Cryptocurrency exchange Kraken is facing an extortion attempt from an unidentified cybercriminal group that recruited members of its support team to record video footage of internal systems containing client data. The group is now threatening to release that footage unless Kraken complies with their demands. The exchange confirmed the incident publicly on April 13, 2026 and stated it will not pay or negotiate under any circumstances. The incident adds to a difficult week for crypto infrastructure security — Bitcoin Depot confirmed a $3.6 million theft via compromised credentials earlier this month, underscoring the range of vectors attackers are using against digital asset operators.
Two Incidents, One Extortion Campaign
Kraken’s Chief Security Officer Nick Percoco disclosed that the extortion attempt stems from 2 separate insider incidents. The first occurred in February 2025, when Kraken received a tip that a video documenting unauthorized access by a support team member was circulating on a criminal forum. The exchange launched an investigation, identified the employee, revoked their access, and implemented additional security controls. The second incident occurred more recently in early 2026, when another support team member was identified as having accessed internal client support systems without authorization. Extortion demands arrived shortly after Kraken terminated that individual’s access.
Across both incidents, the attackers obtained video recordings of internal systems with client data visible. They are now threatening to distribute that material to media outlets and social platforms. In total, client data from approximately 2,000 accounts was potentially viewed, representing 0.02% of Kraken’s user base. Core trading systems were not accessed and no client funds were placed at risk at any point.
Kraken’s Response
“Our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors,” Percoco said in a public statement. Kraken has notified all potentially affected clients directly and confirmed it is cooperating with federal law enforcement across multiple jurisdictions. The company said it believes there is sufficient evidence to identify and arrest those responsible and is working with industry partners to disrupt broader insider recruitment efforts targeting firms across the crypto, gaming, and telecommunications sectors.
A Documented Pattern of Insider Recruitment
The Kraken incidents are consistent with a documented and growing threat to cryptocurrency infrastructure. Darknet advertisements actively recruiting insiders at exchanges including Kraken, Coinbase, and Binance have been identified by security researchers, with extortionists offering between $3,000 and $15,000 per insider depending on their level of system access. The model requires no malware and offers anonymity to recruited employees, making it difficult to detect through conventional security monitoring. Understanding how these social engineering and recruitment tactics work is critical for organizations with support staff who have privileged system access — our guide on recognizing and defending against social engineering in the workplace covers the key tactics and red flags.
The parallel to Coinbase is direct. In May 2025, Coinbase disclosed that hackers had bribed offshore customer support contractors to access client records, ultimately affecting 70,000 users and generating a $20 million ransom demand that Coinbase also refused to pay. That incident resulted in estimated total damages of $400 million. The Kraken incidents involved far fewer accounts but follow an identical recruitment and extortion playbook.
Insider recruitment is also not the only threat vector targeting crypto infrastructure at scale. The $285 million theft from Drift Protocol, attributed to North Korean state-linked group UNC4736, demonstrated what a months-long social engineering operation targeting core developers rather than support staff can achieve. Kraken’s incidents represent the lower end of that attack surface — support tier access rather than governance infrastructure — but the extortion leverage it generates is real regardless of the technical depth of the compromise.
Federal Reserve Context
The timing adds regulatory significance. On March 4, 2026, the Federal Reserve Bank of Kansas City approved a limited purpose master account for Kraken Financial, making it the first cryptocurrency exchange to gain direct access to the Federal Reserve’s payment infrastructure. The extortion attempt arriving weeks after that milestone has drawn scrutiny from traditional banking observers who have long argued that granting crypto exchanges access to federal payment rails introduces systemic risk. Kraken has stated its operations continue normally and that new security measures are already in place.












