• Industry News
  • CXO Spotlight
  • AI
  • Enterprise Security

 Back to New Tab

Latest reports on Coinbase's $400M breach uncover insider bribes and refused ransoms

New Tab News Team
September 18, 2025
Industry News

Coinbase confirms a data breach involving bribed support agents, affecting nearly 70,000 users.

Credit: coinbase.com (edited)

Coinbase confirmed a costly data breach where bribed overseas support agents stole personal details of nearly 70,000 users, prompting a multi-million dollar remediation effort after the company refused a $20 million ransom.

  • The insider angle: Cybercriminals compromised customer names, addresses, phone numbers, government IDs, account balances, and transaction histories by recruiting rogue support agents. However, Coinbase emphasized that customer passwords, private keys, and Coinbase Prime accounts were not directly accessed.

  • Paying the piper, or not: Attackers demanded $20 million, which Coinbase declined, instead offering a matching $20 million reward for the hackers' capture. The exchange now faces estimated costs between $180 million and $400 million for security fixes and reimbursing affected users.

  • Cleaning house: Coinbase stated the breach began around December 26, 2024, with the company receiving a ransom email on May 11, 2025—a date also noted in its Maine Attorney General filing. In response, the exchange says it dismissed implicated staff, is boosting fraud detection, and plans a new U.S. support hub.

This breach exposes the persistent threat of insider collusion and the high financial and reputational stakes for crypto platforms, even as they invest heavily in security.

Elsewhere in the threat ecosystem, the Fog ransomware group emerged as a major global threat, while May saw PureRAT malware driving a surge in attacks on Russian organizations. North American companies also faced a sharp rise in ransomware incidents early in the year, as groups like Black Basta continue their double extortion tactics across industries.

Related content

An Insider's Guide to Rewiring Orgs as Agents Move From Tools to Core Operators

Omer Grossman, former Chief Trust Officer and Head of the CYBR Unit at CyberArk, explains why nearly every enterprise claims to use AI but almost none have transformed the way their organizations actually operate.

Shadow AI and Departmental Silos Force Enterprises to Rethink Resilience

Nethusha Ravisuthan, Sales Support and Operations Manager at Microsoft, argues that Shadow AI, departmental silos, and ungoverned AI agents are compounding enterprise risk, and that operational trust and holistic system resilience must become foundational to AI deployment.

How Higher Education Puts Boundaries Around AI Agents With Sanctioned Access Models

Vijay Samtani, CISO at Cambridge University, discusses how blocking AI agents is a losing battle for security leaders. Their best course of action is to build clear rules and guidelines for AI access to control vulnerable surfaces.

You might also like

See all →

Apple Doubles Top Bug Bounty to $2M in Spyware Arms Race

Report says majority of employees embrace AI unsupervised, leaving companies vulnerable

New Report Says Workers and Execs Alike are Breaking Their Own Rules on AI Usage

Powered by Island.
ISLAND, All rights reserved ©