ChartModo logo ChartModo logo
Coinpaper 2025-12-30 05:30:00

Coinbase Support Scammer Steals $2 Million in Crypto

Hacken’s 2025 yearly security report also found that total Web3 losses rose to about $3.95 billion, up roughly $1.1 billion from 2024, with more than half of the losses linked to North Korean threat actors. The report shows that most losses were caused by access control failures and operational security weaknesses, like compromised keys and poor off-boarding practices, rather than smart contract bugs. ZachXBT Traces Coinbase Impersonation Scam A scammer posing as a Coinbase help desk worker allegedly stole more than $2 million in cryptocurrency from exchange users, according to blockchain investigator ZachXBT. In a post that was shared on X , ZachXBT said he was able to identify the individual by cross-referencing Telegram group screenshots, social media activity, and on-chain wallet transactions tied to the thefts. The investigator alleged that the suspect, described as a “Canadian threat actor,” carried out Coinbase support impersonation scams over the past year by using social engineering tactics to trick victims into believing they were speaking with a legitimate representative from Coinbase. According to ZachXBT, the stolen funds were allegedly spent on rare social media usernames, bottle service, and gambling. He also shared a leaked video showing the suspected scammer on a phone call with a victim, offering fake customer support. X post from ZachXBT While specific technical details of each incident were not shared, the scams reportedly relied on classic social engineering techniques, where attackers pose as trusted figures to gain victims’ confidence and extract sensitive information or convince them to make fraudulent transactions. ZachXBT said the suspect tried to cover his tracks by repeatedly purchasing expensive Telegram usernames and deleting old accounts, but left a trail through public posts and frequent boasting on social media. According to the investigator, this online behavior made it relatively easy to link accounts, wallets, and movements, despite the efforts to obscure them. ZachXBT also claimed to have identified the alleged scammer’s home address by using publicly available information, though he said he would not publish it due to platform rules. Screenshots shared alongside the post showed what he described as repeated lapses in operational security, including selfies and stories flaunting a lavish lifestyle. Social engineering attacks in crypto is a big issue. Best practices include never responding to unsolicited calls or messages claiming to be from an exchange, avoiding clicking links sent by unknown parties, and always contacting customer support directly through official websites or apps. Legitimate support staff will never ask for seed phrases, login credentials, or request that users send funds to private wallets or move conversations to messaging apps. Web3 Losses Hit $3.95B in 2025 Web3 security losses climbed sharply in 2025, reaching an estimated $3.95 billion. This is according to the latest yearly security report from Hacken. The latest figure is an increase of roughly $1.1 billion compared to 2024, with more than half of the losses attributed to threat actors linked to North Korea. Data shows that losses were heavily front-loaded, peaking at over $2 billion in the first quarter of the year before falling steadily to around $350 million by the fourth quarter. While the decline later in the year may suggest progress, Hacken warned that the overall pattern points to deep, systemic operational weaknesses rather than a temporary spike caused by isolated software bugs. Key findings from Hacken’s 2025 security report According to the report, 2025 made one trend unmistakably clear: while smart contract vulnerabilities are still a risk, the most damaging and least recoverable losses are still driven by access control failures and operational security lapses. Weak key management, compromised signers, and poor off-boarding practices were identified as the dominant causes of major incidents. Hacken estimates that access control and related operational failures accounted for approximately $2.12 billion, or almost 54% of all losses during the year, compared with about $512 million tied to smart contract exploits. Crypto losses by attack type (Source: Hacken ) A single incident played a huge role in shaping the year’s statistics. The breach at Bybit, which resulted in losses of close to $1.5 billion, is described in the report as the largest theft ever recorded in the crypto industry. Hacken said this attack alone helps explain why North Korea-linked clusters were responsible for roughly 52% of all stolen funds in 2025. Hacken’s forensic team pointed out that regulators across major jurisdictions, including the United States and the European Union, have laid out what robust operational security should look like. These expectations include role-based access control, comprehensive logging, secure onboarding and identity verification, institutional-grade custody solutions like hardware security modules, multi-party computation, multi-signature setups, cold storage, and continuous monitoring with anomaly detection. Despite this, Hacken said many Web3 companies continued to operate with insecure practices throughout 2025. Yehor Rudystia, head of forensic at Hacken Extractor, pointed to recurring issues like failing to revoke developer access during off-boarding, relying on a single private key to manage critical protocol functions, and not deploying Endpoint Detection and Response systems. He explained that measures like regular penetration testing, incident response simulations, custody control reviews, and independent audits should be considered non-negotiable for large exchanges and custodians going into 2026. Looking ahead, Hacken expects regulatory oversight to shift from soft guidance toward enforceable requirements. Co-founder and CEO Yevheniia Broshevan said the industry has a clear opportunity to raise its security baseline by adopting dedicated signing hardware and essential monitoring tools as standard practice.

阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约