Tutorial Beginner

3Commas Hack 2022: What Happened and How to Protect Yourself

Sentinel Team · 2026-03-10

The 3Commas hack of 2022 stands as one of the most significant security breaches in automated crypto trading history, exposing the fundamental vulnerability of custodial trading bot platforms. If you are evaluating crypto trading bot security models, understanding exactly what went wrong with 3Commas is essential to making an informed decision about where you trust your exchange credentials.

This article provides a complete timeline of events, a technical breakdown of how the breach occurred, its financial impact, and most importantly, the architectural lessons that every crypto trader should understand before connecting their exchange accounts to any third-party service.

Timeline of the 3Commas Breach

The 3Commas hack did not happen overnight. It unfolded across several months in 2022, with early warning signs that were initially dismissed by the platform.

Early Reports (October 2022)

In October 2022, users on social media platforms and crypto forums began reporting unauthorized trades on their linked exchange accounts. These were not random transactions. The attackers executed coordinated trades designed to pump low-liquidity tokens, buy at inflated prices using victims' accounts, and then dump the tokens for profit. This is a classic API key exploitation pattern.

Initially, 3Commas attributed these reports to phishing attacks, claiming users had fallen for fake websites or browser extensions that harvested their API keys. The platform maintained that its own systems had not been compromised.

Escalation (November 2022)

By November, the volume of reports had grown significantly. On-chain investigators, including the pseudonymous researcher ZachXBT, began documenting a clear pattern. Affected users reported that they had not visited phishing sites, had used unique passwords, and had enabled two-factor authentication on their 3Commas accounts. The common thread was clear: the API keys stored within 3Commas were the attack vector.

3Commas continued to deny a platform-level breach throughout November, even as Binance and other exchanges began revoking compromised API keys tied to 3Commas accounts.

Confirmation (December 2022)

On December 28, 2022, a dataset containing approximately 100,000 API keys was leaked online. The keys were linked to 3Commas user accounts and included credentials for Binance, KuCoin, Coinbase, and other major exchanges. Within hours, 3Commas CEO Yuriy Sorokin confirmed the breach was genuine, reversing months of denial.

The company urged all users to immediately revoke their API keys on all connected exchanges and issued a formal statement acknowledging the leak.

How the Breach Happened: The Custodial Architecture Problem

The root cause of the 3Commas hack was not a sophisticated zero-day exploit or a novel attack vector. It was an inherent architectural vulnerability: custodial API key storage.

Every crypto trading bot that operates on a custodial model requires users to submit their exchange API keys, which are then stored on the platform's servers. In 3Commas' case, these keys were stored in a centralized database. When attackers gained access to this database, they obtained the ability to execute trades on every connected exchange account simultaneously.

The custodial model creates what security researchers call a "honeypot": a single point of failure containing high-value credentials for thousands of users. Unlike a password breach where credentials can be reset, a compromised API key grants immediate, programmatic access to a user's exchange account.

Why API Keys Are More Dangerous Than Passwords

A stolen password still requires the attacker to log in through a web interface, potentially triggering two-factor authentication, IP-based alerts, or CAPTCHA challenges. A stolen API key bypasses all of these protections. API calls are designed for machine-to-machine communication, and exchanges process them without additional verification beyond the key itself.

Furthermore, many users granted their API keys full trading permissions, including the ability to create market orders, modify positions, and in some cases, initiate withdrawals. Even when withdrawal permissions were disabled, attackers could still drain accounts by executing unfavorable trades.

Financial Impact: Over $22 Million in Losses

The total financial impact of the 3Commas breach exceeded $22 million in confirmed losses, though the actual figure is likely higher due to unreported cases.

Breakdown of Losses

Several prominent crypto investors reported six-figure losses. One documented case involved a user losing approximately $1.6 million in a single attack session.

Exchange Response

Binance, the exchange most heavily affected, worked with law enforcement and froze several accounts linked to the attackers. However, due to the decentralized nature of crypto transactions, much of the stolen value was laundered through mixers and cross-chain bridges before it could be recovered.

For traders comparing platforms, Sentinel vs 3Commas highlights the fundamental architectural differences that prevent this class of attack entirely.

3Commas' Response and Aftermath

Following the confirmed breach, 3Commas took several steps to address the situation.

Immediate Actions

Long-Term Changes

3Commas announced plans to implement additional encryption layers for stored API keys and to pursue SOC 2 compliance. However, these measures do not address the fundamental architectural problem: the platform still stores user API keys on its servers.

Adding more encryption to a custodial model is analogous to adding more locks to a vault. It raises the difficulty of a breach but does not eliminate the attack surface. As long as the keys exist on a third-party server in any form, they remain a target.

Lessons Learned: Five Takeaways for Every Crypto Trader

The 3Commas breach provides clear, actionable lessons for anyone using automated trading tools.

1. Custodial Key Storage Is an Inherent Risk

No amount of encryption or compliance certification can fully mitigate the risk of storing API keys on a centralized server. If a platform has your keys, those keys can be stolen. This is not a question of if but when.

2. API Key Permissions Matter

Always configure API keys with the minimum required permissions. Disable withdrawal permissions without exception. Some exchanges allow IP whitelisting for API keys, which adds an additional layer of protection.

3. Monitor Your Exchange Accounts Independently

Do not rely solely on your trading bot platform to alert you to unauthorized activity. Set up independent monitoring through your exchange's native notification system, including email alerts for trades, login attempts, and API key usage.

4. Platform Transparency Is Not Optional

The months-long denial by 3Commas before acknowledging the breach eroded user trust far more than the breach itself. When evaluating any trading bot platform, assess how transparently the company communicates about security incidents.

5. Architecture Matters More Than Promises

Security is not a feature that can be bolted on after the fact. It must be fundamental to the platform's architecture. The most secure trading bot is one that never has access to your API keys in the first place.

How Signal-Push Architecture Prevents This Class of Attack

The 3Commas breach was possible because of one architectural decision: storing API keys on the platform's servers. A zero-knowledge security model eliminates this attack vector entirely by never transmitting API keys to the server.

In a signal-push architecture, the flow works differently.

How Signal-Push Works

  1. Strategy execution happens on the server: The platform analyzes market data, runs indicators, and generates trading signals.
  2. Signals are pushed to the client: When a trade should be executed, the server sends a signed signal to the user's local client application.
  3. Order execution happens locally: The client application, running on the user's own machine, receives the signal and executes the trade directly against the exchange using locally stored API keys.
  4. The server never sees the API keys: At no point in this process does the server have access to, store, or transmit the user's exchange credentials.

This architecture means that even if the server is completely compromised, an attacker gains zero access to user exchange accounts. There are no API keys to steal because the server never had them.

Why This Is Fundamentally Different

The difference is not incremental. It is categorical. Custodial platforms try to protect your keys with better encryption. Signal-push platforms eliminate the need to protect keys on the server because the keys are never there.

Sentinel Bot uses this signal-push architecture, ensuring that your exchange API keys remain exclusively on your local device. The platform generates trading signals based on your configured strategy, but all order execution happens client-side.

Frequently Asked Questions

Was 3Commas hacked or was it a phishing attack?

It was confirmed to be a platform-level breach. On December 28, 2022, 3Commas CEO Yuriy Sorokin acknowledged that approximately 100,000 API keys were leaked from the platform's database. While 3Commas initially attributed the unauthorized trades to phishing, the leaked dataset proved that the keys were extracted from 3Commas' own systems.

How much money was stolen in the 3Commas hack?

Confirmed losses exceeded $22 million, though the actual total is likely higher due to unreported cases. Individual losses ranged from hundreds of dollars to over $1.6 million. Attackers used stolen API keys to execute pump-and-dump schemes on low-liquidity trading pairs across multiple exchanges.

Can a trading bot hack happen again with other platforms?

Yes. Any trading bot platform that stores user API keys on its servers is vulnerable to the same class of attack. The 3Commas breach was not caused by a unique vulnerability but by an inherent flaw in the custodial architecture model. Similar breaches have occurred with other platforms, and the risk persists for any service that holds user credentials centrally.

How do I protect my exchange API keys from trading bot hacks?

The most effective protection is to use a non-custodial or signal-push trading bot that never stores your API keys on its servers. Additionally, always disable withdrawal permissions on API keys, enable IP whitelisting where supported, use unique API keys per service, and monitor your exchange accounts independently for unauthorized activity.


The 3Commas hack of 2022 was a defining moment for the automated crypto trading industry. It proved that custodial API key storage is a systemic risk, not merely a theoretical one. For traders seeking automated strategies without this vulnerability, Sentinel Bot's zero-knowledge architecture provides a fundamentally different approach where your API keys never leave your device. Get started with secure, non-custodial trading today.


Disclaimer: Cryptocurrency trading carries significant risk. Past performance is not indicative of future results. Never trade with money you cannot afford to lose. This article is for educational purposes only and does not constitute financial advice.