BITPoint Exchange Hack — $23M Customer Cryptocurrency Stolen, July 2019
ConstrainedCustodial platform became inaccessible — recovery ran through a lengthy institutional process.
On July 12, 2019, BITPoint, operated by Tokyo-listed Remixpoint Inc., discovered unauthorised outflows totalling approximately 3.5 billion yen ($32 million USD). Of this amount, 2.
5 billion yen ($23 million) represented customer funds denominated in Bitcoin, Ethereum, Ripple, Bitcoin Cash, and Litecoin. The remainder ($9 million) comprised company assets. The breach occurred in the exchange's hot wallet infrastructure despite BITPoint holding formal registration under Japan's licensing framework established following the 2018 Coincheck incident, which had prompted regulatory modernisation. Upon discovery, BITPoint immediately suspended all deposits, withdrawals, and trading, rendering approximately 50,000 registered users unable to access their accounts.
The exchange notified Japan's Financial Services Agency in accordance with regulatory requirements. Remixpoint publicly committed to compensating affected customers using corporate funds, a significant financial undertaking that distinguished this incident from total-loss scenarios. BITPoint gradually resumed limited operations in subsequent months. The incident exposed ongoing vulnerabilities in hot wallet security across Japan's licensed exchange ecosystem.
Japan's FSA subsequently issued oversight reports documenting security gaps at multiple registered platforms, indicating systemic rather than isolated deficiency. The case underscored the regulatory risk of institutional custodial models: even formally licensed, nominally regulated exchanges remain vulnerable to sophisticated theft, and customer recovery depends entirely on operator solvency and willingness to absorb losses.
| Stress condition | Vendor lockout |
| Custody system | Exchange custody |
| Outcome | Constrained |
| Documentation | Present and interpretable |
| Year observed | 2019 |
| Country | Japan |
Why custodial Bitcoin fails differently than self-custody
Exchange custody transfers the custody problem from the holder to the institution. The holder no longer needs to manage seed phrases, maintain hardware, or understand cryptographic concepts. They need only to maintain their account. This simplicity has a cost: the holder no longer controls the private keys. Access depends entirely on the continued operational, financial, and regulatory health of the exchange.
Cases in this archive show that exchange failures cluster around specific event types: bankruptcy and insolvency, regulatory seizure, geographic sanctions, and account-level access failures (lost 2FA, forgotten email credentials). Each event type has a different recovery path and a different timeline. Bankruptcy proceedings typically take 6-24 months and produce partial recovery. Regulatory seizure timelines depend on legal process. Account access failures may be resolvable through platform support or may not.
The distinguishing feature of vendor lockout cases is that recovery — when it occurs — happens through processes the holder did not design and cannot control. They become claimants in a process rather than holders of an asset.
The primary protection against vendor lockout is not using a vendor for custody beyond what is needed operationally. Holdings intended to be stored long-term are most exposed to institutional risk. Exchange custody is well-suited for active trading and conversion; it is poorly suited for long-term storage of significant value. Moving Bitcoin off exchange into self-custody eliminates platform dependency at the cost of taking on personal custody responsibility.