Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Bitnob crypto exchange data breach: 250k KYC documents at risk
Cybernews researchers discovered a public AWS storage bucket exposing sensitive user data from Nigerian crypto exchange Bitnob.
Nigerian crypto exchange Bitnob reportedly exposed over 250,000 Know Your Customer documents, including sensitive user data, due to a misconfigured Amazon Web Services storage bucket.
An investigation revealed by the Cybernews research team on Nov. 6, discovered that the leak was first discovered on Sept. 11. Per the analysts, the leak contained KYC documents such as government IDs, passports, and driver’s licenses.
The analysts noted that KYC documents are highly sought after on dark web marketplaces, with digital passport scans selling for $15.
Bad actors target Bitnob’s users
Cybernews attributed the leak to “likely human error,” pointing to common misconfigurations as a potential cause. While Bitnob has since secured the data, the exchange has not released any statements regarding the incident. As of press time, no public comments have been made about the breach.
Founded in 2020 by Adeolu Akinyemi, Bernard Parah, and Usman Majeed, the Lagos-based crypto platform offers Bitcoin-based services such as transfers, savings, and loans across Africa. Although the duration of the exposure remains unclear, Cybernews analysts believe “it’s likely that threat actors have found it, too.”