San Francisco-based cryptocurrency exchange Kraken has publicly refused to negotiate with criminals attempting to extort the company using stolen client data. The firm’s chief security officer, Nick Percoco, stated the company “will not ever negotiate with bad actors” following what he described as two incidents of “inappropriate access” to user information.
Kraken’s Public Refusal to Pay Ransom
In a social media post on Monday, April 13, 2026, Nick Percoco detailed the extortion attempt. He reported that an unnamed criminal group threatened to release videos of Kraken’s internal systems showing client data unless paid an unspecified ransom. “We will not pay these criminals,” Percoco wrote. He emphasized that Kraken’s core systems were not breached and that user funds remained secure. This stance marks a clear policy shift for the industry, where some companies have quietly negotiated in similar situations.
Also read: Bermuda to move key financial services onto Stellar blockchain, premier says
According to Percoco’s statement, the incidents involved approximately 2,000 user accounts. The first occurred in February 2025, with a second, more recent event prompting the extortion threat. The exchange is now working with federal law enforcement agencies. The goal is to identify and potentially arrest members of the criminal group.
The Escalating Threat of Data-Based Extortion
This event is not isolated. Data from blockchain intelligence firm Nominis shows a sharp rise in crypto-related losses from security incidents. In March 2026, more than $178 million was lost across major incidents. This figure is up dramatically from $49.3 million in February. The report notes that “authorization abuse” remained the primary method of attack. This often involves tricking users into approving malicious transactions.
Kraken’s incident follows a similar pattern seen at other major exchanges. In May 2025, competitor Coinbase reported cybercriminals threatening to leak user data in a bid to extort $20 million. That breach, which compromised data from about 70,000 users, resulted from bribes paid to customer support contractors. The parallel suggests a growing, sophisticated criminal focus on exploiting human and system vulnerabilities rather than directly attacking blockchain protocols.
Why Exchanges Are Prime Targets
Industry watchers note that centralized exchanges like Kraken hold vast amounts of sensitive data. This includes know-your-customer (KYC) documents, email addresses, and transaction histories. For criminals, this data is a valuable commodity. It can be sold on dark web markets or used for targeted phishing campaigns. The implication is clear. Protecting this data is now as critical as safeguarding the digital assets themselves.
“What this means for investors is a dual-layer risk,” said a cybersecurity analyst familiar with crypto platforms, who spoke on condition of anonymity. “Your funds might be safe in cold storage, but your personal identity could be compromised. The fallout from that can be severe and long-lasting.”
Kraken’s Security Response and Industry Implications
Percoco’s public declaration is a strategic move. It signals to customers and criminals alike that Kraken will not capitulate. This could deter future attempts but also risks provoking the threat actors to follow through on their promise to leak data. The exchange’s collaboration with law enforcement is standard procedure. However, the public nature of this engagement is more pronounced.
This incident highlights a persistent tension in the crypto industry. Companies must balance transparency with operational security. Announcing a data incident can erode user trust. Remaining silent can lead to greater harm if users are unaware their data is circulating. Kraken chose transparency, likely because the extortion attempt was already public within criminal circles.
The Regulatory Pressure Intensifies
Data breaches at financial institutions attract regulatory scrutiny. In the United States, the Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC) have increased their focus on cybersecurity preparedness. Firms are expected to have solid incident response plans. Kraken’s public, principled stance may play well with regulators demonstrating a proactive defense posture. But it will be judged on the outcome. If client data is leaked, regulators will examine whether the company’s security measures were adequate.
Comparing Exchange Security Postures
Different exchanges handle these threats in different ways. The table below outlines recent public responses to security incidents.
| Exchange | Incident Date | Nature of Incident | Public Response |
|---|---|---|---|
| Kraken | Feb 2025 / April 2026 | Inappropriate data access & extortion | Public refusal to pay, law enforcement involvement |
| Coinbase | May 2025 | Contractor bribe, data leak threat | Disclosed breach, did not confirm payment of ransom |
| Binance | 2022 | Private key compromise | Used secure asset fund to cover user losses |
The variety in responses shows there is no industry-standard playbook. Kraken’s approach is arguably the most confrontational to date.
Conclusion
Kraken’s defiant stand against data extortion sets a new precedent. By refusing to negotiate and involving federal authorities, the exchange is betting that a hardline public stance will strengthen its long-term security position. The immediate risk is the potential release of sensitive client data. The broader signal is that the crypto industry is maturing. It is moving from a reactive posture on security to a more institutional, law-enforcement-backed model. For users, the event is a stark reminder. The security of personal data on centralized platforms remains a critical vulnerability. The outcome of this Kraken extortion attempt will likely influence how future incidents are handled across the entire digital asset sector.
FAQs
Q1: Was my money stolen in the Kraken incident?
According to Kraken’s Chief Security Officer, user funds were not at risk. The incident involved “inappropriate access” to client data, not a breach of the systems that store cryptocurrency.
Q2: How many users were affected by the Kraken data access?
Nick Percoco stated the incidents involved approximately 2,000 user accounts. The exchange is likely notifying those affected directly.
Q3: What should I do if I have a Kraken account?
You should monitor official communications from Kraken. Enable two-factor authentication (2FA) on your account if you haven’t already. Be vigilant for phishing emails that may reference this incident, as criminals often use news events to launch targeted attacks.
Q4: Why won’t Kraken negotiate with the extortionists?
The company’s stated policy is to never negotiate with or pay criminals. This is based on the common law enforcement view that paying ransoms encourages further criminal activity and does not guarantee data won’t be leaked or sold later.
Q5: Has this happened to other crypto exchanges?
Yes. In May 2025, Coinbase faced a similar extortion attempt after a data breach. Other exchanges have dealt with various forms of hacking, fraud, and social engineering attacks targeting both funds and data.

Be the first to comment