All Blogs
Exchange API Key Hacks - Part 2
Industry Insight
March 27, 2025

Exchange API Key Hacks - Part 2

In the second blog of this series, we examine current mitigation strategies—and why even the best of them fall short in protecting your keys from today’s escalating threats.

Introduction

In Part 1, we broke down why Exchange API keys are becoming a major security risk:
They’re powerful, widely used in automated trading, and frequently handled insecurely. 

In Part 2, we look at existing mitigation strategies and why, despite best intentions, they’re not enough to protect your keys against the growing threats, which we witness every other week in Web3.

Current Security Measures - Not Enough For Modern Attackers

Security teams often turn to common strategies when dealing with Exchange API keys—such as:

  • IP allowlists
  • Permission scopes (e.g. “read-only,” “no withdrawal”)
  • Secrets managers
  • Activity monitoring and alerting tools

The problem?

Security teams often lean on conventional security solutions, like the ones mentioned above. These controls seem solid on paper but often fail in real-world scenarios. Attackers are not only aware of these guardrails—they’ve adapted to work around them.

Let’s dive in and explain where current solutions fall short.

1. Why IP Restrictions Don’t Work

Restricting API key usage to specific IP addresses is a widely-used security solution in the space, that is solid in theory.

In reality:

  • Attackers who gain access to your cloud environment can operate within your allowed IP addresses.
  • Dynamic cloud infrastructure (with autoscaling, rotating IPs) makes allowlists hard to maintain.
  • Sophisticated attackers can spoof trusted IPs

In short: attackers don’t care about your firewall if they’re already inside the house.

2. “No Withdrawal” Permissions ≠ No Damage

Setting your API keys to “no withdrawal” is good hygiene. However there are many different ways that attackers can still cause damage or still funds, including: 

  • Trading against a low-volume pair to steal the funds 
  • Malicious trades
  • Market manipulation
  • Forced slippage and loss
  • Data tampering or poisoning of trading logic

3. Secrets Managers Are a Double-Edged Sword

Storing API keys in a secrets manager (like AWS Secrets Manager or Vault) is a good first step.But here’s what often gets overlooked:

The most vulnerable moment for an API key is the split-second it's retrieved from the secrets manager and loaded into memory.

That’s the moment sophisticated attackers aim for. They hook into running processes, extract keys directly from memory, and bypass the secrets manager entirely.
It’s not about where you store the key—it’s about how you use it.

4. Fireblocks & Similar Platforms: Useful For Some Use Cases, But Not Enough

Solutions like Fireblocks offer strong protection for transfers and withdrawals, often with great UI and policy enforcement capabilities.

But when it comes to automated, programmatic use cases—like trading bots, backend strategies, or portfolio rebalancing—these platforms simply don’t fit.
They're not built for API-native high-performancet environments, and that’s where many teams still end up exposing their keys directly.

5. Monitoring Is Not Prevention

You can monitor key usage. You can set up alerts. But once an attacker is in, they move fast. By the time a suspicious action is flagged, it’s often too late.
Monitoring is important—but it's not a security control. It’s just a reactive measure for an existing leak. 

Bottom Line: Storage ≠ Security

Most solutions focus on storing API keys securely. Others focus on securing certain functions.
But Exchange API keys are used frequently, by backend systems, bots, and automated trading infrastructure. They’re most vulnerable at the point of use—and that’s where most solutions leave a gap.

Coming Up Next

In Part 3, we’ll introduce a new holistic and modern solution for securing Exchange API keys, designed for programmable trading, that addresses all stages - import, storage, the moment of use and remediation in risk scenarios.

About Sodot

Sodot is an MPC key management infrastructure company built by a seasoned team of applied cryptographers and security experts. Sodo’t MPC infrastructure is designed for building custodial and self-custodial solutions, with full operational control and minimum dependencies.