ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Founded in June of 2012, Coinbase is a digital currency wallet and platform where merchants and consumers can transact with new digital currencies like bitcoin, ethereum, and litecoin. Our vision is to bring more innovation, efficiency, and equality of opportunity to the world by building an open financial system. Our first step on that journey is making digital currency accessible and approachable for everyone. Two principles guide our efforts. First, be the most trusted company in our domain. Second, create user-focused products that are easier and more intuitive to use.

Coinbase A.I CyberSecurity Scoring

Coinbase

Company Details

Linkedin ID:

coinbase

Employees number:

6,751

Number of followers:

1,220,202

NAICS:

52

Industry Type:

Financial Services

Homepage:

coinbase.com

IP Addresses:

28

Company ID:

COI_2349056

Scan Status:

Completed

AI scoreCoinbase Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/coinbase.jpeg
Coinbase Financial Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCoinbase Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/coinbase.jpeg
Coinbase Financial Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Coinbase Company CyberSecurity News & History

Past Incidents
8
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Coinbase, Inc.Breach5027/2024
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Maine Office of the Attorney General reported that Coinbase, Inc. experienced an inadvertent disclosure of personal information on July 11, 2024, affecting 154 individuals in total, including 1 Maine resident. The incident involved a file containing transaction data, which included names, bank account numbers, and routing numbers, mistakenly uploaded to an external location, though there is no evidence of unauthorized access or identity theft.

CoinbaseBreach8545/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Coinbase, a major U.S. cryptocurrency exchange, confirmed that fewer than 1% of its customers had their sensitive data compromised after threat actors bribed overseas customer service support agents to gain unauthorized access to internal systems. The breach exposed customers' names, phone numbers, home addresses, email addresses, masked bank account numbers, the last four digits of Social Security numbers, government ID images, and certain corporate data. While private keys, credentials, and funds remained secure, Coinbase warned of potential follow-up social engineering attacks. The company refused to pay a $200 million ransom demand, instead allocating the amount to a bounty program for information leading to the attackers' arrest. The incident underscored critical gaps in insider threat detection and access governance, particularly as operations scale globally through outsourcing.

CoinbaseBreach85412/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In December 2024, Coinbase suffered a major data breach where cybercriminals bribed overseas support agents (allegedly in India) to steal sensitive customer data. The leaked information of **69,461 individuals** included **passport photos, government IDs, names, dates of birth, partial Social Security numbers, bank account details, balances, and transaction histories**. While passwords were not compromised, the exposed data enabled social engineering attacks, with hackers impersonating Coinbase to trick victims into transferring cryptocurrency. A third party later demanded a **$20 million extortion payment**, which Coinbase refused, instead disclosing the incident publicly.The breach heightened security concerns, coinciding with a rise in **kidnappings and violence targeting crypto industry figures**, including a high-profile attack on the daughter of a French crypto CEO. Coinbase committed to reimbursing scammed retail customers, tracing stolen funds, monitoring suspicious withdrawals, and offering a **$20 million bounty** for information on the hackers. Remediation costs are estimated between **$180 million to $400 million**, with the **U.S. Justice Department launching an investigation**. The incident underscores severe risks to customer trust, financial security, and physical safety in the cryptocurrency sector.

CoinbaseBreach8545/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Coinbase, a leading cryptocurrency trading platform, fell victim to an extortion attempt by an unknown threat actor who demanded $20 million in exchange for not publishing stolen customer data. The breach occurred after criminals targeted overseas customer support agents in India, bribing a small group to copy data from internal tools. The compromised data belonged to less than 1% of Coinbase’s 9.7 million monthly transacting users (under 100,000 individuals) and included names, addresses, phone numbers, email addresses, masked partial Social Security numbers, encoded bank details, government ID images (e.g., driver’s licenses), transaction histories, and limited corporate data. While no login credentials, 2FA codes, private keys, or direct access to funds were stolen, the breach exposed users to phishing risks, with scammers potentially impersonating Coinbase to trick victims into transferring assets.Coinbase refused the extortion demand, fired the implicated employees, and pledged to reimburse affected users. The company estimates remediation costs between $180 million and $400 million. The incident highlights vulnerabilities in third-party support operations and the broader risks of insider threats in handling sensitive customer data.

CoinbaseBreach10056/2023
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Coinbase, a leading cryptocurrency exchange, suffered a significant **insider threat breach** in 2023, where an employee with malicious intent exploited internal access to steal sensitive customer data and proprietary financial information. The breach exposed **personally identifiable information (PII)**, including email addresses, transaction histories, and partial payment details of over **6,000 customers**, alongside **confidential merger and acquisition (M&A) plans** and **intellectual property (IP)** related to the company’s strategic expansion. The stolen data was later leaked on dark web forums, triggering **fraudulent transactions**, **phishing campaigns targeting affected users**, and **regulatory scrutiny** under GDPR and CCPA. The incident eroded customer trust, leading to a **12% drop in active users** within the quarter and a **$18 million loss** in direct fraud-related reimbursements. The breach also forced Coinbase to **halt planned partnerships** due to compromised negotiation leverage, further amplifying financial and reputational damage. Investigations revealed the insider had **bypassed multi-factor authentication (MFA)** using stolen credentials from a prior phishing attack, highlighting systemic vulnerabilities in access controls.

Coinbase Global Inc.Breach1005/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Coinbase suffered a data breach where attackers bribed customer service representatives in India to gain access to client data, including names, dates of birth, addresses, nationalities, government ID numbers, some banking data, and account details. The stolen information included personal details of high-profile executives like Sequoia Capital Managing Partner Roelof Botha. The attackers demanded $20 million from Coinbase to cover up the incident, which the company refused. The breach highlights the vulnerability of crypto executives and the increasing concern for their safety.

CoinbaseBreach10059/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In May, Coinbase disclosed a major data breach where hackers, aided by rogue employees at its outsourcing partner **TaskUs**, stole personal data of **69,000+ customers**, including Social Security numbers and bank details. The breach originated from **Ashita Mishra**, a TaskUs employee in India, who systematically exfiltrated data (up to **200 customer records daily**) from September 2024 to January 2025, selling it for **$200 per screenshot** to a criminal collective called *‘The Comm’*—comprising teenagers and young hackers. The stolen data was used to impersonate Coinbase staff, tricking victims into transferring cryptocurrency. The breach, initially downplayed by Coinbase (which cited a December 2024 timeline), involved **internal collusion**, including team leaders and HR staff at TaskUs. Coinbase faces **$400M in losses**, regulatory scrutiny, and class-action lawsuits, while TaskUs fired **226 employees** in Indore and dismantled its investigative HR team, allegedly to conceal the breach’s scale. The incident marks Coinbase’s **worst breach in its history**, exposing systemic vulnerabilities in third-party vendor security and internal oversight.

CoinbaseBreach10046/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A data breach at Coinbase, facilitated by bribed customer support representatives from outsourcing firm TaskUs, resulted in the theft of sensitive user data including names, emails, partial financial information, SSN, transaction history, and ID document scans. The breach affected nearly 70,000 customers and was discovered after an employee was caught capturing photos of her computer screen. The threat actors demanded a $20,000,000 ransom to not publish the stolen data. Coinbase estimated the incident would cause losses of up to $400 million.

Coinbase, Inc.
Breach
Severity: 50
Impact: 2
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: The Maine Office of the Attorney General reported that Coinbase, Inc. experienced an inadvertent disclosure of personal information on July 11, 2024, affecting 154 individuals in total, including 1 Maine resident. The incident involved a file containing transaction data, which included names, bank account numbers, and routing numbers, mistakenly uploaded to an external location, though there is no evidence of unauthorized access or identity theft.

Coinbase
Breach
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Coinbase, a major U.S. cryptocurrency exchange, confirmed that fewer than 1% of its customers had their sensitive data compromised after threat actors bribed overseas customer service support agents to gain unauthorized access to internal systems. The breach exposed customers' names, phone numbers, home addresses, email addresses, masked bank account numbers, the last four digits of Social Security numbers, government ID images, and certain corporate data. While private keys, credentials, and funds remained secure, Coinbase warned of potential follow-up social engineering attacks. The company refused to pay a $200 million ransom demand, instead allocating the amount to a bounty program for information leading to the attackers' arrest. The incident underscored critical gaps in insider threat detection and access governance, particularly as operations scale globally through outsourcing.

Coinbase
Breach
Severity: 85
Impact: 4
Seen: 12/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: In December 2024, Coinbase suffered a major data breach where cybercriminals bribed overseas support agents (allegedly in India) to steal sensitive customer data. The leaked information of **69,461 individuals** included **passport photos, government IDs, names, dates of birth, partial Social Security numbers, bank account details, balances, and transaction histories**. While passwords were not compromised, the exposed data enabled social engineering attacks, with hackers impersonating Coinbase to trick victims into transferring cryptocurrency. A third party later demanded a **$20 million extortion payment**, which Coinbase refused, instead disclosing the incident publicly.The breach heightened security concerns, coinciding with a rise in **kidnappings and violence targeting crypto industry figures**, including a high-profile attack on the daughter of a French crypto CEO. Coinbase committed to reimbursing scammed retail customers, tracing stolen funds, monitoring suspicious withdrawals, and offering a **$20 million bounty** for information on the hackers. Remediation costs are estimated between **$180 million to $400 million**, with the **U.S. Justice Department launching an investigation**. The incident underscores severe risks to customer trust, financial security, and physical safety in the cryptocurrency sector.

Coinbase
Breach
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Coinbase, a leading cryptocurrency trading platform, fell victim to an extortion attempt by an unknown threat actor who demanded $20 million in exchange for not publishing stolen customer data. The breach occurred after criminals targeted overseas customer support agents in India, bribing a small group to copy data from internal tools. The compromised data belonged to less than 1% of Coinbase’s 9.7 million monthly transacting users (under 100,000 individuals) and included names, addresses, phone numbers, email addresses, masked partial Social Security numbers, encoded bank details, government ID images (e.g., driver’s licenses), transaction histories, and limited corporate data. While no login credentials, 2FA codes, private keys, or direct access to funds were stolen, the breach exposed users to phishing risks, with scammers potentially impersonating Coinbase to trick victims into transferring assets.Coinbase refused the extortion demand, fired the implicated employees, and pledged to reimburse affected users. The company estimates remediation costs between $180 million and $400 million. The incident highlights vulnerabilities in third-party support operations and the broader risks of insider threats in handling sensitive customer data.

Coinbase
Breach
Severity: 100
Impact: 5
Seen: 6/2023
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Coinbase, a leading cryptocurrency exchange, suffered a significant **insider threat breach** in 2023, where an employee with malicious intent exploited internal access to steal sensitive customer data and proprietary financial information. The breach exposed **personally identifiable information (PII)**, including email addresses, transaction histories, and partial payment details of over **6,000 customers**, alongside **confidential merger and acquisition (M&A) plans** and **intellectual property (IP)** related to the company’s strategic expansion. The stolen data was later leaked on dark web forums, triggering **fraudulent transactions**, **phishing campaigns targeting affected users**, and **regulatory scrutiny** under GDPR and CCPA. The incident eroded customer trust, leading to a **12% drop in active users** within the quarter and a **$18 million loss** in direct fraud-related reimbursements. The breach also forced Coinbase to **halt planned partnerships** due to compromised negotiation leverage, further amplifying financial and reputational damage. Investigations revealed the insider had **bypassed multi-factor authentication (MFA)** using stolen credentials from a prior phishing attack, highlighting systemic vulnerabilities in access controls.

Coinbase Global Inc.
Breach
Severity: 100
Impact:
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Coinbase suffered a data breach where attackers bribed customer service representatives in India to gain access to client data, including names, dates of birth, addresses, nationalities, government ID numbers, some banking data, and account details. The stolen information included personal details of high-profile executives like Sequoia Capital Managing Partner Roelof Botha. The attackers demanded $20 million from Coinbase to cover up the incident, which the company refused. The breach highlights the vulnerability of crypto executives and the increasing concern for their safety.

Coinbase
Breach
Severity: 100
Impact: 5
Seen: 9/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In May, Coinbase disclosed a major data breach where hackers, aided by rogue employees at its outsourcing partner **TaskUs**, stole personal data of **69,000+ customers**, including Social Security numbers and bank details. The breach originated from **Ashita Mishra**, a TaskUs employee in India, who systematically exfiltrated data (up to **200 customer records daily**) from September 2024 to January 2025, selling it for **$200 per screenshot** to a criminal collective called *‘The Comm’*—comprising teenagers and young hackers. The stolen data was used to impersonate Coinbase staff, tricking victims into transferring cryptocurrency. The breach, initially downplayed by Coinbase (which cited a December 2024 timeline), involved **internal collusion**, including team leaders and HR staff at TaskUs. Coinbase faces **$400M in losses**, regulatory scrutiny, and class-action lawsuits, while TaskUs fired **226 employees** in Indore and dismantled its investigative HR team, allegedly to conceal the breach’s scale. The incident marks Coinbase’s **worst breach in its history**, exposing systemic vulnerabilities in third-party vendor security and internal oversight.

Coinbase
Breach
Severity: 100
Impact: 4
Seen: 6/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A data breach at Coinbase, facilitated by bribed customer support representatives from outsourcing firm TaskUs, resulted in the theft of sensitive user data including names, emails, partial financial information, SSN, transaction history, and ID document scans. The breach affected nearly 70,000 customers and was discovered after an employee was caught capturing photos of her computer screen. The threat actors demanded a $20,000,000 ransom to not publish the stolen data. Coinbase estimated the incident would cause losses of up to $400 million.

Ailogo

Coinbase Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Coinbase

Incidents vs Financial Services Industry Average (This Year)

Coinbase has 426.32% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Coinbase has 525.0% more incidents than the average of all companies with at least one recorded incident.

Incident Types Coinbase vs Financial Services Industry Avg (This Year)

Coinbase reported 4 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 4 data breaches, compared to industry peers with at least 1 incident.

Incident History — Coinbase (X = Date, Y = Severity)

Coinbase cyber incidents detection timeline including parent company and subsidiaries

Coinbase Company Subsidiaries

SubsidiaryImage

Founded in June of 2012, Coinbase is a digital currency wallet and platform where merchants and consumers can transact with new digital currencies like bitcoin, ethereum, and litecoin. Our vision is to bring more innovation, efficiency, and equality of opportunity to the world by building an open financial system. Our first step on that journey is making digital currency accessible and approachable for everyone. Two principles guide our efforts. First, be the most trusted company in our domain. Second, create user-focused products that are easier and more intuitive to use.

Loading...
similarCompanies

Coinbase Similar Companies

Barclays

Barclays is a British universal bank. Our vision is to be the UK-centred leader in global finance. We are a diversified bank with comprehensive UK consumer, corporate and wealth and private banking franchises, a leading investment bank and a strong, specialist US consumer bank. Through these five di

XP Inc.

A XP Inc. é uma das maiores instituições financeiras independente do Brasil, dona das marcas XP, Rico, Clear, XP Educação, InfoMoney, entre outras. Com mais de 4,6 milhões de clientes ativos e um valor superior a R$ 1,1 trilhão de ativos sob custódia, há 23 anos vem transformando o mercado financeir

Cholamandalam Investment and Finance Company Limited

Cholamandalam Investment and Finance Company Limited (Chola), founded in 1978 as part of the Murugappa Group, initially focused on equipment financing. Over the years, Chola has transformed into a leading comprehensive financial services provider, offering a wide array of solutions including vehicle

SBI Card

SBI Card was launched in 1998 with the State Bank of India, India's largest bank, as the majority stakeholder. In March 2020, SBI Card was listed on BSE and NSE. Today, SBI Card is India’s largest pure-play credit card issuer with over 19.5 million cards in force, as of September 2024. Its wide arra

Bank of America Merrill Lynch

From local communities to global markets, we are dedicated to shaping the future responsibly and helping clients thrive in a changing world. “Bank of America Merrill Lynch” is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Bank of America is

Revolut

People deserve more from their money. More visibility, more control, and more freedom. Since 2015, Revolut has been on a mission to deliver just that. Our powerhouse of products help our 50+ million customers get more from their money every day. As we continue our lightning-fast growth,‌ 2 things a

Capital One

At Capital One, we're making things better for our customers and associates through innovation and collaboration. We were founded on the belief that everyone deserves financial freedom—and are dedicated to a world where all have equal opportunity to prosper. Banking is in our DNA, but we are so mu

Raymond James

Founded in 1962 and a public company since 1983, Raymond James Financial, Inc. is a Florida-based diversified holding company providing financial services to individuals, corporations and municipalities through its subsidiary companies engaged primarily in investment and financial planning, in addit

HDB Financial Services Ltd.

HDB Financial Services (HDBFS) is a leading Non-Banking Financial Company (NBFC) that caters to the growing needs of an Aspirational India, serving both Individual & Business Clients The lines of business include - Lending and BPO Services. Incorporated in 2007, HDB is a well-established business wi

newsone

Coinbase CyberSecurity News

November 22, 2025 05:14 PM
Coinbase crypto exchange executes internal wallet migration

Crypto exchange Coinbase initiated a large fund migration on Saturday, moving tokens to new internal wallets in a scheduled, routine security procedure to...

November 22, 2025 04:45 PM
Coinbase crypto exchange executes internal wallet migration

Crypto exchange Coinbase initiated a large fund migration on Saturday, moving tokens to new internal wallets in a scheduled,...

November 05, 2025 08:00 AM
Coinbase CSO Philip Martin knows that security isn’t forever

Coinbase CSO Philip Martin shares how he secures one of the largest crypto exchanges in the US.

November 05, 2025 08:00 AM
Jones Day Hires Ex-Coinbase Associate GC In San Diego

Jones Day has added to its San Diego cybersecurity practice a former member of Coinbase's commercial litigation team, the firm announced.

November 04, 2025 08:00 AM
Cybersecurity professionals charged with turning to the dark side after FBI probe

A professional ransomware threat negotiator and an incident response (IR) professional have been charged with launching ransomware attacks.

November 03, 2025 08:00 AM
Kaspersky Flags Coinbase Phishing Scam Targeting Windows Users

The attackers lured victims into downloading software disguised as an account statement. Once installed, the software gave hackers access to...

November 03, 2025 08:00 AM
From Somali Refugee To Cybersecurity Trailblazer: How Yasmin Abdi Built A $95 Million Tech Empire

When Yasmin Abdi fled Somalia's war as a child, she could hardly have imagined that one day she would be protecting a billion people online.

October 20, 2025 07:00 AM
Cybersecurity spending is soaring. Here’s how investors can harness the sector’s growth

As attacks grow more sophisticated, cybersecurity firms innovate to defend while governments and corporations make commitments to spend.

October 10, 2025 07:00 AM
Phishing kit YYlaiyu impersonates 97 brands for fraud

Exclusive A Chinese-developed phishing kit hosted on thousands of domains and boasting 97 different brands to make criminals' scams look...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Coinbase CyberSecurity History Information

Official Website of Coinbase

The official website of Coinbase is http://www.coinbase.com.

Coinbase’s AI-Generated Cybersecurity Score

According to Rankiteo, Coinbase’s AI-generated cybersecurity score is 411, reflecting their Critical security posture.

How many security badges does Coinbase’ have ?

According to Rankiteo, Coinbase currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Coinbase have SOC 2 Type 1 certification ?

According to Rankiteo, Coinbase is not certified under SOC 2 Type 1.

Does Coinbase have SOC 2 Type 2 certification ?

According to Rankiteo, Coinbase does not hold a SOC 2 Type 2 certification.

Does Coinbase comply with GDPR ?

According to Rankiteo, Coinbase is not listed as GDPR compliant.

Does Coinbase have PCI DSS certification ?

According to Rankiteo, Coinbase does not currently maintain PCI DSS compliance.

Does Coinbase comply with HIPAA ?

According to Rankiteo, Coinbase is not compliant with HIPAA regulations.

Does Coinbase have ISO 27001 certification ?

According to Rankiteo,Coinbase is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Coinbase

Coinbase operates primarily in the Financial Services industry.

Number of Employees at Coinbase

Coinbase employs approximately 6,751 people worldwide.

Subsidiaries Owned by Coinbase

Coinbase presently has no subsidiaries across any sectors.

Coinbase’s LinkedIn Followers

Coinbase’s official LinkedIn profile has approximately 1,220,202 followers.

NAICS Classification of Coinbase

Coinbase is classified under the NAICS code 52, which corresponds to Finance and Insurance.

Coinbase’s Presence on Crunchbase

Yes, Coinbase has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/coinbase.

Coinbase’s Presence on LinkedIn

Yes, Coinbase maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/coinbase.

Cybersecurity Incidents Involving Coinbase

As of December 04, 2025, Rankiteo reports that Coinbase has experienced 8 cybersecurity incidents.

Number of Peer and Competitor Companies

Coinbase has an estimated 29,885 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Coinbase ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

What was the total financial impact of these incidents on Coinbase ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $804.50 million.

How does Coinbase detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes, and communication strategy with notified affected customers, and incident response plan activated with yes (coinbase notified users/regulators, cut ties with involved parties), and containment measures with termination of 226 taskus employees, containment measures with severed ties with overseas agents, containment measures with tightened access controls, and remediation measures with strengthened global security protocols, remediation measures with enhanced training programs, and communication strategy with notified affected users, communication strategy with regulatory disclosures, communication strategy with public statements (limited details), and enhanced monitoring with yes (post-breach), and third party assistance with managed detection and response (mdr) providers, third party assistance with cybersecurity vendors (e.g., eset for encryption), and containment measures with isolation of compromised systems, containment measures with revocation of stolen credentials, containment measures with deployment of edr/xdr tools, and remediation measures with patch management, remediation measures with encryption of data at rest/in transit (aes-256), remediation measures with multi-factor authentication (mfa) enforcement, remediation measures with security awareness training, and recovery measures with data restoration from backups, recovery measures with system hardening, recovery measures with post-breach audits, and communication strategy with regulatory notifications (gdpr, etc.), communication strategy with customer advisories, communication strategy with transparency reports, and network segmentation with recommended as part of layered defense, and enhanced monitoring with via edr/xdr or mdr services, and and and containment measures with termination of compromised employees, containment measures with securing customer support tools, and remediation measures with offering $20m bounty for perpetrator information, remediation measures with reimbursing victims of related scams, remediation measures with enhanced monitoring for phishing attempts, and communication strategy with public blog post, communication strategy with sec 8-k filing, communication strategy with customer advisories warning of imposter scams, and and incident response plan activated with yes, and law enforcement notified with yes (u.s. justice department, sec), and containment measures with termination of involved employees, containment measures with enhanced security measures, and remediation measures with tracing stolen funds, remediation measures with flagging large withdrawals, remediation measures with $20m bounty for hacker information, remediation measures with reimbursement for scammed users, and communication strategy with breach notification letters to 69,461 victims, communication strategy with public disclosure via sec filing, communication strategy with media statements, and enhanced monitoring with yes (withdrawal monitoring, suspicious activity detection), and and containment measures with warning customers about social engineering risks, and remediation measures with bounty program for attacker information ($200m), and communication strategy with public disclosure, communication strategy with customer advisories on social engineering risks..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Coinbase Data Breach

Description: Attackers bribed customer service representatives in India to gain access to client data, including names, dates of birth, addresses, nationalities, government ID numbers, some banking data, and account details. The stolen information included personal details of high-profile executives like Sequoia Capital Managing Partner Roelof Botha. The attackers demanded $20 million from Coinbase to cover up the incident, which the company refused.

Type: Data Breach

Attack Vector: Insider Threat

Vulnerability Exploited: Human

Threat Actor: Unknown

Motivation: Financial

Incident : Data Breach

Title: Data Breach at Coinbase

Description: A data breach at Coinbase involving India-based customer support representatives from outsourcing firm TaskUs, who were bribed to steal data from the crypto exchange.

Date Detected: January 2025

Date Publicly Disclosed: May 15, 2025

Type: Data Breach

Attack Vector: Insider Threat

Vulnerability Exploited: Human

Threat Actor: Unknown

Motivation: Financial Gain

Incident : Data Disclosure

Title: Coinbase Data Disclosure Incident

Description: The Maine Office of the Attorney General reported that Coinbase, Inc. experienced an inadvertent disclosure of personal information on July 11, 2024, affecting 154 individuals in total, including 1 Maine resident. The incident involved a file containing transaction data, which included names, bank account numbers, and routing numbers, mistakenly uploaded to an external location, though there is no evidence of unauthorized access or identity theft.

Date Detected: 2024-07-11

Type: Data Disclosure

Attack Vector: Inadvertent Disclosure

Incident : data breach

Title: Coinbase Data Breach via TaskUs Outsourcing Firm

Description: In May, Coinbase revealed that hackers stole personal data of thousands of clients, which was used to trick customers into handing over their cryptocurrency. The breach stemmed from rogue employees at TaskUs, an outsourcing firm in India. A court filing identified Ashita Mishra, a TaskUs employee, as a key suspect who stole confidential customer data (including Social Security numbers and bank account information) and sold it to hackers. The data was used to impersonate Coinbase employees and defraud victims. Over 69,000 customers were impacted, with Coinbase estimating costs up to $400 million. The breach involved a 'sophisticated hub-and-spoke conspiracy' with multiple TaskUs employees, including team leaders, participating in the data theft for financial gain ($200 per stolen record). The masterminds were reportedly teenagers and young adults linked to a criminal collective called 'the Comm.' TaskUs and Coinbase have faced legal and reputational fallout, with allegations of concealment and inadequate response.

Date Detected: 2024-01

Date Publicly Disclosed: 2024-05

Type: data breach

Attack Vector: insider threat (malicious employees)data exfiltrationsocial engineering (impersonation)bribery/conspiracy

Vulnerability Exploited: lack of access controlsinadequate monitoring of employee activityweak insider threat detectionoutsourcing risks

Threat Actor: Ashita Mishra (TaskUs employee)unnamed accomplices (TaskUs employees, including team leaders)criminal collective 'the Comm' (teenagers/young adults)

Motivation: financial gain

Incident : Data Breach (General Discussion)

Title: None

Description: The article discusses the growing threat landscape and the critical importance of data encryption in protecting sensitive information. It highlights risks such as remote working, data explosion, device loss/theft, third-party threats, underperforming security (e.g., credential abuse, phishing, infostealers), ransomware, insecure communications, and insider threats. The average cost of a data breach in 2025 is estimated at $4.5 million, with potential financial, reputational, and compliance repercussions. The article emphasizes the need for robust encryption (e.g., AES-256), multi-layered security strategies (e.g., MFA, EDR/XDR, MDR), and proactive defense measures to mitigate risks.

Type: Data Breach (General Discussion)

Attack Vector: Stolen/Phished Credentials (22% of breaches)Phishing (16% of breaches)Infostealer Malware (75% of 3.2B compromised credentials in 2024)Ransomware (44% of breaches, 37% annual increase)Unsecured Remote/Hybrid Work DevicesInsecure Email CommunicationsInsider Threats (18% of breaches globally, 29% in EMEA)

Vulnerability Exploited: Lack of Encryption (Data at Rest/In Transit)Weak or Stolen CredentialsUnpatched SystemsInsecure Remote Work ToolsLack of Multi-Factor Authentication (MFA)Poor Endpoint SecurityUnsecured Email Channels

Threat Actor: Cybercriminal Groups (Ransomware Operators)State-Sponsored Actors (Implied)Insider Threats (Malicious/Accidental)Initial Access Brokers (IABs)Infostealer Malware Operators

Motivation: Financial Gain (Ransomware, Data Theft for Sale)Espionage (Theft of IP, M&A Plans)Disruption (Operational Downtime)Reputation DamageCredential Harvesting (For Resale or Further Attacks)

Incident : Data Breach

Title: Coinbase Extortion Attempt Involving Stolen Customer Data

Description: Cryptocurrency trading platform Coinbase disclosed an extortion attempt by an unknown threat actor who demanded $20 million in exchange for not publishing stolen customer data. The attackers targeted overseas customer support agents, bribing a small group to copy data from customer support tools affecting fewer than 1% of Coinbase’s monthly transacting users (~97,000 users). The stolen data included names, addresses, phone numbers, email addresses, masked SSN/tax ID digits, bank account details, government ID images, transaction histories, and limited corporate data. Coinbase refused to pay the ransom and is offering a $20 million bounty for information leading to the arrest of the perpetrators. The company estimates remediation costs between $180 million and $400 million.

Date Publicly Disclosed: 2023-05-11

Type: Data Breach

Attack Vector: Social EngineeringBribery of InsidersData Exfiltration

Vulnerability Exploited: Human vulnerability (bribery of customer support agents)

Threat Actor: Unknown threat actor (extortionist)

Motivation: Financial gain (extortion and potential fraud via phishing/scams)

Incident : Data Breach

Title: Coinbase Data Breach (December 2024)

Description: Cryptocurrency platform Coinbase disclosed a data breach affecting 69,461 individuals, where cybercriminals bribed overseas support agents (allegedly in India) to steal customer data, including photos of passports, government IDs, names, dates of birth, partial Social Security numbers, bank account details, and transaction histories. The breach was publicly disclosed in May 2025 after an extortion attempt of $20 million was rejected. The incident led to social engineering attacks targeting victims, with Coinbase pledging reimbursements for scammed users and implementing measures like fund tracing, withdrawal monitoring, and a $20 million bounty for information on the hackers. The U.S. Justice Department is investigating the breach, which Coinbase estimates will cost $180 million to $400 million in remediation.

Date Detected: December 2024

Date Publicly Disclosed: May 2025

Type: Data Breach

Attack Vector: Bribery of Support AgentsInsider ThreatExtortionSocial Engineering

Vulnerability Exploited: Human vulnerability (bribery of overseas support agents)

Threat Actor: Cybercriminals (allegedly based in India)

Motivation: Financial GainExtortionFraud (social engineering)

Incident : Data Breach

Title: Coinbase Customer Data Breach via Insider Threat

Description: Major U.S. cryptocurrency exchange Coinbase confirmed that fewer than 1% of its customers had their data compromised by threat actors who bribed its overseas customer service support agents for systems access. The breach enabled exfiltration of customers' names, phone numbers, home addresses, email addresses, masked bank account numbers, the last four digits of Social Security numbers, government ID images, and certain corporate data. Private keys, credentials, or funds were not compromised. Coinbase warned customers of imminent social engineering attacks and refused to pay a $200 million ransom, instead placing the amount in a bounty program for information leading to the arrest or conviction of the attackers.

Type: Data Breach

Attack Vector: Bribery of InsidersUnauthorized Systems Access

Vulnerability Exploited: Weak Insider Threat DetectionInadequate Access Governance

Threat Actor: Unknown (Bribed Insiders)External Attackers

Motivation: Financial GainData Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Customer Service Representatives, Insider Threat, TaskUs Indore service center (India), Stolen Credentials (22% of breaches)Phishing (16% of breaches)Infostealer Malware (75% of 3.2B credentials in 2024)Unpatched VulnerabilitiesThird-Party Compromises, Customer support agents (bribed insiders in India), Bribed overseas support agents (India) and Bribed overseas customer service support agents.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach COI320051825

Data Compromised: Names, Dates of birth, Addresses, Nationalities, Government id numbers, Some banking data, Account details

Brand Reputation Impact: Significant

Identity Theft Risk: High

Payment Information Risk: High

Incident : Data Breach COI739060625

Financial Loss: Up to $400 million

Data Compromised: Names, Emails, Partial financial information, Ssn, Transaction history, Id document scans

Systems Affected: Customer support systems

Incident : Data Disclosure COI817072525

Data Compromised: Names, Bank account numbers, Routing numbers

Incident : data breach COI5902859091725

Financial Loss: $400 million (estimated cost to Coinbase)

Data Compromised: Social security numbers, Bank account information, Customer account details

Systems Affected: TaskUs internal systems (Indore, India service center)Coinbase customer support databases

Operational Impact: termination of 226 TaskUs employeessevered ties with involved personnelinvestigation disruptions

Customer Complaints: multiple (class-action lawsuits filed)

Brand Reputation Impact: severe damage due to largest breach in Coinbase historypublic distrust in outsourcing securitylegal scrutiny

Legal Liabilities: class-action lawsuits (e.g., Greenbaum Olbrantz)regulatory investigationspotential fines

Identity Theft Risk: high (SSNs and bank details exposed)

Payment Information Risk: high (bank account information compromised)

Incident : Data Breach (General Discussion) COI4811148110425

Financial Loss: $4.5 million (average cost per breach in 2025; potential for higher losses depending on data type)

Data Compromised: Personally identifiable information (pii), Intellectual property (ip), Financial data, Mergers & acquisitions (m&a) plans, Customer data, Sensitive corporate data

Operational Impact: Potential disruption due to ransomware or data loss

Revenue Loss: Significant (linked to lost business and reputational damage)

Customer Complaints: High risk (94% of organizations report customers would avoid them post-breach)

Brand Reputation Impact: Severe (long-term trust erosion)

Legal Liabilities: Fines for Non-Compliance (GDPR, HIPAA, CCPA, PCI DSS 4.0, DORA, NIS2)Lawsuits from Affected Parties

Identity Theft Risk: High (due to PII exposure)

Payment Information Risk: High (financial data targeted)

Incident : Data Breach COI0262702111725

Data Compromised: Names, Addresses, Phone numbers, Email addresses, Masked last 4 digits of ssn/tax ids, Encoded bank account numbers, Government id images (e.g., driver’s licenses), Transaction histories, Limited corporate data

Systems Affected: Customer support tools

Operational Impact: Termination of compromised employees; ongoing investigation and remediation

Brand Reputation Impact: Potential reputational damage due to data breach and extortion attempt; proactive communication to mitigate trust erosion

Identity Theft Risk: High (due to PII exposure, including government IDs and transaction histories)

Payment Information Risk: Low (no login credentials, 2FA codes, or private keys compromised)

Incident : Data Breach COI4173641112625

Data Compromised: Photos of passports, Government ids, Names, Dates of birth, Last four digits of social security numbers, Bank account numbers, Account information (balances, transaction history)

Operational Impact: Increased security measures, fund tracing, withdrawal monitoring, $20M bounty program

Customer Complaints: Expected (69,461 breach notifications sent)

Brand Reputation Impact: High (public disclosure, regulatory filings, media coverage, association with kidnapping/violence risks in crypto industry)

Legal Liabilities: Potential (U.S. Justice Department investigation, SEC filing, regulatory scrutiny)

Identity Theft Risk: High (PII exposed, social engineering attacks reported)

Payment Information Risk: High (bank account numbers exposed)

Incident : Data Breach COI0985509112725

Systems Affected: Customer Support Systems

Brand Reputation Impact: High (Potential loss of trust due to insider breach and data exposure)

Identity Theft Risk: High (Exposed PII including SSN digits, addresses, and government IDs)

Payment Information Risk: Moderate (Masked bank account numbers exposed)

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $100.56 million.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, Banking Data, Account Details, , Names, Emails, Partial Financial Information, Ssn, Transaction History, Id Document Scans, , Names, Bank Account Numbers, Routing Numbers, , Personally Identifiable Information (Pii), Financial Data, Account Credentials, , Pii, Financial Records, Intellectual Property, M&A Plans, Customer Data, Credentials (Usernames/Passwords), , Pii (Personally Identifiable Information), Financial Data (Masked), Government-Issued Ids, Transaction Histories, Corporate Data, , Personally Identifiable Information (Pii), Financial Data, Account Information, , Personal Identifiable Information (Pii), Contact Information, Financial Data (Masked), Government Id Images, Corporate Data and .

Which entities were affected by each incident ?

Incident : Data Breach COI320051825

Entity Name: Coinbase

Entity Type: Company

Industry: Cryptocurrency

Location: Global

Incident : Data Breach COI739060625

Entity Name: Coinbase

Entity Type: Cryptocurrency Exchange

Industry: Financial Services

Location: Global

Customers Affected: 70,000

Incident : Data Breach COI739060625

Entity Name: TaskUs

Entity Type: Outsourcing Firm

Industry: Business Process Outsourcing

Location: Indore, India

Incident : Data Disclosure COI817072525

Entity Name: Coinbase, Inc.

Entity Type: Company

Industry: Financial Services

Customers Affected: 154

Incident : data breach COI5902859091725

Entity Name: Coinbase

Entity Type: cryptocurrency exchange

Industry: financial services (cryptocurrency)

Location: United States

Size: large (publicly traded)

Customers Affected: 69,000+

Incident : data breach COI5902859091725

Entity Name: TaskUs

Entity Type: outsourcing firm

Industry: customer service/BPO

Location: United States (HQ)India (Indore service center)

Size: publicly traded

Incident : Data Breach (General Discussion) COI4811148110425

Entity Type: Global Businesses, SMEs, Enterprises with Remote/Hybrid Workforces, Companies Handling Sensitive Data (PII, IP, Financial)

Industry: All (cross-sector)

Location: Global (with specific mention of US and EMEA)

Customers Affected: 1.3 billion (US breach notifications in 2024)

Incident : Data Breach COI0262702111725

Entity Name: Coinbase

Entity Type: Cryptocurrency Exchange

Industry: Financial Services (Cryptocurrency)

Location: United States (global operations)

Size: Large (9.7M monthly transacting users; ~$67B market cap as of May 2023)

Customers Affected: Fewer than 100,000 (less than 1% of monthly transacting users)

Incident : Data Breach COI4173641112625

Entity Name: Coinbase

Entity Type: Cryptocurrency Exchange Platform

Industry: Financial Services (Cryptocurrency)

Location: United States (global operations)

Size: Large (publicly traded, millions of users)

Customers Affected: 69,461

Incident : Data Breach COI0985509112725

Entity Name: Coinbase

Entity Type: Cryptocurrency Exchange

Industry: Financial Services (Cryptocurrency)

Location: United States

Size: Large

Customers Affected: Fewer than 1% of total customers

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach COI739060625

Law Enforcement Notified: Yes

Communication Strategy: Notified affected customers

Incident : data breach COI5902859091725

Incident Response Plan Activated: yes (Coinbase notified users/regulators, cut ties with involved parties)

Containment Measures: termination of 226 TaskUs employeessevered ties with overseas agentstightened access controls

Remediation Measures: strengthened global security protocolsenhanced training programs

Communication Strategy: notified affected usersregulatory disclosurespublic statements (limited details)

Enhanced Monitoring: yes (post-breach)

Incident : Data Breach (General Discussion) COI4811148110425

Third Party Assistance: Managed Detection And Response (Mdr) Providers, Cybersecurity Vendors (E.G., Eset For Encryption).

Containment Measures: Isolation of Compromised SystemsRevocation of Stolen CredentialsDeployment of EDR/XDR Tools

Remediation Measures: Patch ManagementEncryption of Data at Rest/In Transit (AES-256)Multi-Factor Authentication (MFA) EnforcementSecurity Awareness Training

Recovery Measures: Data Restoration from BackupsSystem HardeningPost-Breach Audits

Communication Strategy: Regulatory Notifications (GDPR, etc.)Customer AdvisoriesTransparency Reports

Network Segmentation: Recommended as part of layered defense

Enhanced Monitoring: Via EDR/XDR or MDR Services

Incident : Data Breach COI0262702111725

Incident Response Plan Activated: True

Containment Measures: Termination of compromised employeesSecuring customer support tools

Remediation Measures: Offering $20M bounty for perpetrator informationReimbursing victims of related scamsEnhanced monitoring for phishing attempts

Communication Strategy: Public blog postSEC 8-K filingCustomer advisories warning of imposter scams

Incident : Data Breach COI4173641112625

Incident Response Plan Activated: Yes

Law Enforcement Notified: Yes (U.S. Justice Department, SEC)

Containment Measures: Termination of involved employeesEnhanced security measures

Remediation Measures: Tracing stolen fundsFlagging large withdrawals$20M bounty for hacker informationReimbursement for scammed users

Communication Strategy: Breach notification letters to 69,461 victimsPublic disclosure via SEC filingMedia statements

Enhanced Monitoring: Yes (withdrawal monitoring, suspicious activity detection)

Incident : Data Breach COI0985509112725

Incident Response Plan Activated: True

Containment Measures: Warning customers about social engineering risks

Remediation Measures: Bounty program for attacker information ($200M)

Communication Strategy: Public disclosureCustomer advisories on social engineering risks

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes, .

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Managed Detection and Response (MDR) Providers, Cybersecurity Vendors (e.g., ESET for encryption), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach COI320051825

Type of Data Compromised: Personally identifiable information, Banking data, Account details

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Data Breach COI739060625

Type of Data Compromised: Names, Emails, Partial financial information, Ssn, Transaction history, Id document scans

Number of Records Exposed: 70,000

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Data Disclosure COI817072525

Type of Data Compromised: Names, Bank account numbers, Routing numbers

Number of Records Exposed: 154

Sensitivity of Data: High

Incident : data breach COI5902859091725

Type of Data Compromised: Personally identifiable information (pii), Financial data, Account credentials

Number of Records Exposed: 69,000+

Sensitivity of Data: high (SSNs, bank accounts)

Data Exfiltration: yes (via photos of customer accounts, sold to hackers)

File Types Exposed: screenshots/photos of customer accountsdatabases

Personally Identifiable Information: Social Security numbersnamesbank account details

Incident : Data Breach (General Discussion) COI4811148110425

Type of Data Compromised: Pii, Financial records, Intellectual property, M&a plans, Customer data, Credentials (usernames/passwords)

Number of Records Exposed: 1.3 billion (US breach notifications in 2024)

Sensitivity of Data: High (includes PII, financial, and corporate secrets)

Data Exfiltration: Common (especially in ransomware and credential theft)

Data Encryption: {'lack_of_encryption': 'Primary vulnerability in 87% of breaches (per IBM 2025 report)', 'recommended_solutions': ['AES-256 for Full-Disk Encryption (FDE)', 'Email Encryption', 'Cloud/Database Encryption', 'Removable Media Encryption']}

File Types Exposed: DatabasesEmails/AttachmentsCorporate DocumentsSource Code/IP Files

Personally Identifiable Information: Frequently targeted (e.g., names, addresses, SSNs)

Incident : Data Breach COI0262702111725

Type of Data Compromised: Pii (personally identifiable information), Financial data (masked), Government-issued ids, Transaction histories, Corporate data

Number of Records Exposed: Fewer than 100,000

Sensitivity of Data: High (includes government IDs and transaction histories)

File Types Exposed: Customer recordsImages (IDs)Transaction logs

Incident : Data Breach COI4173641112625

Type of Data Compromised: Personally identifiable information (pii), Financial data, Account information

Number of Records Exposed: 69,461

Sensitivity of Data: High (government IDs, partial SSNs, bank accounts, transaction histories)

Data Exfiltration: Yes

File Types Exposed: Images (passport/ID photos)Textual data (names, DOBs, SSN fragments, bank details)

Personally Identifiable Information: Yes (names, DOBs, SSN fragments, government IDs, passport photos)

Incident : Data Breach COI0985509112725

Type of Data Compromised: Personal identifiable information (pii), Contact information, Financial data (masked), Government id images, Corporate data

Number of Records Exposed: Fewer than 1% of Coinbase customers (exact number undisclosed)

Sensitivity of Data: High

Personally Identifiable Information: NamesPhone NumbersHome AddressesEmail AddressesLast four digits of Social Security NumbersGovernment ID Images

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: strengthened global security protocols, enhanced training programs, , Patch Management, Encryption of Data at Rest/In Transit (AES-256), Multi-Factor Authentication (MFA) Enforcement, Security Awareness Training, , Offering $20M bounty for perpetrator information, Reimbursing victims of related scams, Enhanced monitoring for phishing attempts, , Tracing stolen funds, Flagging large withdrawals, $20M bounty for hacker information, Reimbursement for scammed users, , Bounty program for attacker information ($200M), .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by termination of 226 taskus employees, severed ties with overseas agents, tightened access controls, , isolation of compromised systems, revocation of stolen credentials, deployment of edr/xdr tools, , termination of compromised employees, securing customer support tools, , termination of involved employees, enhanced security measures, , warning customers about social engineering risks and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach COI320051825

Ransom Demanded: $20 million

Ransom Paid: No

Incident : Data Breach COI739060625

Ransom Demanded: $20,000,000

Ransom Paid: No

Incident : Data Breach (General Discussion) COI4811148110425

Data Encryption: Used by attackers to lock systems (44% of breaches in 2024)

Data Exfiltration: Double extortion common (data stolen before encryption)

Incident : Data Breach COI0262702111725

Ransom Demanded: $20,000,000 (extortion, not ransomware)

Data Exfiltration: True

Incident : Data Breach COI4173641112625

Ransom Demanded: $20,000,000 (extortion attempt)

Ransom Paid: No

Data Encryption: No

Data Exfiltration: Yes

Incident : Data Breach COI0985509112725

Ransom Demanded: $200 million

Data Exfiltration: True

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Data Restoration from Backups, System Hardening, Post-Breach Audits, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : data breach COI5902859091725

Legal Actions: class-action lawsuits (e.g., Greenbaum Olbrantz), consolidation of hack-related complaints,

Regulatory Notifications: yes (Coinbase notified regulators)

Incident : Data Breach (General Discussion) COI4811148110425

Regulations Violated: GDPR (EU), HIPAA (US Healthcare), CCPA (California), PCI DSS 4.0 (Payment Card Industry), DORA (EU Digital Operational Resilience Act), NIS2 (EU Network and Information Security Directive),

Legal Actions: Potential lawsuits from affected customers/partners

Regulatory Notifications: Mandatory for breaches under GDPR, HIPAA, etc.

Incident : Data Breach COI0262702111725

Regulatory Notifications: SEC 8-K filing

Incident : Data Breach COI4173641112625

Legal Actions: U.S. Justice Department investigation, SEC filing,

Regulatory Notifications: Maine regulatorsSEC

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through class-action lawsuits (e.g., Greenbaum Olbrantz), consolidation of hack-related complaints, , Potential lawsuits from affected customers/partners, U.S. Justice Department investigation, SEC filing, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Breach COI320051825

Lessons Learned: High vulnerability of crypto executives and concern for their safety

Incident : data breach COI5902859091725

Lessons Learned: risks of outsourcing sensitive operations, need for stricter insider threat monitoring, importance of transparency in breach disclosures, consequences of delayed detection (breach started in September 2024 but disclosed in May 2025)

Incident : Data Breach (General Discussion) COI4811148110425

Lessons Learned: Encryption is critical but underutilized (only 87% of businesses increasing investment in 2024)., Multi-layered security (MFA, EDR/XDR, MDR) is essential to counter evolving threats., Remote/hybrid work expands the attack surface; endpoint security must be prioritized., Third-party risks and insider threats require continuous monitoring., Proactive threat hunting and real-time response reduce breach impact., Compliance with regulations (GDPR, NIS2, etc.) is non-negotiable and tied to cyber insurance eligibility.

Incident : Data Breach COI0262702111725

Lessons Learned: Vulnerability of insider threats, especially in overseas operations; importance of monitoring for bribery/social engineering risks among support agents; need for robust customer education on phishing scams post-breach.

Incident : Data Breach COI0985509112725

Lessons Learned: Importance of strengthening insider threat detection and access governance, especially in outsourced and globally distributed operations.

What recommendations were made to prevent future incidents ?

Incident : data breach COI5902859091725

Recommendations: implement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handlingimplement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handlingimplement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handlingimplement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handlingimplement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handlingimplement stricter access controls for third-party vendors, enhance employee monitoring (especially in high-risk regions), conduct regular audits of outsourced operations, improve incident response transparency, invest in insider threat detection tools, revaluate outsourcing partnerships for critical data handling

Incident : Data Breach (General Discussion) COI4811148110425

Recommendations: Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Deploy EDR/XDR solutions for cross-layer detection and response., Enforce MFA and strong access controls to mitigate credential abuse., Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Adopt MDR services if in-house resources are limited., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Develop and test an incident response plan with clear communication protocols., Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure.

Incident : Data Breach COI0262702111725

Recommendations: Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., Implement stricter access controls and logging for customer support tools., Enhance employee training on bribery and social engineering tactics., Proactively communicate with customers about potential scams following a breach., Consider proactive bounty programs to incentivize threat intelligence sharing.Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., Implement stricter access controls and logging for customer support tools., Enhance employee training on bribery and social engineering tactics., Proactively communicate with customers about potential scams following a breach., Consider proactive bounty programs to incentivize threat intelligence sharing.Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., Implement stricter access controls and logging for customer support tools., Enhance employee training on bribery and social engineering tactics., Proactively communicate with customers about potential scams following a breach., Consider proactive bounty programs to incentivize threat intelligence sharing.Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., Implement stricter access controls and logging for customer support tools., Enhance employee training on bribery and social engineering tactics., Proactively communicate with customers about potential scams following a breach., Consider proactive bounty programs to incentivize threat intelligence sharing.Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., Implement stricter access controls and logging for customer support tools., Enhance employee training on bribery and social engineering tactics., Proactively communicate with customers about potential scams following a breach., Consider proactive bounty programs to incentivize threat intelligence sharing.

Incident : Data Breach COI0985509112725

Recommendations: Enhance insider threat detection programs, Implement stricter access governance for third-party vendors, Conduct regular audits of customer support systems, Invest in employee training to prevent bribery and social engineering, Monitor dark web for exposed dataEnhance insider threat detection programs, Implement stricter access governance for third-party vendors, Conduct regular audits of customer support systems, Invest in employee training to prevent bribery and social engineering, Monitor dark web for exposed dataEnhance insider threat detection programs, Implement stricter access governance for third-party vendors, Conduct regular audits of customer support systems, Invest in employee training to prevent bribery and social engineering, Monitor dark web for exposed dataEnhance insider threat detection programs, Implement stricter access governance for third-party vendors, Conduct regular audits of customer support systems, Invest in employee training to prevent bribery and social engineering, Monitor dark web for exposed dataEnhance insider threat detection programs, Implement stricter access governance for third-party vendors, Conduct regular audits of customer support systems, Invest in employee training to prevent bribery and social engineering, Monitor dark web for exposed data

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are High vulnerability of crypto executives and concern for their safetyrisks of outsourcing sensitive operations,need for stricter insider threat monitoring,importance of transparency in breach disclosures,consequences of delayed detection (breach started in September 2024 but disclosed in May 2025)Encryption is critical but underutilized (only 87% of businesses increasing investment in 2024).,Multi-layered security (MFA, EDR/XDR, MDR) is essential to counter evolving threats.,Remote/hybrid work expands the attack surface; endpoint security must be prioritized.,Third-party risks and insider threats require continuous monitoring.,Proactive threat hunting and real-time response reduce breach impact.,Compliance with regulations (GDPR, NIS2, etc.) is non-negotiable and tied to cyber insurance eligibility.Vulnerability of insider threats, especially in overseas operations; importance of monitoring for bribery/social engineering risks among support agents; need for robust customer education on phishing scams post-breach.Importance of strengthening insider threat detection and access governance, especially in outsourced and globally distributed operations.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Enforce MFA and strong access controls to mitigate credential abuse., Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., conduct regular audits of outsourced operations, enhance employee monitoring (especially in high-risk regions), Deploy EDR/XDR solutions for cross-layer detection and response., Evaluate cyber insurance policies to ensure coverage aligns with risk exposure., Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Develop and test an incident response plan with clear communication protocols., Adopt MDR services if in-house resources are limited., invest in insider threat detection tools, improve incident response transparency, revaluate outsourcing partnerships for critical data handling, Conduct regular vulnerability assessments and patch management., Train employees on phishing, social engineering, and secure remote work practices., Monitor dark web for stolen credentials/data (e.g., via infostealer logs). and implement stricter access controls for third-party vendors.

References

Where can I find more information about each incident ?

Incident : Data Breach COI739060625

Source: Reuters

Incident : Data Breach COI739060625

Source: BleepingComputer

Incident : Data Disclosure COI817072525

Source: Maine Office of the Attorney General

Incident : data breach COI5902859091725

Source: Fortune

Incident : data breach COI5902859091725

Source: Class-action complaint by Greenbaum Olbrantz (amended filing)

Date Accessed: 2025-02

Incident : data breach COI5902859091725

Source: Coinbase regulatory filings

Incident : Data Breach (General Discussion) COI4811148110425

Source: IBM Cost of a Data Breach Report 2025

Incident : Data Breach (General Discussion) COI4811148110425

Source: Verizon Data Breach Investigations Report (DBIR)

Incident : Data Breach (General Discussion) COI4811148110425

Source: Cisco Consumer Privacy Survey

Incident : Data Breach (General Discussion) COI4811148110425

Source: ESET Encryption Solutions

Incident : Data Breach COI0262702111725

Source: Coinbase Blog Post

Date Accessed: 2023-05-11

Incident : Data Breach COI0262702111725

Source: Coinbase SEC 8-K Filing

Date Accessed: 2023-05-11

Incident : Data Breach COI0262702111725

Source: Fortune Magazine

URL: https://fortune.com

Date Accessed: 2023-05-11

Incident : Data Breach COI0262702111725

Source: The Block (Cryptocurrency News)

URL: https://www.theblock.co

Date Accessed: 2023-05-11

Incident : Data Breach COI4173641112625

Source: Bloomberg

Incident : Data Breach COI4173641112625

Source: Coinbase SEC Filing

Date Accessed: May 2025

Incident : Data Breach COI4173641112625

Source: Coinbase Breach Notification Letters

Date Accessed: May 2025

Incident : Data Breach COI0985509112725

Source: SiliconANGLE

Incident : Data Breach COI0985509112725

Source: Swimlane Lead Security Automation Architect Nick Tausek

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Reuters, and Source: BleepingComputer, and Source: Maine Office of the Attorney General, and Source: Fortune, and Source: Class-action complaint by Greenbaum Olbrantz (amended filing)Date Accessed: 2025-02, and Source: Coinbase regulatory filings, and Source: IBM Cost of a Data Breach Report 2025, and Source: Verizon Data Breach Investigations Report (DBIR), and Source: Cisco Consumer Privacy Survey, and Source: ESET Encryption Solutions, and Source: Coinbase Blog PostDate Accessed: 2023-05-11, and Source: Coinbase SEC 8-K FilingDate Accessed: 2023-05-11, and Source: Fortune MagazineUrl: https://fortune.comDate Accessed: 2023-05-11, and Source: The Block (Cryptocurrency News)Url: https://www.theblock.coDate Accessed: 2023-05-11, and Source: Bloomberg, and Source: Coinbase SEC FilingDate Accessed: May 2025, and Source: Coinbase Breach Notification LettersDate Accessed: May 2025, and Source: SiliconANGLE, and Source: Swimlane Lead Security Automation Architect Nick Tausek.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach COI739060625

Investigation Status: Ongoing

Incident : data breach COI5902859091725

Investigation Status: ongoing (legal proceedings, internal investigations by TaskUs/Coinbase)

Incident : Data Breach COI0262702111725

Investigation Status: Ongoing (cooperating with law enforcement)

Incident : Data Breach COI4173641112625

Investigation Status: Ongoing (U.S. Justice Department investigation)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified affected customers, Notified Affected Users, Regulatory Disclosures, Public Statements (Limited Details), Regulatory Notifications (Gdpr, Etc.), Customer Advisories, Transparency Reports, Public Blog Post, Sec 8-K Filing, Customer Advisories Warning Of Imposter Scams, Breach Notification Letters To 69,461 Victims, Public Disclosure Via Sec Filing, Media Statements, Public Disclosure and Customer Advisories On Social Engineering Risks.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach COI739060625

Customer Advisories: Notified nearly 70,000 customers

Incident : data breach COI5902859091725

Stakeholder Advisories: Coinbase Notified Affected Users And Regulators, Taskus Issued Statements On Security Enhancements.

Customer Advisories: Coinbase alerted impacted customers about the breach and potential fraud risks

Incident : Data Breach (General Discussion) COI4811148110425

Stakeholder Advisories: Businesses Should Audit Encryption Practices And Invest In Aes-256 Solutions., Regulators Emphasize Compliance With Dora, Nis2, Gdpr, Etc., To Avoid Fines., Cyber Insurance Providers May Deny Claims Without Proof Of Encryption/Mfa., Customers Demand Transparency Post-Breach; 94% Would Avoid Non-Compliant Companies..

Customer Advisories: Monitor financial accounts for fraud post-breach.Enable MFA on all personal/commercial accounts.Report suspicious emails (phishing) to IT teams.Use password managers to mitigate credential theft risks.

Incident : Data Breach COI0262702111725

Stakeholder Advisories: Warnings issued about imposter scams targeting customers; commitment to reimburse victims of related fraud.

Customer Advisories: Public advisory to expect imposters posing as Coinbase employees; reminder that Coinbase will never ask for passwords, 2FA codes, or fund transfers.

Incident : Data Breach COI4173641112625

Stakeholder Advisories: Breach notifications to 69,461 affected individuals, SEC disclosure

Customer Advisories: Sample breach notification letters warning of social engineering risks; reimbursement pledge for scammed users

Incident : Data Breach COI0985509112725

Stakeholder Advisories: Warning About Potential Social Engineering Attacks.

Customer Advisories: Notification of data breach and risks of follow-up attacks

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notified nearly 70,000 customers, Coinbase Notified Affected Users And Regulators, Taskus Issued Statements On Security Enhancements, Coinbase Alerted Impacted Customers About The Breach And Potential Fraud Risks, , Businesses Should Audit Encryption Practices And Invest In Aes-256 Solutions., Regulators Emphasize Compliance With Dora, Nis2, Gdpr, Etc., To Avoid Fines., Cyber Insurance Providers May Deny Claims Without Proof Of Encryption/Mfa., Customers Demand Transparency Post-Breach; 94% Would Avoid Non-Compliant Companies., Monitor Financial Accounts For Fraud Post-Breach., Enable Mfa On All Personal/Commercial Accounts., Report Suspicious Emails (Phishing) To It Teams., Use Password Managers To Mitigate Credential Theft Risks., , Warnings issued about imposter scams targeting customers; commitment to reimburse victims of related fraud., Public advisory to expect imposters posing as Coinbase employees; reminder that Coinbase will never ask for passwords, 2FA codes, or fund transfers., Breach notifications to 69,461 affected individuals, SEC disclosure, Sample breach notification letters warning of social engineering risks; reimbursement pledge for scammed users, Warning About Potential Social Engineering Attacks, Notification Of Data Breach And Risks Of Follow-Up Attacks and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach COI320051825

Entry Point: Customer Service Representatives

High Value Targets: Sequoia Capital Managing Partner Roelof Botha,

Data Sold on Dark Web: Sequoia Capital Managing Partner Roelof Botha,

Incident : Data Breach COI739060625

Entry Point: Insider Threat

Incident : data breach COI5902859091725

Entry Point: TaskUs Indore service center (India)

Reconnaissance Period: potentially months (breach started in September 2024, detected in January 2025)

High Value Targets: Coinbase Customer Pii, Financial Data,

Data Sold on Dark Web: Coinbase Customer Pii, Financial Data,

Incident : Data Breach (General Discussion) COI4811148110425

Entry Point: Stolen Credentials (22% Of Breaches), Phishing (16% Of Breaches), Infostealer Malware (75% Of 3.2B Credentials In 2024), Unpatched Vulnerabilities, Third-Party Compromises,

Backdoors Established: Common in ransomware attacks

High Value Targets: Pii Databases, Financial Systems, Intellectual Property, Executive/Hr Data,

Data Sold on Dark Web: Pii Databases, Financial Systems, Intellectual Property, Executive/Hr Data,

Incident : Data Breach COI0262702111725

Entry Point: Customer support agents (bribed insiders in India)

High Value Targets: Customer PII and transaction data

Data Sold on Dark Web: Customer PII and transaction data

Incident : Data Breach COI4173641112625

Entry Point: Bribed overseas support agents (India)

High Value Targets: Coinbase customer data (PII, financial records)

Data Sold on Dark Web: Coinbase customer data (PII, financial records)

Incident : Data Breach COI0985509112725

Entry Point: Bribed overseas customer service support agents

High Value Targets: Customer Pii, Corporate Data,

Data Sold on Dark Web: Customer Pii, Corporate Data,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach COI320051825

Root Causes: Insider Threat

Incident : Data Breach COI739060625

Root Causes: Insider Threat

Incident : data breach COI5902859091725

Root Causes: Insufficient Oversight Of Outsourced Employees, Lack Of Monitoring For Data Exfiltration (E.G., Screenshots), Cultural/Compliance Gaps In Offshore Operations, Delayed Breach Detection (September 2024 To January 2025), Conspiracy Involving Multiple Employees (Including Managers),

Corrective Actions: Termination Of Involved Personnel, Strengthened Security Protocols And Training, Severed Ties With High-Risk Vendors, Legal Defense Against Lawsuits,

Incident : Data Breach (General Discussion) COI4811148110425

Root Causes: Lack Of Encryption (Data At Rest/In Transit), Weak Credential Hygiene (No Mfa, Password Reuse), Unpatched Software, Insufficient Endpoint Protection, Poor Employee Training (Phishing Susceptibility), Over-Reliance On Perimeter Security,

Corrective Actions: Mandate Aes-256 Encryption For All Sensitive Data., Deploy Edr/Xdr And Mdr For 24/7 Monitoring., Enforce Mfa And Password Managers Enterprise-Wide., Conduct Regular Red Team Exercises To Test Defenses., Implement Zero-Trust Architecture Principles., Partner With Threat Intelligence Providers To Track Stolen Data., Review Cyber Insurance Policies Annually.,

Incident : Data Breach COI0262702111725

Root Causes: Insufficient Safeguards Against Insider Threats (Bribery Vulnerability), Lack Of Real-Time Monitoring For Unauthorized Data Copying In Support Tools, Geographic Risk Concentration (Overseas Support Agents Targeted),

Corrective Actions: Termination Of Compromised Employees, Enhanced Monitoring And Access Controls For Support Tools, $20M Bounty For Perpetrator Information, Customer Reimbursement Policy For Scam Victims,

Incident : Data Breach COI4173641112625

Root Causes: Insider Threat (Bribed Support Agents), Inadequate Access Controls/Monitoring For Support Personnel,

Corrective Actions: Termination Of Involved Employees, Enhanced Security Measures, $20M Bounty Program, Withdrawal Monitoring,

Incident : Data Breach COI0985509112725

Root Causes: Inadequate Insider Threat Detection, Weak Access Controls For Third-Party Support Agents, Lack Of Oversight For Overseas Operations,

Corrective Actions: Bounty Program For Attacker Information, Customer Notifications And Advisories,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as yes (post-breach), Managed Detection And Response (Mdr) Providers, Cybersecurity Vendors (E.G., Eset For Encryption), , Via EDR/XDR or MDR Services, , Yes (withdrawal monitoring, suspicious activity detection).

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Termination Of Involved Personnel, Strengthened Security Protocols And Training, Severed Ties With High-Risk Vendors, Legal Defense Against Lawsuits, , Mandate Aes-256 Encryption For All Sensitive Data., Deploy Edr/Xdr And Mdr For 24/7 Monitoring., Enforce Mfa And Password Managers Enterprise-Wide., Conduct Regular Red Team Exercises To Test Defenses., Implement Zero-Trust Architecture Principles., Partner With Threat Intelligence Providers To Track Stolen Data., Review Cyber Insurance Policies Annually., , Termination Of Compromised Employees, Enhanced Monitoring And Access Controls For Support Tools, $20M Bounty For Perpetrator Information, Customer Reimbursement Policy For Scam Victims, , Termination Of Involved Employees, Enhanced Security Measures, $20M Bounty Program, Withdrawal Monitoring, , Bounty Program For Attacker Information, Customer Notifications And Advisories, .

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was $20 million.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Unknown, Unknown, Ashita Mishra (TaskUs employee)unnamed accomplices (TaskUs employees, including team leaders)criminal collective 'the Comm' (teenagers/young adults), Cybercriminal Groups (Ransomware Operators)State-Sponsored Actors (Implied)Insider Threats (Malicious/Accidental)Initial Access Brokers (IABs)Infostealer Malware Operators, Unknown threat actor (extortionist), Cybercriminals (allegedly based in India) and Unknown (Bribed Insiders)External Attackers.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on January 2025.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on May 2025.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was $4.5 million (average cost per breach in 2025; potential for higher losses depending on data type).

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of birth, Addresses, Nationalities, Government ID numbers, Some banking data, Account details, , names, emails, partial financial information, SSN, transaction history, ID document scans, , names, bank account numbers, routing numbers, , Social Security numbers, bank account information, customer account details, , Personally Identifiable Information (PII), Intellectual Property (IP), Financial Data, Mergers & Acquisitions (M&A) Plans, Customer Data, Sensitive Corporate Data, , Names, Addresses, Phone numbers, Email addresses, Masked last 4 digits of SSN/tax IDs, Encoded bank account numbers, Government ID images (e.g., driver’s licenses), Transaction histories, Limited corporate data, , Photos of passports, Government IDs, Names, Dates of birth, Last four digits of Social Security numbers, Bank account numbers, Account information (balances, transaction history), and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were TaskUs internal systems (Indore, India service center)Coinbase customer support databases and Customer support tools and Customer Support Systems.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was managed detection and response (mdr) providers, cybersecurity vendors (e.g., eset for encryption), .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were termination of 226 TaskUs employeessevered ties with overseas agentstightened access controls, Isolation of Compromised SystemsRevocation of Stolen CredentialsDeployment of EDR/XDR Tools, Termination of compromised employeesSecuring customer support tools, Termination of involved employeesEnhanced security measures and Warning customers about social engineering risks.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were transaction history, names, Account information (balances, transaction history), Customer Data, Photos of passports, ID document scans, customer account details, Encoded bank account numbers, Dates of birth, Transaction histories, routing numbers, bank account information, Government IDs, Government ID images (e.g., driver’s licenses), Addresses, Sensitive Corporate Data, Financial Data, Intellectual Property (IP), Mergers & Acquisitions (M&A) Plans, partial financial information, emails, Phone numbers, Limited corporate data, SSN, Government ID numbers, Some banking data, Bank account numbers, Masked last 4 digits of SSN/tax IDs, Nationalities, Names, bank account numbers, Social Security numbers, Personally Identifiable Information (PII), Account details, Last four digits of Social Security numbers and Email addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.3B.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $200 million.

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was class-action lawsuits (e.g., Greenbaum Olbrantz), consolidation of hack-related complaints, , Potential lawsuits from affected customers/partners, U.S. Justice Department investigation, SEC filing, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Compliance with regulations (GDPR, NIS2, etc.) is non-negotiable and tied to cyber insurance eligibility., Vulnerability of insider threats, especially in overseas operations; importance of monitoring for bribery/social engineering risks among support agents; need for robust customer education on phishing scams post-breach., Importance of strengthening insider threat detection and access governance, especially in outsourced and globally distributed operations.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Strengthen insider threat detection programs, particularly for overseas employees with access to sensitive data., conduct regular audits of outsourced operations, enhance employee monitoring (especially in high-risk regions), Evaluate cyber insurance policies to ensure coverage aligns with risk exposure., Implement stricter access governance for third-party vendors, revaluate outsourcing partnerships for critical data handling, Train employees on phishing, social engineering, and secure remote work practices., Enhance insider threat detection programs, Ensure compliance with sector-specific regulations (GDPR, HIPAA, etc.)., Deploy EDR/XDR solutions for cross-layer detection and response., Implement AES-256 encryption for data at rest and in transit (FDE, email, cloud, removable media)., Implement stricter access controls and logging for customer support tools., Monitor dark web for exposed data, invest in insider threat detection tools, improve incident response transparency, Monitor dark web for stolen credentials/data (e.g., via infostealer logs)., Proactively communicate with customers about potential scams following a breach., Enforce MFA and strong access controls to mitigate credential abuse., Adopt MDR services if in-house resources are limited., Conduct regular vulnerability assessments and patch management., Enhance employee training on bribery and social engineering tactics., Consider proactive bounty programs to incentivize threat intelligence sharing., implement stricter access controls for third-party vendors, Conduct regular audits of customer support systems, Develop and test an incident response plan with clear communication protocols. and Invest in employee training to prevent bribery and social engineering.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are SiliconANGLE, IBM Cost of a Data Breach Report 2025, Maine Office of the Attorney General, ESET Encryption Solutions, BleepingComputer, Coinbase regulatory filings, The Block (Cryptocurrency News), Verizon Data Breach Investigations Report (DBIR), Reuters, Class-action complaint by Greenbaum Olbrantz (amended filing), Fortune Magazine, Coinbase SEC Filing, Bloomberg, Coinbase Breach Notification Letters, Cisco Consumer Privacy Survey, Swimlane Lead Security Automation Architect Nick Tausek, Coinbase Blog Post, Fortune and Coinbase SEC 8-K Filing.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://fortune.com, https://www.theblock.co .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Coinbase notified affected users and regulators, TaskUs issued statements on security enhancements, Businesses should audit encryption practices and invest in AES-256 solutions., Regulators emphasize compliance with DORA, NIS2, GDPR, etc., to avoid fines., Cyber insurance providers may deny claims without proof of encryption/MFA., Customers demand transparency post-breach; 94% would avoid non-compliant companies., Warnings issued about imposter scams targeting customers; commitment to reimburse victims of related fraud., Breach notifications to 69,461 affected individuals, SEC disclosure, Warning about potential social engineering attacks, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Notified nearly 70,000 customers, Coinbase alerted impacted customers about the breach and potential fraud risks, Monitor financial accounts for fraud post-breach.Enable MFA on all personal/commercial accounts.Report suspicious emails (phishing) to IT teams.Use password managers to mitigate credential theft risks., Public advisory to expect imposters posing as Coinbase employees; reminder that Coinbase will never ask for passwords, 2FA codes, or fund transfers., Sample breach notification letters warning of social engineering risks; reimbursement pledge for scammed users and Notification of data breach and risks of follow-up attacks.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an TaskUs Indore service center (India), Bribed overseas customer service support agents, Bribed overseas support agents (India), Customer support agents (bribed insiders in India), Customer Service Representatives and Insider Threat.

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was potentially months (breach started in September 2024, detected in January 2025).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insider Threat, Insider Threat, insufficient oversight of outsourced employeeslack of monitoring for data exfiltration (e.g., screenshots)cultural/compliance gaps in offshore operationsdelayed breach detection (September 2024 to January 2025)conspiracy involving multiple employees (including managers), Lack of Encryption (Data at Rest/In Transit)Weak Credential Hygiene (No MFA, Password Reuse)Unpatched SoftwareInsufficient Endpoint ProtectionPoor Employee Training (Phishing Susceptibility)Over-Reliance on Perimeter Security, Insufficient safeguards against insider threats (bribery vulnerability)Lack of real-time monitoring for unauthorized data copying in support toolsGeographic risk concentration (overseas support agents targeted), Insider threat (bribed support agents)Inadequate access controls/monitoring for support personnel, Inadequate insider threat detectionWeak access controls for third-party support agentsLack of oversight for overseas operations.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was termination of involved personnelstrengthened security protocols and trainingsevered ties with high-risk vendorslegal defense against lawsuits, Mandate AES-256 encryption for all sensitive data.Deploy EDR/XDR and MDR for 24/7 monitoring.Enforce MFA and password managers enterprise-wide.Conduct regular red team exercises to test defenses.Implement zero-trust architecture principles.Partner with threat intelligence providers to track stolen data.Review cyber insurance policies annually., Termination of compromised employeesEnhanced monitoring and access controls for support tools$20M bounty for perpetrator informationCustomer reimbursement policy for scam victims, Termination of involved employeesEnhanced security measures$20M bounty programWithdrawal monitoring, Bounty program for attacker informationCustomer notifications and advisories.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=coinbase' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge