Home / Education / Crypto / Security / Coinbase Breach Explained: Bribed Support Agents, Stolen Data & a $20M Bounty
Security
7 min read
easy

Coinbase Breach Explained: Bribed Support Agents, Stolen Data & a $20M Bounty

Published
Dr. Lorena Nessi
Published

Key Takeaways

  • Insiders working at a Coinbase support center leaked sensitive user data after accepting bribes.
  • The attackers stole sensitive data such as names, emails, phone numbers, banking details, and official IDs.
  • Coinbase rejected the $20 million ransom demand. It offered a $20 million reward to help law enforcement track down the attackers.
  • The breach highlights the threat of insider access. It puts platform security and user trust under sharp focus across the crypto space.

In the world of crypto, not even the biggest giants in the ecosystem are safe. However, they are all free to act or react to attacks differently. 

The Coinbase attack is one of the latest examples. The company took a different approach with a bold public stand.

On May 15, Coinbase announced that “cyber criminals bribed and recruited a group of rogue overseas support agents to steal Coinbase customer data to facilitate social engineering attacks.”

Coinbase is the largest cryptocurrency exchange in the United States by trading volume and user base. Being the biggest players in the space, what stood out was not just the attack, which could reportedly cost the company up to $400 million, but the company’s response.

“We will not pay the $20 million ransom demand we received,” Coinbase stated. Instead, “we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack.”

Like this, Coinbase set a precedent and sent a direct message to its users and the crypto underworld.

This article explains the breach, Coinbase’s approach, and the details of the $20 million bounty. It also covers how you can stay safe in the crypto world, surrounded by cyber criminals.

What Happened in the Coinbase Breach?

According to Coinbase, the “insiders abused their access to customer support systems to steal the account data for a small subset of customers,” they will reimburse those affected who have sent funds.

“They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1% of Coinbase monthly transacting users. They aimed to gather a customer list they could contact while pretending to be Coinbase—tricking people into handing over their crypto. They then tried to extort Coinbase for $20 million to cover this up. We said no.”, Coinbase stated. 

Additionally, the company contacted law enforcement to pursue the attackers and apply the harshest suitable penalties. 

According to the exchange, the attackers did not gain access to passwords, private keys, wallets or user funds. Prime accounts remained untouched. 

Additionally, Coinbase fired the implicated individuals who leaked the information straight away.

What Data Was Stolen?

However, the attackers gained access to something equally valuable: personal data, which included:

  • Names
  • Email addresses
  • Phone numbers
  • Other sensitive personal information, such as security numbers and bank account details.
  • Account data, including transaction history
  • Official IDs such as passports and driver’s licences.

Coinbase’s Strategic Decision To Offer a $20 Million Reward

Despite the leaked information affecting a small percentage, the exchange reacted quickly by announcing a bounty to help authorities arrest and convict the attackers. 

Rather than giving in to the $20 million extortion attempt, Coinbase responded with a $20 million reward for information leading to those responsible. Instead of portraying the company as a victim, the move served as a strategic defense to strengthen its stance and highlight its commitment to user protection. 

It also sends a message to the crypto community about who sets the rules: it is not the criminals but the actors who take an active and cooperative role in the ecosystem, inviting collaboration.

The efforts have not been in vain. In one of the latest developments, ZachXBT identified someone he claims is the individual or group behind the Coinbase breach, linking them to multiple transfers totaling $65 million through an Ethereum wallet using on-chain data.

Later, Coinbase reported that the Department of Justice and other agencies were investigating the breach.

How To Stay Safe from Social Engineering Attacks in Crypto

Social engineering is an evolving threat that depends on the available technology and the creativity of the attackers. Therefore, crypto users should keep in mind some crucial points to stay protected:

  • Strange messages: It is a good practice to treat all unsolicited contact as suspicious. Scammers often pose as support agents. Trusted companies do not request passwords, two-factor authentication (2FA) codes, or funds by phone, text, or email. Verification should always take place through official support channels.
  • Password management: Users should use strong, unique passwords for each platform and encrypted password managers to store and generate credentials securely.
  • Phishing awareness: Individuals should verify URLs, sender addresses, and website authenticity before entering any credentials.
  • Account monitoring: It is a good practice to enable real-time alerts for logins and transactions to detect unauthorized activity early.
  • Cold storage use: Users should keep high-value crypto holdings in offline or cold wallets to reduce exposure to online threats.
  • Seed phrase shield: The seed phrase must stay private and never be shared with anyone.
  • Data minimization: With the rise in attacks on crypto holders, users should limit personal details shared online to reduce the risk of social engineering.
  • Immediate reporting: It is a good practice to contact official support teams and law enforcement after noticing any suspicious activity.
  • Ongoing education: The best defense against crypto-related attacks is to stay informed about cybersecurity threats and prevention strategies through credible sources.

Coinbase also shared key steps to help users protect their funds. Users should hang up if someone pretends to be Coinbase support. Users should lock the account using the app and contact support if anything feels suspicious.

Conclusion

Coinbase turned a dangerous breach into a bold statement in a recent attack. Instead of paying ransom, it offered a $20 million reward, sending a message of control and strength. 

However, the stolen data shows how insider threats can bypass even strong platforms. 

Users now face a reminder: vigilance is not optional in crypto. Security is a shared responsibility.

FAQs

How did Coinbase respond so quickly?

Coinbase launched an internal investigation within hours of detecting the breach and immediately contacted law enforcement, demonstrating a rapid incident response protocol.

Will affected users be compensated?

Yes. Coinbase said it will reimburse those who lost funds due to the breach.

Could a breach like the Coinbase one happen to other major platforms?

Yes. Insider threats exist everywhere, and this case shows that even top exchanges are vulnerable. However, how they respond to the attack can always vary.

How many users were affected by the data breach?

According to a filing with the Maine Attorney General’s Office, 69,461 Coinbase customers had their sensitive data exposed during the May 2025 breach.

Was this Article helpful? Yes No
Dr. Lorena Nessi is an award-winning journalist and media technology expert with 15 years of experience in digital culture and communication. Based in Oxfordshire, UK, she combines academic insight with hands-on media practice. She holds a PhD in Communication, Sociology, and Digital Cultures, and an MA in Globalization, Identity, and Technology. Lorena has taught at Fairleigh Dickinson University, Nottingham Trent University, and the University of Oxford. She is a former producer for the BBC in London, with additional experience creating television content in Mexico and Japan. Her research focuses on digital cultures, social media, technology, capitalism, and the societal impact of blockchain innovation. She has written extensively on digital media and emerging technologies, with her work featured in both academic and media platforms. Her Web3 expertise explores how blockchain technologies shape culture, economics, and decentralized systems. Outside of work, Lorena enjoys reading science fiction, playing strategic board games, traveling, and chasing adventures that get her heart racing. A perfect day ends with a relaxing spa and a good family meal.
See more