{"id":81131,"date":"2023-07-03T15:16:49","date_gmt":"2023-07-03T12:16:49","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=81131"},"modified":"2025-09-11T21:06:15","modified_gmt":"2025-09-11T18:06:15","slug":"huobi-allowed-a-user-data-leak-for-two-years","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/huobi-allowed-a-user-data-leak-for-two-years\/","title":{"rendered":"Huobi allowed a user-data leak for two years"},"content":{"rendered":"<p>The cryptocurrency exchange Huobi has remedied a data leak that, it is reported, jeopardised users\u2019 assets since June 2021. This was brought to attention by white-hat hacker Aaron Phillips.<\/p>\n<p>According to him, the breach was linked to the disclosure of credentials granting write access to all Huobi AWS S3 storage buckets. Phillips first notified the exchange of the incident in June 2022.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAnyone with access to the credentials could alter content on Huobi domains, including huobi.com and hbfile.net. The breach also exposed user data and internal documents,\u201d the researcher said.<\/p>\n<\/blockquote>\n<p>Phillips says the severity of the breach was significant and could have led to \u201cthe largest cryptocurrency theft in history.\u201d However, he found no evidence that the breach was used to carry out an attack.<\/p>\n<p>The hacker highlighted vulnerabilities in Huobi&#8217;s content delivery networks (CDN) and sites that could enable malicious scripts to be injected. He said the CDNs could have compromised every Huobi login page, potentially affecting every user who visited the site or used the Huobi app over the past two years.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cUsers risked losing their accounts and crypto assets and exposing confidential information such as contact details and balances, including Huobi&#8217;s off-exchange trading data,\u201d Phillips added.<\/p>\n<\/blockquote>\n<p>Representatives of the exchange told The Block in a comment <a href=\"https:\/\/www.theblock.co\/post\/237460\/huobi-data-breach\">The Block<\/a>, that their team removed the compromised account, revoked file-access permissions and secured the cloud storage on June 21. The disclosure also exposed the contact information of 4,960 clients of the trading platform.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThe breach did not include confidential information and did not affect user accounts or the security of funds. The incident occurred on 22 June 2021 due to staff missteps related to the S3 bucket in the test environment of Huobi&#8217;s Japanese site on AWS. The corresponding user information was fully isolated on 8 October 2022,\u201d Huobi said.<\/p>\n<\/blockquote>\n<p>The company emphasised that the Japanese site and the global platform are not connected.<\/p>\n<p>In December 2022, cryptocurrency exchange Gemini <a href=\"https:\/\/forklog.com\/en\/news\/gemini-reports-data-breach-affecting-user-data\">reported a data breach<\/a> of user data following a series of phishing attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cryptocurrency exchange Huobi has remedied a data leak that, it is reported, jeopardised users\u2019 assets since June 2021.<\/p>\n","protected":false},"author":1,"featured_media":81132,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1842,1188,230,1195],"class_list":["post-81131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cloud-service","tag-data-breach","tag-huobi","tag-white-hat-hackers"],"aioseo_notices":[],"amp_enabled":true,"views":"21","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/81131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=81131"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/81131\/revisions"}],"predecessor-version":[{"id":81133,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/81131\/revisions\/81133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/81132"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=81131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=81131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=81131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}