: opening or closing a position, transferring funds, or withdrawing cryptocurrency to an external wallet. Additionally, they can configure a withdrawal whitelist.<\/p>\n<p>Even with the account login and password, a hacker would not be able to withdraw or otherwise use funds from the account. Gate.io will notify the account holder of a login from a new IP address and log it in the login history.<\/p>\n<p>For contingencies Gate.io runs an account-recovery service. The user provides contact details for close relatives or friends. If they do not access the platform for a long period, the exchange will contact the designated people and, after identity verification, hand over access to the account.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Platform transparency<\/h2>\n<p>In 2022 crypto enthusiasts faced a new problem: exchanges used their deposits for their own operations. As Bitcoin and Ethereum prices fell, platforms&#8217; positions became unprofitable. Firms halted withdrawals or even declared bankruptcy. Two years earlier Gate.io had developed an on-chain solution Proof-of-Reserves for independent reserve audits. It enables users to view their real balance on the exchange&#8217;s cold wallet by the UID hash.<\/p>\n<p>In July 2022 the auditing firm Armanino LLP <a class=\\\"tracking_link\\\" href=\\\"https:\/\/www.gate.io\/article\/27110\/?ch=forklog2_20220728&#038;utm_campaign=TR_j82PLsBk&#038;utm_content=&#038;utm_medium=CPM&#038;utm_source=CH_wxcni494&#038;utm_term=\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">confirmed<\/a> that Proof-of-Reserves works correctly and Gate.io stores 100% of customer funds.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Security of the ecosystem<\/h2>\n<p>Crypto exchanges launch blockchains and tokens, but cannot guarantee the security of decentralized applications. Thus, in March 2021 hackers <a href=\"https:\/\/forklog.com\/en\/news\/cz-urges-users-to-refrain-from-interacting-with-pancakeswap-and-other-bsc-projects-amid-dns-hijack-attack\">took over<\/a> Pancake Swap\u2019s DNS on BNB Chain, and intercepted the private keys of some traders.<\/p>\n<p>To address this vulnerability Gate.io <a class=\\\"tracking_link\\\" href=\\\"https:\/\/gatechain.medium.com\/rtm-how-can-gatechain-be-hack-proof-a0b7a9e0c8c2\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">added<\/a> a transaction-cancellation and emergency-withdrawal mechanism to GateChain. Users create special storage addresses and specify the number of blocks within which they can reverse sent transactions.<\/p>\n<p>In addition, the storage owner can bind a fallback withdrawal address to the storage in case of a lost private key. This requires contacting Gate.io support.<\/p>\n<h2 class=\\\"wp-block-heading\\\">Conclusion<\/h2>\n<p>After a rebranding on the \\&#8221;About Gate.io\\&#8221; page a slogan appeared: \\&#8221;Our top priority is the security of users&#8217; data and assets.\\&#8221; And this is true: the exchange&#8217;s security system closes known vulnerabilities of trading platforms.<\/p>\n<p>But Gate.io does not stop there: the exchange launched a bug-bounty program for white-hat hackers and developed a hardware wallet with a fingerprint scanner Wallet S1.<\/p>\n<p>Read ForkLog&#8217;s Bitcoin news in our Telegram \u2014 cryptocurrency news, prices and analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Together with Gate.io we explain which attack vectors hackers most often use, how the platform protects client funds, and what the largest crypto exchanges fear.<\/p>\n","protected":false},"author":1,"featured_media":65166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"2","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1111,1624],"class_list":["post-65165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-cybersecurity","tag-gate-io"],"aioseo_notices":[],"amp_enabled":true,"views":"37","promo_type":"2","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/65165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=65165"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/65165\/revisions"}],"predecessor-version":[{"id":65167,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/65165\/revisions\/65167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/65166"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=65165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=65165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=65165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}