Zerodha Security incidents Outages Zerodha

Zerodha hack and security incidents

From WebNotes, a public knowledge base. Last updated . Reading time ~5 min.

No documented major hack of Zerodha resulting in client funds or securities loss has been publicly reported. Zerodha has had operational incidents (outages, login issues, slowdowns) on heavy-volume days, and individual client accounts have been compromised via phishing of personal credentials, but the broker’s core systems have not been publicly known to be breached.

This article gives an accurate picture of the security and incident history.

What “hack” typically means in retail discussion

When retail clients ask about Zerodha being “hacked”, they usually mean one of:

  1. Their personal Kite account was accessed by an unauthorised party (often phishing-driven).
  2. A platform-wide outage disrupted their trading.
  3. A general concern about the broker’s safety.

The first is an individual-account incident; the second is operational; the third is the broader Is Zerodha safe question.

Documented operational incidents

Login slowdowns / outages

Zerodha has had occasional login slowdowns and platform outages, typically on:

  • High-volatility days (budget day, election results, large geopolitical events).
  • Heavy IPO listing days (high subscriber and listing-day volumes).
  • System maintenance windows (planned).
  • DDoS attempts (intermittent; mitigated by infrastructure layers).

In each case, Zerodha typically restored service within minutes to a few hours and posted explanations on the Z-Connect blog or Twitter.

Margin call confusion

On heavy-volatility days, margin call notifications and auto-square-off can produce client confusion. This is an operational outcome, not a breach.

Rare back-office failures have produced delayed settlements. SEBI requires brokers to resolve these per the standard framework.

Phishing and individual-account compromise

Many individual clients have lost access to their accounts via phishing:

Common patterns

Attack vectorWhat happens
Phishing email pretending to be ZerodhaUser clicks link, enters credentials on a fake site
SMS phishing“Your account is suspended; click to verify”
Phone call posing as Zerodha supportCaller extracts TOTP / OTP
Telegram / WhatsApp impersonation“Customer support” gathering credentials

In each case, the breach is at the user, not at Zerodha.

Protection

  • Never enter Kite credentials on any non-zerodha.com domain.
  • Never share TOTP, OTP, or T-PIN with anyone.
  • Don’t trust unsolicited calls about your account.
  • Use the Kite app or kite.zerodha.com directly, not via links in emails or SMS.

Has the core system been hacked

To public knowledge:

  • No documented major breach of Zerodha’s core systems.
  • No publicly reported funds or securities loss at the broker level.
  • No SEBI enforcement action against Zerodha for security failures.

Zerodha complies with SEBI’s cyber security framework for stock brokers, which mandates:

  • Regular security audits.
  • Multi-factor authentication.
  • Segregated client funds.
  • Disaster recovery plans.

Audit reports are confidential; SEBI inspects but doesn’t publish.

Operational SLA

Zerodha doesn’t publish a formal uptime SLA, but observed operational reliability:

  • Trading session uptime: Typically high (above 99%); some heavy-volume day issues.
  • Login system: Generally reliable; outages are usually short.
  • Order placement: Reliable when login is available.
  • Console reporting: Reliable; occasional refresh issues.

For a broker handling ~30%+ of NSE retail flow, the operational record is strong but not perfect.

What you should do

Protective measures

  1. Enable TOTP (mandatory; already done).
  2. Use a unique password for Kite.
  3. Lock your device physically.
  4. Don’t share OTP / TOTP / T-PIN.
  5. Verify communications via the official support portal.
  6. Monitor account regularly.

Reactive measures

If you suspect your account is compromised:

  1. Change Kite password immediately.
  2. Disable / regenerate TOTP (via Kite settings).
  3. Contact Zerodha Support via Console > Support.
  4. Submit a SCORES complaint if Zerodha doesn’t resolve.
  5. File a police FIR if material loss has occurred.
  6. Regenerate CDSL T-PIN if compromised.

SEBI complaint pathway

For security-related complaints:

  1. First: Zerodha Support (Console).
  2. If unresolved: SCORES portal at scores.gov.in .
  3. If serious: SEBI direct enforcement.

The SCORES portal is the regulator-mandated channel for grievances.

See also

External references

References

  1. SEBI, Cyber security framework for stock brokers, sebi.gov.in.
  2. Zerodha, Operational incident communications, zerodha.com/z-connect.
  3. SEBI, Investor protection and grievance redressal, sebi.gov.in.

Reviewed and published by

The WebNotes Editorial Team covers Indian capital markets, payments infrastructure and retail investor procedures. Every article is fact-checked against primary sources, principally SEBI circulars and master directions, NPCI specifications and the official support documentation published by the intermediary in question. Drafts go through a second-pair-of-eyes review and a separate compliance read before publication, and revisions are tracked against the SEBI and NPCI rule changes referenced in the methodology section.

Last reviewed
Conflicts of interest
WebNotes is independent. No relationship with any broker, registrar or bank named in this article.