How I hacked companies related to the crypto currency and earned $60,000

Now everyone talks about bitcoin and crypto-currencies. My acquaintance with crypto-currencies occurred about 5 months ago, that’s when I started investing in bitcoin and ethereum, the rate at that time was $1900 for btc and $89 for eth. In order for you to understand what profit I got, I will say that today bitcoin costs $18 000, and eth $830 and continues to go into orbit along with the rest of the crypto-currencies. I thought that it would be great to see how safe the services are, where my savings are, whether I trade them or give them to trust management.

Back in the late spring, I bought access for $500 to insiders of one investment club. I bought more coins for my own, this is besides ether and bitcoin, and at the end of August I received a recommendation that one can give his bitcoins to traders at 15% per month, that was why I started my way from sites which were engaged in trust management (further in the article — TM).

The first company (they forbade disclosing the names associated with their websites) is very popular and is known for many investors. Before investing money there, I decided to check my account for vulnerabilities. Registered, but surprisingly — did not find anything, everywhere filtering, csrf tokens and so on. Then I registered another account, but instead of the name I entered js sniffer. For a long time nothing came to me, I already was reconciled to the fact that the project is doing well with security, there are no BLIND XSS and other things, but only until the logs came to me (source code, admin IP, local storage, etc.)

JS was executed when admin checked the page with data about the user Similar vulnerabilities are increasingly encountered on hackerone, an example here .

Looking through the logs, I was upset because all the cookies with the httponly flag and could not get any, at the end — I would not be able to access the admin panel, but when I clicked the link , I saw that admin panel could be used without authorization, this was a gross developer error (vulnerability Improper Access Control).

In total it was possible to view and change information about 2010 users (email, phone, links to the social network, bitcoin wallet address, login, balance, referrer). In the screenshot, one of the richest investors in my club, he has a large number of subscribers and I constantly follow his blog. He recommended all his subscribers to invest their money in this TM, of course on a referral link, but not more than 20% of the capital. After a short time, he managed to earn 20 bitcoins on this, which equals $ 227 000 for today.

The attacker without any training or experience could easily go to the admin panel and change the email addresses of all the investors to their own (or simply change wallets for withdrawal, so as not to cause unnecessary suspicion when the victim decides to withdraw money for the wallet for some reason in deriving not displayed). Investors are large enough there, many of them have deposits >0.5btc. It is very strange that in the admin panel there are no passwords in the clear form.

I have a feeling that the developers of this TM are capable of anything at all in terms of deteriorating the security of their service.

After discovering the vulnerability, I sent a report to the developers, they contacted the creator and fixed vulnerability. I was offered to charge the award on the account in their website, where I will receive % and in half a year I will be able to break into a breakeven, and in a year I will take the body itself. A month later, when I found a similar blind xss in their service and got another bounty for it, it was found out that the developers of the TM were fired (and they did not seem to have paid money for their work at that time), other people began to develop it.

A little later, after the first recommendation the second has come ( This is also a top, popular service of trust management, he has 20 000 alexarank World and 3 000 Russia.

Thoroughly checking everything — nothing was found (even my favorite clickjacking 😄 ), except for two CSRF vulnerabilities in post requests. The first allowed to change the details for the withdrawal of funds, the user just had to click on the link to the CSRF exploit. The second allowed to withdraw the user’s money to the already changed details. Thus, if a user simply goes through the link, he will lose all his money. How was the attack possible? An attacker could hire a specialist in social engineering, spam the participants of their chat in a telegram and get a good profit.

Immediately after the discovery, I wrote to the developers of the site, I also asked friends from the club to write to the owner. The developers responded that allegedly due to the fact that the user needed to go to the link — the vulnerability was absolutely not dangerous. It looked funny. After that, I wrote a couple more letters with the evidence that the bug was still worth attention and it must be fixed immediately, but I was ignored.

A little later, there were quite predictable things for projects of this kind — user details began to change in mass, I learned about it from their developer, who wrote to me just a couple of days ago (as I understood from his words — the users themselves made the withdrawal and the funds began to disappear). It is terrible to imagine losses in the event that hackers involved a vulnerability in the withdrawal of funds. The developer asked again to send a report on the vulnerability, then google recaptcha was added to the form of change of details and confirmation by SMS (for sure).

After that, I decided to look for vulnerabilities on crypto-currency exchanges .

Poloniex I decided not to touch, they do not pay for the vulnerability and capital I do not keep there, it is because of their ignoring of security problems — the vulnerability bypass two-factor authentication was sold in a darknet, the link is

Earlier I had $ 6000 on my account, quite by accident I went to my account from vpn Moldova, as a result — my account was immediately blocked. I had to wait for a fortnight to unlock, after this case I brought out all my money from there. It was good that they hadn’t taken it to themselves, as they did with many customers.

I decided to start with The exchange proved to be well protected, found only low-impact SELF XSS vulnerability (it remained self, clickjacking on the site and csrf in the post request is not present). I was paid $ 200 by fiat fund.

Then I decided to go to This exchange is very popular not only in China, but all over the world. Some functional is not fully translated into English, it is in Chinese, but it did not become a problem, the google translator extension helped me to quickly extract text and translate it without leaving the page. As in all other cases — I carefully checked security, including subdomains and directories. It turned out that alexa china), (9000 worldwide, 2000 in China) have exactly the same design and functionality as okex. This means that if I find a vulnerability on one of their sites, then the rest will also be exposed to it. Later I’ve looked in the user support (a little fantasy about how I load the shell into the ticket and it is running) and I’ve found a lot of vulnerabilities. I’ll talk about them below:

1. Vulnerability iDOR, allowed to view all 2500 okex tickets for that time, today the number has increased to 4898, and these are only tickets on one exchange. The ticket displays the full phone number, email, real name, text of the correspondence between the user and the support and the full path to the attachment.

As it turned out later, many users undergo the verification procedure in the support service in order to increase their withdrawal limit. It is necessary to attach the person with the passport, or simply a photo of the passport.

Here are some of these photos (Data is hidden):

In addition to passports, there are also a lot of photos and screenshots from the device screens.

I proceeded to download all the tickets (used as evidence of the criticality of this problem). I used Burp Intruder, launched and put from 1 to 2549 to url /question/ Found that no information was downloaded. I decided to go back to the support and still intercept the requests. Аt that time I found out that the page loading was done via get I threw this request into the intruder and downloaded all the tickets, now they could be freely sent to the developers of exchanges.

2. Stored XSS in api. Our js is not displayed in the ticket itself /question/, apparently, there was a filtering on forbidden characters. But in api /question/ everything worked fine, even js from third-party domains was loaded.

If you combine 1 and 2 vulnerabilities, you can successfully steal a lot of money. The attack was supposed to proceed according to this scenario:

1) We collect all email addresses.

2) On our page, we embed a js / html redirect to the phishing site of the exchange itself (in this case there are several exchanges and for each one will need to make a form), Myetherwallet,, etc.

Some attackers have come to the point that immediately after entering the login and password on / /, the victim is asked for her 2FA code (from google authenticator) every 15 seconds (to log in to the account, to withdraw funds), to respond to the 2FA input is necessary very quickly, because its validity expires after a short period of time. Thus, using unicode characters, replacing some letters, for example i on L (, POIONIEX.COm), registering the exchange on a different domain (for example,, creating applications on android and advertising in search engines, in 2017 criminals stole from users more than $80 million.

3) Send letters to email addresses that we have agreed in advance with the person versed in social engineering. Users should believe in the letter and follow the link, as it did not lead to a third-party site, but to the crypto currency exchange.

4) ??

5) We get data for the entry, now withdraw the money.

3. iDOR in adding a comment, we can add a message on behalf of the user who created the ticket.

Short Request:

POST /v2/support/cs/work-order/reply HTTP/1.1



4. Html injection in the html file that was attached to the ticket, but on the domain The domain is no longer available and whois says that it belongs to Hangzhou Alibaba Advertising Co.,Ltd.

5. Disclosure information. I noticed that the developers of exchanges want to hide the user’s phone number as much as possible while criminals hacking the account. On the security page, the phone is displayed as 636818 ****, in cookies it is 6 * 6. But in the response of the api support service /v2/support/cs/work-order/2550/replies it completely displays, so it’s not good.

I understand that all exchanges have one owner and there is no point in writing to everyone separately, so I sent a report to the chat and to the email of the okex exchange. Very quickly received a message from official account okex in twitter and vulns have been fixed.

Then I started testing the exchange. The Exchange did not allow disclosing information about vulnerabilities, I quote:

Regarding posting on your blog, we would appreciate if you do not do this at the moment. Our site is not 100% secure yet.

Discovered XSS in the walet, , namely — in the affiliate program department, it turned out to make it from self XSS to stored XSS using csrf exploit, it was possible to steal cookies, since there was no httponly flag. I could attach a video that I had already recorded, but I can’t — the name of the exchange is revealed there.

For this XSS in the support service I was offered $ 100, but almost at the same time on the sniffer came logs from their domain for employees.

In the logs there was only a cookie


session cookie (most important) was missing, we can not get into the admin panel through the substitution of cookies. I carefully checked the report and found the administrator’s login and password in the source code.

But when I went to the login page, I saw it.

We can not get into the admin panel via username and password, you need to access the google authenticator app, or redirect to the phishing site directly from the admin area, steal its authenticator code and quickly enter it. The second option is quite realizable.

While writing a report about blind xss in the admin panel, I found:

1) CSRF vulnerability in changing details for withdrawal of partner funds, short request:

POST /affiliate_program HTTP/1.1



security token is not present, an exploit was written.

2) iDOR in order remove, vulnerable request The essence of the vulnerability is that if a user has already created an order and wants to transfer his bitcoins to the wallet of the exchange — we can cancel this action. At best, his order will simply retire from the system, at worst — he will transfer the bitcoins and lose his money. This vulnerability is mainly useful only for exchanges — competitors, not for hackers.

After I sent a new report in support, I was contacted by the chief security officer to discuss the vulnerabilities. He wanted to call me on Skype or on the phone, but at that moment my knowledge of English was at an average level, so we decided to limit ourselves to chat. For the vulnerability I was offered 0.1 btc ($ 1130):

After consulting with our finance and regarding our situation, we can pay you 0.1 btc. This is the highest amount we paid for a bug and is much higher than what we usually pay. It’s to show our appreciation to you and the way you handled the situation.

I’m very grateful for the bounty. They are responsible for safety, it was very pleasant to communicate with their CTO.

In total, with the search for vulnerabilities on these sites dealing with crypto currency I got:

Trust management of 1 btc.

Trust management 0.122 btc.

Exchange $ 200 by fiat means.

Exchange 2 btc, I’m very grateful to okex for the bounty, the Exchange’s CTO allowed to publicly disclose the vulnerability.

Exchange 0.1 btc.

1 + 0.122 + 2 + 0.1 + $200 = $59 400 from the search for the vulnerabilities on these sites dealing with crypto currency, and with the growth rate bitcoin this amount will grow.

Conclusion from the article: Always hire highly qualified programmers for your projects, especially if your budget allows it. In the first two cases, the companies are large enough, they can afford to hire quality specialists, but they save money and because of this, users and reputation may suffer — they leave the admin board completely “naked” and ignore the problems pointed out by the security specialist.

P.S: If you need a quality security audit at an affordable price, then contact me.

P.P.S: Also I can tell you about vulnerabilities in bug bounty on hackerone, the most interesting and dangerous of them:

1. IDOR on, through which you could access 3,000,000 tickets in the support service, — $1000.

2. Blind XSS on (most likely out-of-scope), with the help of it I hacked the admin panel, in which there were 2,100,000 users, there were not only users of, but users from 20 online stores (also a link with oauth was attached to each user, through which you could log into his account).

3. IDOR on the support site (private bounty bounty), with which you could access all tickets on > 1000 sites, — $2500.

* I will tell you about the vulnerabilities on only from the permission of the developers, so far I have not received it.