{"id":7248,"date":"2020-01-09T17:46:08","date_gmt":"2020-01-09T15:46:08","guid":{"rendered":"https:\/\/forklog.media\/?p=7248"},"modified":"2020-01-20T02:21:44","modified_gmt":"2020-01-20T00:21:44","slug":"hackers-loophole-vulnerabilities-that-cause-bitcoin-exchanges-to-lose-millions","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/hackers-loophole-vulnerabilities-that-cause-bitcoin-exchanges-to-lose-millions\/","title":{"rendered":"Hacker\u2019s Loophole: Vulnerabilities That Cause Bitcoin Exchanges to Lose Millions"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">According to a May <\/span><a href=\"https:\/\/www.theblockcrypto.com\/linked\/22660\/biggest-crypto-hacks-ever\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\"> by The Block, 42 large cryptocurrency exchanges have been compromised since 2012, not taking smaller platforms into account. The total amount of stolen funds exceeded $1.35 billion, with about 59% of these funds (795.5 million) being stolen in 2018.<\/span><\/p>\n<p><!--more--><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Screen-Shot-2019-05-08-at-9.32.18-AM-e1559677517137.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.carbonblack.com\/2018\/06\/07\/carbon-black-threat-report-cryptocurrency-gold-rush-dark-web\/\"><span style=\"font-weight: 400;\">Carbon Black<\/span><\/a><span style=\"font-weight: 400;\">, a cyber threat protection company, cryptocurrency exchanges account for 27% of all attacks related to cryptocurrency. In most cases, the hackers exploit vulnerabilities of crypto-exchange hot wallets, less often users fall victim to exit scams from the platform owners. ForkLog looked into the main crypto exchange bugs which were used by hackers the most in 2018\u20132019.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><b>How hackers attack exchanges<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While an attacker requires specific conditions when launching an attack on a mobile device or personal computer, e.g. the ability to intercept traffic or to physically access the device, this is not necessarily the case for attacks via web applications. Hence such attacks tend to be larger in scale.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Positive Technologies analysts <\/span><a href=\"https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/trading-applications-2018\/?sphrase_id=64038\"><span style=\"font-weight: 400;\">examined<\/span><\/a><span style=\"font-weight: 400;\"> the most popular approaches used to hack cryptocurrency exchange web terminals, which allow hackers to breach hot wallets of crypto trading platforms.<\/span><\/p>\n<h3><strong><span style=\"font-size: 14pt;\">XSS<\/span><\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Most trading platforms are vulnerable to Cross-Site Scripting attacks. Using certain vulnerabilities, cybercriminals inject malicious code on the platform\u2019s web page redirecting traders to third-party web pages and\/or infecting user devices with malware. This malicious software includes stealer viruses that steal wallet passwords or replace the sender address in the clipboard.<\/span><\/p>\n<h3><strong>Configuration vulnerabilities<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Web terminals sometimes lack HTTP headers that increase protection from certain types of hacker attacks. For instance, the ContentSecurity-Policy header protects against attacks related to the injection of malicious content, including XSS. X-Frame-Options protects from Clickjacking attacks. Strict-Transport-Security enforces a secure connection through HyperText Transfer Protocol Secure (HTTPS).<\/span><\/p>\n<h3><strong>Code vulnerabilities<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Studies conducted by Coverity, a company specializing in software quality and security testing solutions, <\/span><a href=\"https:\/\/scan.coverity.com\/projects\/993\"><span style=\"font-weight: 400;\">showed<\/span><\/a><span style=\"font-weight: 400;\"> that for every 1000 lines of code there are 0.52 errors in open source products and 0.72 errors in proprietary ones (the quality standard being less than 1 error per 1000 lines of code). Potentially these errors can adversely affect the overall security of the platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if the exchange developers make no errors in the code there is still the risk of a vulnerability in third-party software. For example vulnerabilities in the operating system, payment gateways or messengers can be used for phishing or installation of malicious software on the exchange employees&#8217; devices.<\/span><\/p>\n<h3><strong>Smart contract vulnerabilities<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers may find a vulnerability in the wallet\u2019s smart contract code which allows them to take control of the victim\u2019s funds. This can be either a targeted attack on a particular wallet or a large scale attack if many wallets share the same vulnerability.<\/span><\/p>\n<h3><strong>Phishing and social engineering<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Exploiting human weaknesses remains the most popular way of hacking accounts. Attackers disguised as exchange representatives may gain access to the employees\u2019 devices (sometimes it takes months to complete this task) and take possession of private keys. Hacking a private account is made much easier thanks to Google Play.<\/span><\/p>\n<h3><strong>SMS authentication<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">If the attackers know that a specific person is trading on a platform or works as its administrator, his SMS traffic can be intercepted and used for authentication or to initiate the account restoration procedure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hacking venues:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Wiretapping using special equipment, infecting the victim\u2019s phone with malware or hacking the provider&#8217;s server.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cloning a SIM card.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">False base station \u2013 expensive equipment that intercepts and decrypts SMS.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hacking user\u2019s Personal Account on the exchange site. By doing this you can redirect all messages to the attacker&#8217;s device or email address.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SS7 attack. Hacking special telecommunication protocols used to configure telephone exchanges (PLMN, PSTN);<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Phishing exchange\u2019s call center. Attackers collect users\u2019 personal data and their phone numbers and then call the call center operator to recover the SIM card.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Intercepted SMS can be used not only to access the exchange account but also to restore access to email. To do this the culprit attempts to log in to the mail service and after a failure resets the password using SMS.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><b>How exchanges fight back<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Most cryptocurrency exchanges use at least one, more often several, anti-hacker systems. The simplest and most common is <\/span><b>two-factor authentication<\/b><span style=\"font-weight: 400;\">: for each transaction you need to enter a one-time password, which is sent to the client\u2019s phone or email.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That being said, two-factor authentication is not the most reliable defense. A more advanced version of two-factor authentication is <\/span><b>special applications<\/b><span style=\"font-weight: 400;\"> like Authy and Authenticator. They block access to the system and request an additional code if the username and password are compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second most popular method of protection is <\/span><b>multi-signature<\/b><span style=\"font-weight: 400;\">: when several keys to the Bitcoin wallet are held by different owners and access to funds can be obtained only by securing all digital signatures. Still, this system may fail, too. Experts note that multi-signature works only when all the &#8220;signatories&#8221; are independent of each other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most reliable ways to protect against hacker attacks is the <\/span><b>distribution of funds between hot and cold wallets<\/b><span style=\"font-weight: 400;\">. In addition to physical protection (video cameras, armed security, retinal scanner, etc.) a cold wallet can be additionally protected by a multi-signature. The larger the share in the cold storage the safer. Ideally, cryptocurrency should only go online at the time of the transaction.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another security measure is the so-called <\/span><b>bitcoin valves<\/b><span style=\"font-weight: 400;\"> which are the bitcoin addresses where coins are locked with a two-stage security mechanism with two different keys. To unlock the funds you need a regular digital key but full access to your money is gained only after a 24 hours period. During that time, any transaction can be canceled by entering the second key. There is one more level of protection: even if a hacker takes possession of both keys, the exchange can burn the funds stored in the wallet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is becoming a bon ton among crypto exchange operators to conduct <\/span><b>hack tests and<\/b> <b>regular audits by independent experts<\/b><span style=\"font-weight: 400;\">. The latter is performed by the so-called white hat hackers. Their job is to crack security systems to find potential vulnerabilities that could be exploited by cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In any case, a comprehensive approach is important when it comes to the security of cryptocurrency exchanges: the security of native code in conjunction with the security of the development environment and third-party libraries that are used to create the product. The human factor which often contributes to hacker attacks cannot be ruled out.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><b>Exchanges robbed by hackers in 2018\u20132019 (listed in chronological order):<\/b><\/span><\/h2>\n<h3><span style=\"font-size: 18pt;\"><span style=\"font-size: 14pt;\"><b>Coincheck<\/b><\/span><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On 26 January 2018 the Japanese cryptocurrency exchange Coincheck admitted the theft of $533 million in NEM cryptocurrency. About 260 thousand users fell victim to hacking.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At a press conference, NEM representatives said that hacking happened due to the fact that Coincheck neglected to use a smart contract with multi-signature function.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Coincheck security settings vary for different coins on the exchange. Hackers managed to steal the private key from a hot wallet where NEM coins were stored and withdrew them using several unauthorized transactions.<\/span><\/p>\n<p><a href=\"https:\/\/asia.nikkei.com\/Politics-Economy\/Policy-Politics\/Coincheck-targeted-by-suspicious-traffic-for-weeks-before-NEM-heist\"><span style=\"font-weight: 400;\">Nikkei Asian Review<\/span><\/a><span style=\"font-weight: 400;\"> reported that a few weeks before the attack several Coincheck employees received infected emails which allowed hackers to hack into the employees&#8217; emails and steal the private key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As discovered by researchers from BIG Blockchain Intelligence Group Inc. some of the stolen funds were first moved by criminals to a cryptocurrency exchange in Canada and then transferred back to Japan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Coincheck <\/span><a href=\"https:\/\/www.reddit.com\/r\/nem\/comments\/7t6qa0\/list_of_nem_wallets_associated_with_coincheck_hack\/\"><span style=\"font-weight: 400;\">determined<\/span><\/a><span style=\"font-weight: 400;\"> 11 addresses on which stolen coins were located. Each of these addresses was tagged as follows: \u201ccoincheck_stolen_funds_do_not_accept_trades: owner_of_this_account_is_hacker\u201d. Thanks to this automated flagging system crypto exchanges can identify the addresses of hackers and prevent them from converting NEM to other cryptocurrencies or fiat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Coincheck management compensated $400 million to the victims of this heist and changed the rules for listing coins on the platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on the audit conducted by the Japanese Financial Services Agency (FSA) in December 2018 the exchange was successfully <\/span><a href=\"https:\/\/asia.nikkei.com\/Spotlight\/Cryptocurrencies\/Japan-s-Coincheck-to-gain-license-after-500m-hack\"><span style=\"font-weight: 400;\">licensed<\/span><\/a><span style=\"font-weight: 400;\">. The regulator concluded that after the exchange was acquired by the online broker Monex it was able to improve security and safety measures.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Bitgrail<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On February 8, 2018, in the aftermath of a slew of unauthorized transactions from the Italian BitGrail exchange, $170 million worth of Nano cryptocurrency was withdrawn by unknown hackers. The remaining coins were not affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Soon after the hacking, the owner of BitGrail Francesco Firano filed for bankruptcy. He <\/span><a href=\"https:\/\/cointelegraph.com\/news\/its-impossible-to-refund-the-stolen-amount-interview-with-bitgrails-francesco-firano\"><span style=\"font-weight: 400;\">claimed<\/span><\/a><span style=\"font-weight: 400;\"> that the theft of funds occurred due to Nano&#8217;s timestamp technology and the unreliability of the block explorer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In turn, Nano developers denied any errors within the cryptocurrency protocol. They also implied that the funds might have been stolen much earlier than this became known and said that Firano offered them to conduct a hard fork of cryptocurrency supposedly in order to cover the losses.<\/span><\/p>\n<blockquote><p><b><i>\u201cWe now have sufficient reason to believe that Firano has been misleading the Nano Core Team and the community regarding the solvency of the BitGrail exchange for a significant period of time,\u201d <\/i><\/b><span style=\"font-weight: 400;\">noted Nano\u2019s team.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">In January 2019 BitGrail and Francesco Firano were declared bankrupt in court and ordered to reimburse the customers the maximum possible amount of the $170 million they lost while confiscating a significant part of Firano\u2019s own assets.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Binance<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The next attack, although unsuccessful, was nevertheless indicative. On March 7, 2018, Binance exchange reported a potential hack that forced automated trading systems to sell altcoins and buy Viacoin (VIA) instead.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hackers launched a series of phishing attacks that lasted several months. Masking fake domains as the original Binance domain (homograph attack) using Punycode (a method of converting domain names into a sequence of ASCII characters) they collected the account data of most users.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Google-Search-Brings-Up-Fake-Binance-Site-1024x548-e1559677619365.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Hackers did not withdraw the money from compromised accounts but instead created API keys which were then used to purchase VIA\/BTC.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hackers planned to collect money on 31 accounts and use them to promptly withdraw funds as fiat but were forestalled by the exchange. Binance risk management system noticed an anomaly within two minutes and immediately blocked all transactions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Later Binance announced a reward of $250 thousand for helping to identify the hackers.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Coinrail<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Coinrail, a small Korean exchange, fell victim to hackers on June 10, 2018. About 30% of the exchange\u2019s altcoin portfolio was stolen from the company&#8217;s servers, including ICO tokens of the Pundi X (NPXS), NPER (NPER) and Aston (ATX) projects. The damage amounted to about $37 million.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Immediately after the official announcement of the incident the site was temporarily shut down and the remaining 70% of the funds were transferred to cold wallets. The Coinrail developers also managed to block almost two-thirds of the stolen funds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Representatives of the Pundi X project <\/span><a href=\"https:\/\/medium.com\/pundix\/pundi-x-assists-coinrail-to-investigate-the-breach-incident-960c6a0e2c76\"><span style=\"font-weight: 400;\">reported<\/span><\/a><span style=\"font-weight: 400;\"> that after the hack the exchange warned them of an Ethereum address which was allegedly linked to the hackers. The address was flagged as Fake_Phishing1432.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Etherscan someone tried to send 26 million NPXS from this address to the IDEX decentralized exchange. This happened immediately after the exchange received 2.6 billion of the same tokens from another address which was also flagged as suspicious \u2014 Fake_Phishing1431.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/1_3pe-ouLoBNIhFsd1DqeXfw-e1559677736351.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Pundi X and Coinrail noted that IDEX froze assets that were sent from Fake_Phishing1432. However NPXS tokens have not been burned. In addition transactions related to Fake_Phishing1431 indicate that several hours before the hack it received other digital currencies from a single address \u2014 ETH, ATX, DENT, NPSX, Jibrel Network, Tron, Kyber Network, and Storm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Etherscan while stolen NPXS tokens were sent to IDEA, the other stolen coins were sent to the EtherDelta decentralized crypto exchange.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Curiously back in February Korean banks <\/span><a href=\"https:\/\/news.bitcoin.com\/suspicious-transactions-korean-exchange-coinrail-hack\/\"><span style=\"font-weight: 400;\">recorded<\/span><\/a><span style=\"font-weight: 400;\"> outgoing activity on Coinrail related to potential money laundering.<\/span><\/p>\n<blockquote><p><b><i>\u201cIn February several banks trading on Coinrail discovered suspicious money laundering transactions. Some of those banks stopped working with the exchange in April.\u201d<\/i><\/b><span style=\"font-weight: 400;\"> the local publication Chosun wrote.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">In a month\u2019s time, Coinrail restored its operations and updated its security system.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Bithumb<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The hot wallet of the South Korean exchange Bithumb was hacked on the night of June 19, 2018. Hackers stole about $30 million partially in the Ripple cryptocurrency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just prior to the hacker attack Bithumb transferred a large amount in Ethereum to a cold wallet citing suspicious activity on the servers. On June 16 Bithumb launched an extraordinary server scan &#8220;to maximize security settings.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many cryptocurrency users were skeptical of this kind of coincidence, indicating that shortly before the hack the exchange was to pay taxes approximately equivalent to the amount of stolen funds.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Bithumb had to pay $28 million worth of back taxes and now lost $30 million less than 2 weeks later. \ud83e\udd14 <a href=\"https:\/\/t.co\/spvFpzpb6X\">https:\/\/t.co\/spvFpzpb6X<\/a> <a href=\"https:\/\/t.co\/DPq9kQG7Nm\">pic.twitter.com\/DPq9kQG7Nm<\/a><\/p>\n<p>&mdash; WhalePanda (@WhalePanda) <a href=\"https:\/\/twitter.com\/WhalePanda\/status\/1009301162871451649?ref_src=twsrc%5Etfw\">June 20, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">AlienVault cybersecurity experts detected HWP documents disguised as CV documents during the investigation of the incident. Experts suggested that they were created by members of the North Korean APT group Lazarus and its subsidiary BlueNoroff.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">HWP documents are created using Hangul Word Processor, a popular text editor in Korea. These files contain malicious code that downloads a target malware from a third-party server \u2014 a 32-bit or 64-bit version of the Manuscrypt backdoor, through which the crypto-exchange is hacked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bithumb was able to reimburse users half of the stolen funds ($14 million) from its own reserves but for several months was forced to block the deposit and withdrawal of funds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Later the exchange announced that its wallet system would undergo a \u201ccomplete overhaul\u201d in order to prevent further attacks and also announced a strict separation of assets belonging to customers and the exchange itself.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Zaif<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On September 18, 2018, hackers got unauthorized access to the Zaif exchange&#8217;s hot wallet. The damages amounted to $60 million in Bitcoin, Bitcoin Cash and MonaCoin. Two thirds of the stolen coins belonged to users of the platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unusual activity on the site began as early September 14th. The exchange made a public statement only four days later when server malfunctions were discovered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bitfury Crystal Blockchain Analytics engineers who investigated the hack were able to <\/span><a href=\"https:\/\/medium.com\/meetbitfury\/crystal-blockchain-analytics-investigation-of-the-zaif-exchange-hack-a3b4d1faed8f\"><span style=\"font-weight: 400;\">identify<\/span><\/a><span style=\"font-weight: 400;\"> the transaction and the address belonging to the hacker.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/1_52QTTAS1K1Y8orGtTL2sBQ-e1559677820549.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Suspicious transaction with an identifier <\/span><span style=\"font-weight: 400;\">c3b9a4a0831a65523c81e6a04f6ddf5a7a89f344d990e8a13e5278efe57f4280 <\/span><span style=\"font-weight: 400;\">had 131 input addresses all of them belonging to Zaif. The hacker sent the stolen bitcoins to the address\u00a0<\/span><span style=\"font-weight: 400;\">1FmwHh6pgkf4meCMoqo8fHH3GNRF571f9w\u00a0<\/span><span style=\"font-weight: 400;\">and subsequently distributed the funds among 5109 addresses. However a significant part of the funds (30% of the total amount) was transferred to two Bitcoin wallets:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">3MyE8PRRitpLxy54chtf9pdpjf5NZgTfbZ \u2014 1007,6 BTC<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">3EGDAa9rRNhxnhRzpyRmawYtcYg1jP8qb7 \u2014 754,5 BTC<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Another 1,451.7 BTC were transferred in small transactions to\u00a0<\/span><span style=\"font-weight: 400;\">1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s <\/span><span style=\"font-weight: 400;\">which belonged to Binance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The remaining amount (about 46%) was distributed in small parts between a score of different addresses. Among them, a mixing service ChipMixer.com, a gambling site CoinGaming.io, exchanges Huobi, Bitstamp, BTCBox.com, and Livecoin.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/1_-X-k6ncSQ60pIRHsiieA_g.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In November cybersecurity experts from Japan Digital Design <\/span><a href=\"https:\/\/www.coindesk.com\/hackers-behind-60-million-zaif-crypto-exchange-theft-may-have-been-exposed\"><span style=\"font-weight: 400;\">tracked down<\/span><\/a><span style=\"font-weight: 400;\"> the hacker. They studied the movement of Monacoin coins from the moment of hacking, analyzed the payment channel using static blockchain analysis and identified the hacker&#8217;s IP address.<\/span><\/p>\n<blockquote><p><b><i>\u201cBy deploying the virtual currency node on a large scale after the outflow of the virtual currency, we verified whether we can obtain clues such as source IP address etc. We also got useful data to grasp the accuracy of the information and the cost of tracking,\u201d <\/i><\/b><i>experts reported.<\/i><\/p><\/blockquote>\n<h3><span style=\"font-size: 14pt;\"><b>MapleChange<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On October 28, 2018, due to an undisclosed bug, all funds in the amount of 913 BTC ($6 million) were withdrawn from the accounts of a small Canadian exchange MapleChange.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Later representatives of the exchange said that their hot wallet contained no more than 8 BTC and 100 LTC and that vulnerability was the result of updating the site\u2019s framework.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Curiously enough a few hours after the hacking the exchange&#8217;s social media accounts were taken down. Representatives of MapleChange explained this being a temporary measure necessary in order to come up with a way out of this situation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company also announced that it would not be able to refund stolen Bitcoins and Litecoins but promised to transfer the remaining assets in cryptocurrencies Conceal (CCX) and Lumeneo (LMO), which accounted for most of MapleChange&#8217;s trading volume, to the developers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to the fact that the chat for user complaints on the Discord server was inaccessible and also because there was very little time between the announcement of the \u201cbug\u201d and the complete disappearance of the company\u2019s social media presence, experts were quick to accuse the platform of an exit scam. The lack of any technical details about what happened also spoke in favor of this version.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Customers of the site, comprising the Maplechang\u2019ed activist group, <\/span><a href=\"https:\/\/ethereumworldnews.com\/maplechange-crypto-exchange-hacked-for-913-bitcoin-btc-exit-scam-likely\/\"><span style=\"font-weight: 400;\">found out<\/span><\/a><span style=\"font-weight: 400;\"> that most of the data related to the platform, particularly information about the domain registry, was false. They also claimed that the CEO of the exchange, Glad Poenaru, was in collusion with the mining pool ETZmine.com and a cryptocurrency project called Weycoin (WAE) but their participation in this incident has not yet been proven.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AMLT service specialists managed to find several <\/span><a href=\"https:\/\/coinfirm.prowly.com\/45262-amlt-crypto-alert-of-the-week-maplechange-hack\"><span style=\"font-weight: 400;\">addresses<\/span><\/a><span style=\"font-weight: 400;\"> related to the exchange. Analysis of their transfer history showed that funds were scattered across several popular exchanges, including Bittrex and Binance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the exchange is not functioning. Its domain has been transferred to another owner.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Gate.io<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In early November 2018 hackers attempted to hack the Gate.io Bitcoin exchange by compromising the web analytics service StatCounter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers modified the script of an external JavaScript file \u2014 www.statcounter.com\/counter\/counter.js used to collect site visitors&#8217; stats. Due to the fact that the malicious code was injected in the middle of the script, it took a while to detect the modification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The script checks for the string myaccount\/ withdraw\/BTC in the URL and then adds a new code element to the web page \u2014 https: \/\/www.statconuter.\u0441om\/c.php. The link is designed to exploit user\u2019s carelessness and leads to a domain belonging to attackers. Previously this false domain has already been suspended in 2010 due to malicious activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite the fact that the malware affected the activity of at least 700 thousand services the hackers\u2019 main goal was Gate.io exchange since only it used the unified resource identifier https:\/\/www.gate.io\/myaccount\/withdraw\/BTC to transfer Bitcoins from its own accounts to third-party addresses.<\/span><\/p>\n<blockquote><p><b><i>\u201cMalicious script automatically replaces user&#8217;s Bitcoin address with the address of the attacker. Due to the fact that the hackers\u2019 server generates a new address every time user downloads the StatConuter script it is difficult to determine how many Bitcoins could be stolen.\u201d<\/i><\/b><span style=\"font-weight: 400;\"> said ESET representatives.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">The StatCounter service was quickly removed from Gate.io. Exchange\u2019s management announced that &#8220;all the user assets are safe.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In January 2019 Gate.io users once again became hacker victims. This time due to a \u201c51% attack\u201d on the Ethereum Classic blockchain they lost $220,000.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gate.io has identified three addresses allegedly controlled by the attacker:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">0xb71d9CD39b68a08660dCd27B3EAE1c13C1267B10<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">0x3ccc8f7415e09bead930dc2b23617bd39ced2c06<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">0x090a4a238db45d9348cb89a356ca5aba89c75256<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">According to representatives of the exchange, initially they were able to successfully block the attacker&#8217;s transactions sending them to manual review. Yet, during the attack, all transactions looked valid and were successfully confirmed on the blockchain which led to the loss of about 40 thousand ETC.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The exchange fully reimbursed the damages.<\/span><\/p>\n<h3><span style=\"font-size: 14pt;\"><b>Cryptopia<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">New Zealand Cryptopia exchange was another victim of double-spend issue. In November 2018, the platform lost $571,000 due to a 51% attack on the AurumCoin (AU) network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Founders of AurumCoin maintained that they were not responsible for what happened since their token was an open code project and transferred the blame to the exchange employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hacker is estimated to have sent about 16,000 AUs to an account owned by the exchange and traded them for another cryptocurrency. After the transaction attacker used the overwhelming computing power at his disposal and canceled the transaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cryptopia\u2019s problems were far from over. On January 14, 2019, Cryptopia suspended operations informing users of \u201csignificant losses\u201d due to a security flaw.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Elementus experts found that on the morning of January 13 several major transactions were made from the main Cryptopia wallets: 19.391 ETH (about $2.5 million) and 48,029,306 CENNZ ($1.17 million). Next hackers began to withdraw funds from more than 76,000 secondary wallets, operations on which were carried out until January 17.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">About $880,000 were withdrawn to various crypto exchanges, like Binance, Huobi, and HitBTC. Another $15 million was stored on two addresses allegedly controlled by attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On January 29 an attacker withdrew another $175,000 from about 17,000 Cryptopia wallets. Stolen funds were transferred to his <\/span><a href=\"https:\/\/etherscan.io\/address\/0xaa923cd02364bb8a4c3d6f894178d2e12231655c\"><span style=\"font-weight: 400;\">ETH address<\/span><\/a><span style=\"font-weight: 400;\">, marked with the tag &#8220;Cryptopia_Hack1&#8221;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Total losses of Cryptopia amounted to $16 million. The exchange itself stated that &#8220;in the worst-case scenario it lost no more than 10% of all its funds.&#8221;<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/pasted-image-0-26-e1559678076794.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Analysts also pointed out that the fact that several tens of thousands of addresses were hacked went unnoticed for a long time and suggested that Cryptopia employees lost control of Ethereum wallet private keys. This could be explained by the fact that Cryptopia did not have backup copies of private keys: the hacker gained access to the server where the keys were stored and then deleted them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The site management announced its intention to return funds to the affected users and even sent tokens to the users&#8217; accounts, which traced the amount of payments due to them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In May 2019 trading on the platform was stopped and its liquidation process was officially announced. It is expected that the liquidators will be collecting available assets to reimburse the affected users.<\/span><\/p>\n<h3><b>Bithumb Again<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">On March 29, 2019, Bithumb employees recorded unusual withdrawals of funds from the hot wallets of the trading platform. The damage amounted to about $20 million in EOS and XRP. Stolen assets belonged to the exchange itself. User accounts were not affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Insiders allegedly participated in the theft of funds. They stole a private key to Bithumb hot wallet on the EOS blockchain and also hacked the exchange&#8217;s XRP wallet.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">And this is the second time Bithumb saw a MAJOR hack, last time it\u2019s hacked with a loss over $30m.. lol and after the first hack it was STILL able to get the fiat license from Korea and WTF??<\/p>\n<p>&mdash; Dovey &quot;Rug the fiat&quot; Wan (hiring) (@DoveyWan) <a href=\"https:\/\/twitter.com\/DoveyWan\/status\/1111840625954033664?ref_src=twsrc%5Etfw\">March 30, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">Stolen funds were transferred through the anonymous ChangeNow exchanger to other crypto exchanges, namely EXMO, Huobi, Changelly, KuCoin, HitBTC, and Binance.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">3. EOS won\u2019t be able to freeze this time, or it\u2019s now too late <\/p>\n<p>4. Hacker has been disposing the stolen EOS via ChangeNow, a non-custodial crypto swap platform dose not require KYC\/account <\/p>\n<p>5. Bithumb is the only top Korean ex operator without a commercial banking partnership <a href=\"https:\/\/t.co\/SM9Wes0BI6\">pic.twitter.com\/SM9Wes0BI6<\/a><\/p>\n<p>&mdash; Dovey &quot;Rug the fiat&quot; Wan (hiring) (@DoveyWan) <a href=\"https:\/\/twitter.com\/DoveyWan\/status\/1111861009306791936?ref_src=twsrc%5Etfw\">March 30, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">EXMO staff managed to block the transfer of about $3 million.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Binance CEO Changpeng Zhao published a withdrawal scheme used by fraudsters:<\/span><\/p>\n<p>https:\/\/twitter.com\/cz_binance\/status\/1111875218220318726<\/p>\n<p><span style=\"font-weight: 400;\">Hackers apparently tried to withdraw an additional large sum of XRP but this was prevented. Using XRP Ledger Explorer several wallets were discovered containing 90 thousand XRP each from which the output to an external wallet (<\/span><span style=\"font-weight: 400;\">rLaHMvsPnPbiNQSjAgY8Tf8953jxQo4vnu) was carried out.\u00a0<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">There are pages and pages of 90,000 XRP going out of this exchange wallet: <a href=\"https:\/\/t.co\/7vdhb29IR0\">https:\/\/t.co\/7vdhb29IR0<\/a> <a href=\"https:\/\/t.co\/jbBCS2g13u\">pic.twitter.com\/jbBCS2g13u<\/a><\/p>\n<p>&mdash; XRPScan (@xrpscan) <a href=\"https:\/\/twitter.com\/xrpscan\/status\/1111854548157636610?ref_src=twsrc%5Etfw\">March 30, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"font-weight: 400;\">More than 200 transactions were carried out to withdraw 90 thousand XRP each, however, some of them were addressed to another Bithumb account which probably meant that the exchange managed to reclaim some of the funds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Experts noted that this attack was made possible due to a number of Bithumb vulnerabilities: the absence of a mandatory KYC check, the lack of guarantee agreements with banks and the tardiness of the security system itself.<\/span><\/p>\n<h3><b>DragonEx<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">On March 24, 2019, a Singapore-based Bitcoin Exchange DragonEx fell victim to a hacker attack. As a result, both user funds and the assets of the exchange itself were stolen.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uppsala Security Operations Team (USOT) <\/span><a href=\"https:\/\/medium.com\/sentinel-protocol\/dragonex-hack-tracking-stolen-etheruem-tokens-to-exchanges-using-catv-537b8f042af2\"><span style=\"font-weight: 400;\">found out<\/span><\/a><span style=\"font-weight: 400;\"> that the hacker distributed the stolen cryptocurrency between his wallets on Huobi, Gate.io, Bittrex and Binance exchanges. Some of these funds were blocked by those platforms\u2019 employees.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Screenshot_3-19-1.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Despite the fact that the total amount of stolen funds was never officially announced, USOT experts estimated that the hacker had stolen 2738.12 ETH. According to DragonEx the balance of hacker\u2019s Ethereum and Bitcoin wallets was at 1522 ETH (about $202,730) and 135 BTC (about $528,855) respectively.<\/span><\/p>\n<h3><b>Binance Again<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">On May 7, 2019, hackers stole 7,000 BTC ($40.5 million) from Binance&#8217;s hot wallet. Representatives of the platform reported a &#8220;serious security breach.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using phishing and viruses hackers stole a lot of user API keys and two-factor authentication codes (2FA) from various accounts, including those with large balances. The attackers acted through several independent <\/span><a href=\"https:\/\/www.blockchain.com\/btc\/tx\/e8b406091959700dbffcff30a60b190133721e5c39e89bb5fe23c5a554ab05ea\"><span style=\"font-weight: 400;\">accounts<\/span><\/a><span style=\"font-weight: 400;\"> so the transaction passed all security checks and was completed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Immediately after the hack Binance team was somewhat bewildered. The exchange&#8217;s security system was the first to react rendering withdrawal of funds from the platform impossible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Criminals distributed the stolen bitcoins between 44 wallets, 21 of which were their own SegWit addresses. Those received 99.97% of the stolen funds. The next day funds on hackers&#8217; wallets came into motion.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/pasted-image-0-1-7-e1559678170632.png\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The Block analysts concluded that stolen cryptocurrency was distributed between 7 addresses, most of which are in Bech32 format:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">bc1q2rdpyt8ed9pm56u9t0zjf94zrdu6gufa47pf62 (1060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">bc1qx3628eh9tdnm0uzculu8k6r2ywfkc5zns2hp0k (1060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">bc1qnf2ja3ffqzc3hskanjse6p8zag52fm6jgmmg9u (1060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">bc1qw7g5uxxl750t0h2fh9xajwuxp4qt634yh3vg5q (1060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">16SMGihY94H8UjRcxwsLnDtxRt7cRLkvoC (1060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">1MNwMURYw1LkPnnpda2DQkkUsXXeKL9pmR (1,060.6 BTC)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">bc1q3a5hd36jrqeseqa27nm40srkgxy8lk0v0tpjtp (707.1 BTC)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Binance management has promised to update security system. The changes were to affect the API, two-factor authentication, the process of confirming the withdrawal of funds, risk management, analysis of user behavior and the KYC procedure.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><b>Conclusion<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Given the rising popularity of digital currency, hacking crypto-exchanges will for a long time be a source of profit for hackers. Even being aware of basic methods of hacking the exchange\u2019s team cannot foresee whether their platform will be hacked and how exactly this will happen because each bug exploitation is a unique case.<\/span><\/p>\n<blockquote><p><b><i>\u201cEven though budgets allocated to security are growing every year and the main vector of attacks is known to everyone, unfortunately criminals do not rest either and also invest more resources in conducting attacks on exchanges. Therefore no one can give a 100% guarantee that the exchange you use will not be hacked.<\/i><\/b><\/p>\n<p><b><i>It is also worth noting that hacking of accounts often occurs not by the fault of the exchange but because of the negligent attitude of users to the security of their own funds,\u201d<\/i><\/b><span style=\"font-weight: 400;\"> says Nikolai Naumov, ForkLog CTO.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">To better protect your money from criminals consider following these simple recommendations:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Never store cryptocurrency on exchanges for a long time.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use the maximum number of levels of protection on the exchange: two-factor authentication, multi-signature and so on.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do not store wallets access files on a home computer connected to the Internet. Record them on external media and store in a safe place.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If possible try not to use online wallets. Employ cold storage.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check the addresses of visited sites whether it is a cryptocurrency exchange, exchange service or whatnot to avoid becoming a victim of a phishing attack.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Crime in the crypto world is much less common than in traditional financial institutions. An ordinary investor just needs to be a little careful, pay attention to the feedback on the forums and adhere to the rules of the exchange platform.<\/span><\/p>\n<p><strong>Follow us on <a href=\"https:\/\/twitter.com\/forklogmedia\">Twitter<\/a> and <a href=\"https:\/\/www.facebook.com\/forklogmedia\">Facebook<\/a> and join our <a href=\"https:\/\/t.me\/forklogmedia\">Telegram channel<\/a> to know what&#8217;s up with crypto and why it&#8217;s important.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a May study by The Block, 42 large cryptocurrency exchanges have been compromised since 2012, not taking smaller platforms into account. The total amount of stolen funds exceeded $1.35 billion, with about 59% of these funds (795.5 million) being stolen in 2018.<\/p>\n","protected":false},"author":6,"featured_media":7252,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[744,973,982,30,43],"class_list":["post-7248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-binance","tag-bithumb","tag-coincheck","tag-cryptocurrency","tag-hackers"],"aioseo_notices":[],"amp_enabled":true,"views":"980","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=7248"}],"version-history":[{"count":11,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7248\/revisions"}],"predecessor-version":[{"id":7884,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/7248\/revisions\/7884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/7252"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=7248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=7248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=7248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}