Coinbase Hit by Insider Breach as Hackers Demand Ransom for Data
By: coin central|2025/05/15 23:30:07
0
Share
TLDRCoinbase confirmed a cyberattack that targeted the personal data of select users.The hackers gained access by bribing overseas customer support agents.The attackers stole users’ names, addresses, and partial identity details.Coinbase stated that no passwords, funds, or private keys were accessed.The hackers made a ransom demand, but Coinbase refused to pay.Coinbase has confirmed a targeted cyberattack that exposed user data and triggered a major investigation. The attackers accessed personal information and demanded a ransom, but Coinbase refused to pay. The company now pledges full reimbursement for affected users while enforcing stricter internal security measures.Targeted Cyberattack Breaches Coinbase User DataHackers infiltrated Coinbase systems by bribing overseas support agents and accessing limited customer data. They retrieved users’ names, addresses, contact details, and partial identity information but failed to access sensitive login credentials or funds. Coinbase reported that this breach impacted less than 1% of its users.The attackers attempted to ransom the stolen data by directly emailing exchange users, but the company refused all ransom demands. The platform clarified that no Prime accounts were affected, and no private keys or funds were accessed. The exchange stated that hot and cold wallets remained fully secure throughout the incident.https://t.co/evpIBMFvRW pic.twitter.com/f6UPdkL5R0— Brian Armstrong (@brian_armstrong) May 15, 2025Coinbase flagged compromised accounts to mitigate further risk and introduced enhanced withdrawal verification protocols. These include additional ID checks and scam-awareness prompts on all large transactions. The company also immediately restricted accounts showing suspicious activity linked to the breach.Coinbase Launches Countermeasures and Reimbursement PlansCoinbase established a $20 million reward fund to identify and capture the perpetrators in response to the breach. This bounty aims to encourage information sharing that could lead to arrests and the recovery of stolen data. Investigators are now working with international authorities to trace the cybercriminals’ activities.The exchange opened a new U.S.-based support hub to centralize and tighten customer service operations. The hub applies improved security protocols and limits access to sensitive user information. All customer support teams now operate under stricter monitoring to prevent further infiltration.Users affected by social engineering attacks linked to the breach can now file claims for reimbursement. Coinbase pledged to compensate customers who were deceived into sending funds under pretenses. The company continues to update users as its investigation progresses.Global Context and Ongoing Threats to Crypto SecurityThe exchange breach comes shortly after Telegram cracked down on the darknet marketplace Haowang Guarantee, highlighting a broader cybersecurity threat. As hacking techniques evolve, exchanges like Coinbase face increasing pressure to upgrade defenses and protect customer data. The crypto sector remains a key target for organized cybercrime.Coinbase emphasized that despite the breach, no user funds were stolen and no private account access was compromised. The company maintained full control over financial assets and prevented attackers from accessing wallets. All account activity logs are being reviewed for further anomalies.In 2024, WazirX, another major exchange, suffered a larger breach involving a $230 million theft, forcing operations to halt. That incident remains unresolved, drawing comparisons with the exchange breach. However, the exchange retained operational continuity and has committed to full transparency and customer protection.Also Read: Coinbase Makes History as First Crypto Company to Join S&P 500 The post Coinbase Hit by Insider Breach as Hackers Demand Ransom for Data appeared first on CoinCentral.
You may also like

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.
Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.
In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...
Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…
Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…
Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.