Back to all incidents

BitMart — hot wallet compromise

Attackers stole BitMart's hot-wallet private keys and drained $196M across 20+ tokens — a breach first detected by an external researcher on Twitter, not BitMart's own monitoring.

Target
BitMart — hot wallet compromise
Date public
4 December 2021
Sector
Crypto
Attack type
Wallet Compromise
Threat actor
Unattributed
Severity
High
Region
Cayman Islands / global

BitMart is a cryptocurrency exchange — a platform where people buy and sell digital tokens. Like all exchanges, it holds customer funds in two types of storage: "cold" wallets (offline, more secure) and "hot" wallets (online, used for daily withdrawals). In December 2021 attackers obtained the private keys to BitMart's hot wallets on two networks — Ethereum and BNB Smart Chain — and used those keys to drain $196 million across more than 20 different tokens. The alarming part wasn't just the loss. It was how BitMart found out: not from its own monitoring systems, but from PeckShield, an external security research firm that noticed the unusual outflows on-chain and posted about it on Twitter before BitMart had made any public statement. BitMart's CEO went on Twitter to initially call the report "fake news," then confirmed the breach, then committed to reimbursing all affected users from the exchange's own funds. The reimbursement was completed in early 2022. The incident, alongside similar exchange compromises that same year, forced second-tier exchanges to confront the fact that holding large customer balances in internet-connected hot wallets was not an acceptable security posture.

What happened

On 4 December 2021 attackers drained approximately $196 million from BitMart’s hot wallets on the Ethereum and BNB Smart Chain networks. The theft was conducted by sending direct transfer transactions using the stolen private keys, routing the stolen tokens through the 1inch decentralised exchange aggregator and then through Tornado Cash, the Ethereum-based privacy mixer, to obscure the trail.

The breach was not initially detected by BitMart’s own security monitoring. At approximately 5:30 PM EST on 4 December, PeckShield, an independent blockchain security research firm, noticed the anomalous outflows on-chain — large and unusual transfers of multiple token types from a single BitMart wallet address to an address that was subsequently routing through mixing infrastructure. PeckShield posted a public alert on Twitter. BitMart’s initial response was to label the reports as “fake news.” Several hours later, after on-chain analysis confirmed the scale of the theft, BitMart CEO Sheldon Xia issued a public statement acknowledging the breach.

Xia committed to reimbursing all affected users entirely from BitMart’s company reserves, characterising the exchange as financially strong enough to absorb the loss. The reimbursement programme for affected users was completed in early 2022. BitMart suspended withdrawals from the affected hot wallets, conducted a security review, and resumed normal operations. The specific vector by which the hot-wallet private keys were obtained — whether through phishing targeting an employee with key access, a supply-chain compromise, or another method — was not publicly disclosed.

How it worked

The mechanism of the theft itself was simple: with private keys in hand, the attacker could sign and broadcast valid transactions transferring tokens from BitMart’s wallet addresses to addresses they controlled. No smart contract vulnerability was involved. The attacker simply had the keys.

The complexity and the real failure was in key management. Hot wallets at cryptocurrency exchanges hold private keys that are, by operational necessity, stored in a connected, accessible format so that the exchange’s systems can authorise customer withdrawals in real time. This is an inherent architectural tension: hot wallets must be online to function, and anything online can be compromised. The security question is not whether to have hot wallets but how to protect the private keys they hold.

Best practices for exchange hot-wallet security in 2021 included hardware security modules (HSMs) for key storage — dedicated hardware devices that store keys in tamper-resistant silicon and sign transactions only when presented with authenticated requests, never exposing the raw key material. They also included multi-signature arrangements where a single key compromise is insufficient to authorise a withdrawal — typically requiring m-of-n signatories drawn from different systems and individuals. BitMart’s architecture at the time of the breach clearly did not implement sufficient controls, given that obtaining access to a single key (or key-generation environment) was sufficient to drain $196 million.

The post-breach mixing pattern — 1inch followed by Tornado Cash — was standard for sophisticated exchange thieves in 2021. The assets were converted to ETH through 1inch (to consolidate different token types) and then run through Tornado Cash to break the on-chain traceability link. US Treasury subsequently sanctioned Tornado Cash in August 2022, making this specific laundering path legally unavailable for subsequent exchange hackers — though technically similar alternatives continue to exist.

Timeline

  • 4 December 2021, approximately 14:00–17:00 UTC — Attackers use stolen BitMart hot-wallet private keys to drain approximately $100M from the Ethereum hot wallet and approximately $96M from the BNB Smart Chain hot wallet; assets routed through 1inch and Tornado Cash.
  • 4 December 2021, ~22:30 UTC — PeckShield posts a public Twitter alert identifying the suspicious outflows from BitMart wallet addresses.
  • 4 December 2021, ~23:00 UTC — BitMart CEO Sheldon Xia initially characterises the reports as “fake news.”
  • 5 December 2021 — Xia posts a revised statement acknowledging the breach, describing it as a “large-scale security breach” and committing to user reimbursement; withdrawals suspended.
  • December 2021 – January 2022 — BitMart conducts security review, upgrades key-management architecture, and resumes operations.
  • Early 2022 — Reimbursement of affected users completed from company reserves.

What defenders should learn

The BitMart breach is the clearest 2021 example of a preventable exchange compromise — preventable because the technical controls that would have stopped it are well understood and commercially available.

Private keys for exchange hot wallets should never exist in a format that can be directly read from a connected system. Hardware security modules store key material in tamper-resistant hardware that performs signing operations internally without ever exposing the raw private key. An attacker who compromises the system that submits signing requests to an HSM cannot extract the key; they can only obtain signed outputs, which are useless without the key itself. HSMs have been commercially available and deployed by well-run exchanges since well before 2021. Their absence in BitMart’s architecture represents a governance and investment decision that carried a $196 million consequence.

Multi-signature requirements are the second layer. A hot-wallet arrangement where any single key compromise authorises unlimited withdrawals has no redundancy in its security model. Multi-signature wallets require m-of-n independent signatures to authorise a transaction; typically in exchange operations this means 2-of-3 or 3-of-5 signers drawn from geographically and organisationally separated systems and individuals. A single key compromise cannot produce a multi-signature transaction.

The detection failure is a distinct and equally important lesson. The fact that an external security researcher detected the breach before BitMart’s internal monitoring did — and that BitMart’s initial response was to deny the researcher’s findings — indicates that BitMart’s security operations did not have alerting on anomalous outflows from its own wallet addresses. This is a monitoring baseline: know what your own wallets are doing, and alert immediately when they are doing something anomalous. On-chain activity is fully transparent and publicly monitorable; there is no excuse for an exchange to learn about a drain from its own wallets from a third-party Twitter post.

Sources

Back to all incidents