Cryptopia Launches Read-Only Website After Delay With Pre-Hack Balances
Cryptopia has seen a rough couple of months. After a massive hacking in January, the exchange was forced to report the cyber criminals to local police and were even prevented from going into their office while the investigation continued. From the original hacking attempt to today, there have been three hacks, which all seemed to steal funds from the same wallets that they had before. Now, the read-only website is up and running as of yesterday.
The challenges that the company has already been through are substantial, and there are some investors (and former investors) that are surprised they ended up launching at all. However, an announcement through Twitter by Cryptopia Exchange shows that read-only website is available, and the holding balance is back to what it was on January 14th before the hack took place.
The rebate process is still being finalized at the moment, though more details should be announced soon. However, the big concern that Cryptopia currently has is security. Every user on their database needs to reset any passwords in place and need to revalidate or change their two-factor authentication credentials.
The original statement from the New Zealand law enforcement is that the exchange was able to resume their regular operations by February 13th. However, Cryptopia insisted that they could not resume their operations until they had had a chance to fully evaluate the losses that they had sustained, and to secure their current balance.
Every exchange has theirs vulnerable places, like Ryo, a crypto project that comes from Monero. On March 3rd, only two days ago, a post was published by the company to state that there is an alleged bug in the Monero wallet software. This bug would allow for deposits to be sent to crypto exchanges. An upcoming release has already been scheduled to patch the vulnerability, but it would allow hackers to use the account to falsely deposit random, small amounts of XMR to whichever exchange they choose.