Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sentry launches MCP monitoring tool

      August 14, 2025

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      From Line To Layout: How Past Experiences Shape Your Design Career

      August 13, 2025

      Hire React.js Developers in the US: How to Choose the Right Team for Your Needs

      August 13, 2025

      I’ve tested every Samsung Galaxy phone in 2025 – here’s the model I’d recommend on sale

      August 14, 2025

      Google Photos just put all its best editing tools a tap away – here’s the shortcut

      August 14, 2025

      Claude can teach you how to code now, and more – how to try it

      August 14, 2025

      One of the best work laptops I’ve tested has MacBook written all over it (but it’s even better)

      August 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Controlling Execution Flow with Laravel’s Sleep Helper

      August 14, 2025
      Recent

      Controlling Execution Flow with Laravel’s Sleep Helper

      August 14, 2025

      Generate Secure Temporary Share Links for Files in Laravel

      August 14, 2025

      This Week in Laravel: Filament 4, Laravel Boost, and Junie Review

      August 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      KDE Plasma 6 on Wayland: the Payoff for Years of Plumbing

      August 14, 2025
      Recent

      KDE Plasma 6 on Wayland: the Payoff for Years of Plumbing

      August 14, 2025

      FOSS Weekly #25.33: Debian 13 Released, Torvalds vs RISC-V, Arch’s New Tool, GNOME Perfection and More Linux Stuff

      August 14, 2025

      Ultimate ChatGPT-5 Prompt Guide: 52 Ideas for Any Task

      August 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Coinbase Details Insider Data Theft in Remarkable Disclosure

    Coinbase Details Insider Data Theft in Remarkable Disclosure

    May 15, 2025

    Coinbase Insider Data Theft

    In a model of responsible disclosure, Coinbase today detailed insider data theft that led to a $20 million ransom demand.

    In a blog post and SEC filing, Coinbase – the third largest crypto exchange by volume – said it will reimburse any customers tricked into sending funds to the attacker. And instead of paying the ransom demand, the company is instead offering a $20 million reward for information leading to the arrest and conviction of the attackers.

    “Crypto adoption depends on trust,” Coinbase said in the blog post. “To the customers affected, we’re sorry for the worry and inconvenience this incident caused. We’ll keep owning issues when they arise and investing in world‑class defenses—because that’s how we protect our customers and keep the crypto economy safe for everyone.”

    Coinbase Insider Data Theft Detailed in May 11 Email

    The SEC filing said Coinbase received an email from an unknown threat actor on May 11 “claiming to have obtained information about certain Coinbase customer accounts, as well as internal Coinbase documentation, including materials relating to customer-service and account-management systems.”

    Coinbase said the threat actor appears to have obtained the information by bribing “multiple contractors or employees working in support roles outside the United States.”

    It’s not clear what internal threat detection systems the company had or when Coinbase first became aware of the insider threat, but the SEC filing said the “instances of such personnel accessing data without business need were independently detected by the Company’s security monitoring in the previous months. Upon discovery, the Company had immediately terminated the personnel involved and also implemented heightened fraud-monitoring protections and warned customers whose information was potentially accessed in order to prevent misuse of any compromised information.”

    The threat actor obtained data on “less than 1% of Coinbase monthly transacting users.” The company has more than 100 million users but only around 10 million active monthly users, suggesting that data was stolen on around 100,000 users.

    The threat actor’s aim was “to gather a customer list they could contact while pretending to be Coinbase—tricking people into handing over their crypto,” the Coinbase blog post said. “They then tried to extort Coinbase for $20 million to cover this up. We said no.”

    The threat actor was able to obtain:

    • Name, addresses, phone numbers, and email addresses
    • Masked Social Security numbers (last 4 digits only)
    • Masked bank account numbers and some bank account identifiers
    • Government ID images such as driver’s licenses and passports
    • Account data, such as balance snapshots and transaction history
    • Limited corporate data (documents, training material, and communications available to support agents)

    The threat actor didn’t get login credentials or 2FA codes, private keys, any ability to move or access customer funds, access to Coinbase Prime accounts, or access to any Coinbase or Coinbase customer hot or cold wallets.

    Incident Could Cost Coinbase Up to $400 Million

    The SEC filing said Coinbase estimates that the breach, remediation and customer reimbursement will cost anywhere from $180 million to $400 million.

    Flagged accounts will now require additional ID checks on large withdrawals and include “mandatory scam‑awareness prompts.”

    Coinbase plans to open a new support hub in the U.S. and add “stronger security controls and monitoring across all locations.”

    “We have increased our investment in insider‑threat detection, automated response, and simulating similar security threats to find failure points in any internal system,” the blog stated.

    Protecting Against Crypto Scams

    Coinbase said scammers “may pose as Coinbase employees and try to pressure you into moving your funds. Remember, Coinbase will never ask for your password, 2FA codes, or for you to transfer assets to a specific or new address, account, vault or wallet. We will never call or text you to give you a new seed phrase or wallet address to move your funds to. If you receive this call, hang up the phone. Coinbase will never ask you to contact an unknown number to reach us.”

    The company said users should turn on withdrawal allow‑listing and “only permit transfers to wallets that you are confident you fully control and where the seed phrase is secure and was not provided to you or shared with anyone.”

    Enable strong two-factor authentication (2FA); “Hardware keys are best.”

    Hang up on imposters: “Coinbase will never ask for your password, 2FA codes, or to move funds to a ‘safe’ wallet.”

    “Lock first, ask later —If something feels off, lock your account in‑app and email security@coinbase.com.”

    The Coinbase SEC filing and blog post were remarkable examples of responsible cyber incident disclosure – and an equally strong reminder of the peril of insider threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUnlocking Literacy: Ojje’s Journey With MongoDB
    Next Article Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

    Related Posts

    Development

    Controlling Execution Flow with Laravel’s Sleep Helper

    August 14, 2025
    Development

    Generate Secure Temporary Share Links for Files in Laravel

    August 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-24132 – Apple AirPlay Local Network Denial of Service

    Common Vulnerabilities and Exposures (CVEs)

    Rilasciata CachyOS Maggio 2025: Miglioramenti per GPU NVIDIA e Novità per il Gaming

    Linux

    This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

    News & Updates

    The Unusual Suspect: Git Repos

    Development

    Highlights

    News & Updates

    Best gaming laptops for playing The Elder Scrolls 4: Oblivion Remastered in 2025

    April 24, 2025

    Oblivion Remastered is here, and your aging PC might not be able to handle the…

    Don’t miss these fantastic DJI drone deals during Amazon Prime Day

    July 9, 2025

    Perficient Named 2025 Gold Globee® Winner for Best Artificial Intelligence Service Provider

    May 21, 2025

    CVE-2025-45819 – Slims Senayan Library Management Systems SQL Injection

    May 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.