A dark web forum listing is circulating that allegedly offers access to a read-only admin panel of the Kraken cryptocurrency exchange for as little as $1. The post has drawn attention from cybersecurity analysts and exchange users alike. The access allegedly allows viewing of user profiles, full transaction histories, and Know Your Customer (KYC) documents.
These documents include government-issued IDs, selfies, proof of address, and source-of-funds files. The listing claims the access is proxied through Kraken’s internal systems and has no IP restrictions. The seller states that access remains valid for up to two months, and the time-based one-time password (TOTP) linked to the session is set to expire in February 2026.
According to details shared by Dark Web Informer, the access is described as view-only but includes the ability to generate support tickets. This could potentially be used to impersonate staff or phish for more information from users. Some cybersecurity experts have flagged the sale as highly suspicious, while others caution that, if true, it could expose sensitive data of Kraken customers.
“This is a major data-exposure and phishing risk for Kraken customers,” one security professional was quoted as saying. Experts warn that even read-only access can lead to major threats when sensitive data is involved. Full access to user trading activity, wallet addresses, and deposit behavior could allow attackers to conduct highly targeted phishing campaigns, SIM swaps, or credential theft.
CIFER Security, an independent cybersecurity firm, warned that attackers could use support ticket tools to imitate legitimate staff. With access to real user data, it becomes easier to manipulate users into sharing credentials or making transfers. The firm added that such attacks could target high-value individuals or those with frequent transactions.
Access to internal admin tools has been a repeated focus for threat actors in the cryptocurrency space. Exchanges such as Mt. Gox, Binance, KuCoin, Crypto.com, and FTX have all faced breaches targeting internal control systems.
These incidents have led to broader concerns about centralized platforms storing customer data in environments that may be exposed through compromised credentials, insider actions, or vendor vulnerabilities. Analysts believe that this alleged Kraken breach follows a similar pattern and reflects continued risks in platform design and access control.
CIFER Security recommends that Kraken users take extra precautions even before any official confirmation. Users are urged to enable hardware-based two-factor authentication, lock account settings, and whitelist specific withdrawal addresses. These steps can reduce risks of unauthorized account actions.
Additionally, users should be cautious about any emails or messages claiming to be from Kraken support. If attackers have access to transaction details, they may attempt to trick users using personalized information. Monitoring for SIM swap attempts and unexpected password resets is also advised.
Moving funds to new addresses not visible in transaction histories is also being suggested. Hardware wallets are a more secure option for users with large holdings. At the time of writing, Kraken has not issued an official statement. It is unknown whether this access was obtained through stolen credentials, insider involvement, or another method. Security experts are calling for the exchange to urgently audit admin panel activity, rotate access keys, and notify users if any exposure is confirmed.
The post Kraken Exchange Access Listed for Sale on Dark Web for Just $1: Report appeared first on CoinCentral.


