By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Cyberessentials Technology MagazineCyberessentials Technology MagazineCyberessentials Technology Magazine
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Search
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2025 Cyberessentials.org. All Rights Reserved.
Reading: Coinbase data breach: How bribed insiders leaked 70k user profiles
Share
Notification Show More
Font ResizerAa
Cyberessentials Technology MagazineCyberessentials Technology Magazine
Font ResizerAa
  • Gadget
  • Technology
  • Mobile
Search
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
a laptop on a table
Security

Coinbase data breach: How bribed insiders leaked 70k user profiles

Last updated: May 30, 2025 3:26 am
Cyberessentials.org
Share
SHARE

Imagine getting a call from “Coinbase support” asking you to move your crypto to a “secure wallet” – only to lose everything. This nightmare became reality for 69,461 Coinbase users after hackers bribed customer service agents to steal sensitive data. The crypto giant now faces up to $400 million in costs from this digital heist.

Contents
How hackers turned employees into data thievesThe $20 million showdownWhat wasn’t stolenProtecting yourself moving forward

How hackers turned employees into data thieves

Between December 2024 and May 2025, cybercriminals targeted overseas support agents in India working for Coinbase. “They offered cash payments to copy customer data from our systems,” revealed Chief Security Officer Philip Martin. The bribed employees handed over:

  • Full names and home addresses
  • Phone numbers and email addresses
  • Last 4 digits of Social Security numbers
  • Scans of driver’s licenses and passports
  • Account balances and transaction histories

Maria Gonzalez, a small investor from Texas, lost $8,000 this way. “The caller knew my account balance and recent trades – I thought it was real,” she told us. Her story echoes hundreds of similar scams enabled by the breach.

The $20 million showdown

On May 11, 2025, Coinbase received an ultimatum: Pay $20 million in bitcoin or watch stolen data leak online. CEO Brian Armstrong shot back in a viral video: “We don’t negotiate with digital terrorists.” Instead, Coinbase offered a $20 million bounty for information leading to arrests.

The company’s stock initially dropped 6% but rebounded after announcing:

  • Full refunds for scammed users
  • Free credit monitoring for victims
  • New US-based support center replacing some overseas operations

What wasn’t stolen

While personal data leaked, Coinbase confirms:

  • No passwords or private keys were compromised
  • Crypto wallets remained secure
  • Prime accounts for big investors weren’t touched

“This wasn’t a technical hack – it’s old-fashioned corruption with digital consequences,” explains cybersecurity expert Lisa Wang. The breach reveals how insider threats pose bigger risks than sophisticated hackers for crypto platforms.

Protecting yourself moving forward

Coinbase recommends all users:

  • Enable withdrawal allow-listing (only send crypto to pre-approved addresses)
  • Use authenticator apps instead of SMS for 2FA
  • Never share seed phrases – even with “support agents”

As the FBI tracks the digital breadcrumbs, one thing’s clear: In crypto’s wild west, trust no one – not even official-looking calls. Your best protection? Assume every unsolicited contact is a scam until proven otherwise.

100 Inspirational Cybersecurity Quotes to Understand the Digital World
Information Security vs Cyber Security: A Clear Explanation
Cybersecurity in Auto Insurance: Protecting Your Data in a Digital World
Cyber Security Engineer Job Description: The Ultimate Guide
Top 20 Cybersecurity Domains: A Detailed Guide
Share This Article
Facebook Copy Link Print
Share
Previous Article red white and green flag - iran flag Iranian hacker faces 30 years for holding american cities digital hostage
Next Article man in crew neck shirt The Celebgate scandal: How hackers stole intimate photos of Hollywood’s biggest stars
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

person using black and red Acer laptop computer on table
The 10 Best Cybersecurity Bootcamps of 2025
Security
degree
Why You Should Choose UMGC for a Cybersecurity Degree
Security
cybersecurity conference
Cybersecurity Conferences 2025: Your Ultimate Guide
Security
person using black laptop computer
Cybersecurity as a Service: Your Ultimate Guide
Security
password leak
Massive Password Leak: 16 Billion Credentials Exposed!
Security
coding
Does Cybersecurity Require Coding?
Security
FDA Cybersecurity Guidance
Navigating the World of FDA Cybersecurity Guidance: A Simple Guide
Security
TTP in Cybersecurity
Understanding TTP in Cybersecurity: The Hacker’s Playbook
Security
banner banner
Cyberessentials.org
Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

You Might also Like

closeup photo of eyeglasses
Security

Big Data and the Ethics of Cybersecurity

Cyberessentials.org
17 Min Read
purple and pink light illustration
Security

Common Port Numbers In Cybersecurity: A Simple Guide

Cyberessentials.org
16 Min Read
proofpoint
SecurityTechnology

A Deep Dive into UniFi CyberSecure by Proofpoint

Cyberessentials.org
15 Min Read
person holding iPhone
Security

The Junction Between Cybersecurity and Social Psychology

Cyberessentials.org
20 Min Read
person using laptop computers
Security

The Gray Maze: A Deep Dive into Justin Shafer, Cybersecurity, and Its Hard Lessons

Cyberessentials.org
15 Min Read
cybersecurity company
Security

A Guide to the Best Cybersecurity Companies

Cyberessentials.org
11 Min Read
donald trump
Security

Digital Fortresses: What Happened to Cybersecurity Money in the Trump Era?

Cyberessentials.org
13 Min Read
pretexting
Security

What is Pretexting in Cyber Security: A Complete Guide

Cyberessentials.org
27 Min Read
person using black laptop computer
Security

Can You Make Millions in Cyber Security? The Complete Guide to Building Wealth in Digital Protection

Cyberessentials.org
16 Min Read
//

Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Support

  • PRIVACY NOTICE
  • YOUR PRIVACY RIGHTS
  • INTEREST-BASE ADSNew
  • TERMS OF USE
  • OUR SITE MAP

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

Cyberessentials Technology MagazineCyberessentials Technology Magazine
Follow US
© 2025 Cyberessentials.org. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?