Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Turning User Research Into Real Organizational Change

      July 1, 2025

      June 2025: All AI updates from the past month

      June 30, 2025

      Building a culture that will drive platform engineering success

      June 30, 2025

      Gartner: More than 40% of agentic AI projects will be canceled in the next few years

      June 30, 2025

      I FINALLY got my hands on my most anticipated gaming laptop of 2025 — and it’s a 14-inch monster

      July 1, 2025

      This gimbal-tracking webcam has TWO cameras and a great price — but it may not be “private” enough

      July 1, 2025

      I spent two months using the massive Area-51 gaming rig — both a powerful beast PC and an RGB beauty queen

      July 1, 2025

      “Using AI is no longer optional” — Did Microsoft just make Copilot mandatory for its staff as a critical performance metric?

      July 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      June report 2025

      July 1, 2025
      Recent

      June report 2025

      July 1, 2025

      Make your JS functions smarter and cleaner with default parameters

      July 1, 2025

      Best Home Interiors in Hyderabad – Top Designers & Affordable Packages

      July 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I FINALLY got my hands on my most anticipated gaming laptop of 2025 — and it’s a 14-inch monster

      July 1, 2025
      Recent

      I FINALLY got my hands on my most anticipated gaming laptop of 2025 — and it’s a 14-inch monster

      July 1, 2025

      This gimbal-tracking webcam has TWO cameras and a great price — but it may not be “private” enough

      July 1, 2025

      I spent two months using the massive Area-51 gaming rig — both a powerful beast PC and an RGB beauty queen

      July 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Coinbase Details Insider Data Theft in Remarkable Disclosure

    Coinbase Details Insider Data Theft in Remarkable Disclosure

    May 15, 2025

    Coinbase Insider Data Theft

    In a model of responsible disclosure, Coinbase today detailed insider data theft that led to a $20 million ransom demand.

    In a blog post and SEC filing, Coinbase – the third largest crypto exchange by volume – said it will reimburse any customers tricked into sending funds to the attacker. And instead of paying the ransom demand, the company is instead offering a $20 million reward for information leading to the arrest and conviction of the attackers.

    “Crypto adoption depends on trust,” Coinbase said in the blog post. “To the customers affected, we’re sorry for the worry and inconvenience this incident caused. We’ll keep owning issues when they arise and investing in world‑class defenses—because that’s how we protect our customers and keep the crypto economy safe for everyone.”

    Coinbase Insider Data Theft Detailed in May 11 Email

    The SEC filing said Coinbase received an email from an unknown threat actor on May 11 “claiming to have obtained information about certain Coinbase customer accounts, as well as internal Coinbase documentation, including materials relating to customer-service and account-management systems.”

    Coinbase said the threat actor appears to have obtained the information by bribing “multiple contractors or employees working in support roles outside the United States.”

    It’s not clear what internal threat detection systems the company had or when Coinbase first became aware of the insider threat, but the SEC filing said the “instances of such personnel accessing data without business need were independently detected by the Company’s security monitoring in the previous months. Upon discovery, the Company had immediately terminated the personnel involved and also implemented heightened fraud-monitoring protections and warned customers whose information was potentially accessed in order to prevent misuse of any compromised information.”

    The threat actor obtained data on “less than 1% of Coinbase monthly transacting users.” The company has more than 100 million users but only around 10 million active monthly users, suggesting that data was stolen on around 100,000 users.

    The threat actor’s aim was “to gather a customer list they could contact while pretending to be Coinbase—tricking people into handing over their crypto,” the Coinbase blog post said. “They then tried to extort Coinbase for $20 million to cover this up. We said no.”

    The threat actor was able to obtain:

    • Name, addresses, phone numbers, and email addresses
    • Masked Social Security numbers (last 4 digits only)
    • Masked bank account numbers and some bank account identifiers
    • Government ID images such as driver’s licenses and passports
    • Account data, such as balance snapshots and transaction history
    • Limited corporate data (documents, training material, and communications available to support agents)

    The threat actor didn’t get login credentials or 2FA codes, private keys, any ability to move or access customer funds, access to Coinbase Prime accounts, or access to any Coinbase or Coinbase customer hot or cold wallets.

    Incident Could Cost Coinbase Up to $400 Million

    The SEC filing said Coinbase estimates that the breach, remediation and customer reimbursement will cost anywhere from $180 million to $400 million.

    Flagged accounts will now require additional ID checks on large withdrawals and include “mandatory scam‑awareness prompts.”

    Coinbase plans to open a new support hub in the U.S. and add “stronger security controls and monitoring across all locations.”

    “We have increased our investment in insider‑threat detection, automated response, and simulating similar security threats to find failure points in any internal system,” the blog stated.

    Protecting Against Crypto Scams

    Coinbase said scammers “may pose as Coinbase employees and try to pressure you into moving your funds. Remember, Coinbase will never ask for your password, 2FA codes, or for you to transfer assets to a specific or new address, account, vault or wallet. We will never call or text you to give you a new seed phrase or wallet address to move your funds to. If you receive this call, hang up the phone. Coinbase will never ask you to contact an unknown number to reach us.”

    The company said users should turn on withdrawal allow‑listing and “only permit transfers to wallets that you are confident you fully control and where the seed phrase is secure and was not provided to you or shared with anyone.”

    Enable strong two-factor authentication (2FA); “Hardware keys are best.”

    Hang up on imposters: “Coinbase will never ask for your password, 2FA codes, or to move funds to a ‘safe’ wallet.”

    “Lock first, ask later —If something feels off, lock your account in‑app and email security@coinbase.com.”

    The Coinbase SEC filing and blog post were remarkable examples of responsible cyber incident disclosure – and an equally strong reminder of the peril of insider threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUnlocking Literacy: Ojje’s Journey With MongoDB
    Next Article Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

    Related Posts

    Development

    New to the web platform in June

    July 1, 2025
    Development

    How to Set Up Coolify in AWS EC2 and Have the Power to Do Anything in the Cloud

    July 1, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47297 – OpenVAS Scanner Information Disclosure Vulnerability in OpenVAS

    Common Vulnerabilities and Exposures (CVEs)

    The rise of AI PCs: How businesses are reshaping their tech to keep up

    News & Updates

    InfHow: Learn how to do anything

    Web Development

    Rilasciata Deepin 25: La distribuzione GNU/Linux immutabile con assistente vocale e pacchetti universali

    Linux

    Highlights

    Linux

    TUXEDO Stellaris 16 Gen7: il nuovo laptop GNU/Linux con 128 GB di RAM e schermo HDR

    May 29, 2025

    TUXEDO Computers ha annunciato la 7° generazione della sua serie di laptop Stellaris 16, una…

    Open Source in Italia: tra Strategia Pubblica e Realtà in Evoluzione

    June 25, 2025

    Responsible AI in action: How Data Reply red teaming supports generative AI safety on AWS

    April 29, 2025

    Empowering the Modern Insurance Agent: Digital Strategies That Deliver Business Impact

    June 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.