Massive Coinbase Data Leak: Causes, Consequences, and New Standards for Cybersecurity in the Crypto Industry

09.07.2025

Massive Coinbase Data Leak: Causes, Consequences, and New Standards for Cybersecurity in the Crypto Industry

Coinbase Hack: A Deep Dive into the Crypto Industry’s Biggest Data Leak

Chronology and scale of the incident

In December 2024, the largest American cryptocurrency exchange Coinbase suffered a large-scale attack, the consequences of which became known only almost six months later, in May 2025. According to an official notice filed with the Maine Attorney General’s office, 69,461 users, including 217 Maine residents, fell victim to the leak. The incident went undetected from December 26, 2024, to May 11, 2025, allowing the attackers to use the obtained data for a long time 3 .

How the leak happened

The attack was carried out using social engineering and insider manipulation. The cybercriminals bribed a group of overseas Coinbase support staff, primarily from India, to gain access to internal systems and sensitive customer information. As a result, the following was stolen:

  • Full names, home addresses, telephone numbers and email addresses of users
  • Dates of birth, nationalities, partially masked bank account and social security numbers
  • Scanned copies of identification documents (driver’s license, passport)
  • Balance, transaction history and account creation date details

It is important to note that passwords, private keys, two-factor authentication codes and user funds were not compromised. The institutional platform Coinbase Prime also remained out of the risk zone 5 .

Extortion Attempt and Coinbase’s Response

After gaining access to the data, the attackers launched an extortion attempt: on May 11, 2025, the company received an email demanding a ransom of $20 million for non-disclosure of the stolen information. Coinbase refused to negotiate with the criminals and instead announced a $20 million reward fund for help in catching the culprits. The exchange also fired all contractors involved in the leak and promised to compensate all affected customers for losses, as well as provide a free year of credit monitoring and identity protection services 8 .

Financial and legal implications

Coinbase’s total losses are estimated at between $180 million and $400 million, including direct customer losses, remediation costs, compensation, and potential fines from regulators. The exchange is facing a wave of class-action lawsuits from affected users who believe the company failed to notify them of the security breach in a timely manner. Additionally, Coinbase shares fell 7% after news of the hack and extortion attempt was published 10 .

Investigation and regulatory response

The US Department of Justice (DOJ) has launched an investigation into the incident, focusing on identifying and prosecuting the direct perpetrators and organizers of the attack. Coinbase is actively cooperating with law enforcement, but the company itself is not the subject of the investigation 11 12 13 14 .

Ethical and industry implications

The incident has sparked a wider debate about the ethics of storing personal data under Know Your Customer (KYC) policies. Many experts point out that such requirements, while intended to combat money laundering, increase the risks for cryptocurrency holders, making them targets for extortion, kidnapping, and other crimes. The Coinbase data breach is one of the most high-profile events in a series of growing cyber threats to the crypto industry, highlighting the vulnerability of even the largest players in the market 15 5 .

Known Victims and Impact on Industry

Among those affected was Roelof Botha, a partner at venture capital firm Sequoia Capital, indicating that the leak affected not only ordinary users but also members of the investment community. Experts warn that such incidents undermine trust in centralized exchanges and could lead to tighter regulation of the industry.

Measures to protect users

Coinbase has strengthened its internal security protocols, moved some of its customer support to the US, and restricted access to critical data. The exchange is also urging users to be especially alert to phishing and fraudulent attempts that could follow a personal data breach 16 5 .

Massive Coinbase Data Leak: Causes, Consequences, and New Standards for Cybersecurity in the Crypto Industry

What Cybersecurity Measures Does Coinbase Plan to Implement Following Data Leak


The Coinbase hack is the biggest test yet for the digital asset industry, demonstrating that even the largest and most technologically advanced companies are vulnerable to social engineering and insider attacks. The incident has prompted a rethink of how we store and protect personal data, and a discussion of the balance between regulatory requirements and user security 5 .

Following the data breach, Coinbase is planning and has already begun implementing a set of cybersecurity measures aimed at preventing similar incidents in the future. Key measures include:

  • Tightening access controls and implementing a Zero Trust architecture , which limits employee and contractor access to data to the minimum necessary level—the principle of least privilege. This reduces the risk of internal abuse of authority 5 .
  • Real-time monitoring using AI and machine learning to detect suspicious communications, bribery attempts, unauthorized access to data, and anomalies in the behavior of support staff 10 .
  • Raising awareness and training employees , including regular security training, phishing attack simulations and creating a security culture within the company 10 .
  • Improved screening and control of contractors and external employees to minimize the risks associated with using third parties that have been involved in leaks in the past 5 .
  • Create internal channels for reporting suspicious activity , encouraging employees to report any anomalies or social engineering attempts 5 .
  • Using audit trails and automated logs based on blockchain technologies to transparently and immutably record all requests and operations with user data 5 .
  • Collaborate with law enforcement agencies and other crypto exchanges to share information on new threats and attack trends, allowing for rapid response to emerging risks 5 .

Additionally, Coinbase is offering affected users free credit monitoring and identity protection for a year, and has set up a $20 million fund to reward information about the perpetrators and compensate customers for losses 4 .

These measures are aimed not only at technically strengthening security systems, but also at reducing the human factor, which was a key link in the leak that occurred 5 . In general, Coinbase aims to improve the level of data protection in order to restore customer trust and minimize the risks of future cyberattacks.

How Ethical Aspects of KYC Data Collection Can Affect User Trust in Cryptocurrency Platforms

The ethical aspects of data collection as part of the KYC (Know Your Customer) procedure have a significant impact on user trust in cryptocurrency platforms. On the one hand, KYC is necessary to improve security, prevent fraud, money laundering and terrorist financing, and comply with regulatory requirements, which contributes to the formation of trust and reputation of the platform 5 . Reliable verification of user identities helps crypto exchanges create a safer financial ecosystem and ensures transparency of operations, which is important for attracting and retaining customers 5 .

On the other hand, collecting and storing large amounts of personal data raises serious concerns about privacy and security. Users fear data leaks, loss of anonymity, and a violation of the principles of decentralization that are fundamental to the cryptocurrency community 7 . Leak incidents like the Coinbase hack exacerbate these concerns and could undermine trust in centralized platforms if effective security measures are not taken.

In addition, lengthy and complex KYC procedures can discourage users, reducing the convenience and speed of access to services, which negatively affects the user experience and competitiveness of the platform 3 . Erroneous blocking and excessive strictness of checks can also cause customer dissatisfaction 6 .

As a result, cryptocurrency platforms are faced with the need to balance security with ethical privacy standards. To this end, innovative solutions are being developed, such as the use of smart contracts, zero-knowledge proofs, and distributed encrypted data storage systems, which help minimize the risk of leaks and preserve user privacy while complying with KYC requirements 7 .

Thus, the ethical aspects of KYC affect user trust in crypto platforms through a combination of increased security and, at the same time, challenges related to privacy and convenience. The success of a platform largely depends on how effectively it can ensure data protection and transparency of processes, while maintaining respect for customer privacy.

Massive Coinbase Data Leak: Causes, Consequences, and New Standards for Cybersecurity in the Crypto Industry

What Legal Consequences Could Coinbase Face for Delaying Notification of Hack

The legal implications for Coinbase for delaying the breach notification could be serious and multifaceted:

  • Lawsuits from affected users . Within 48 hours of the hack and extortion attempt being announced, at least six federal lawsuits were filed, accusing Coinbase of negligence, inadequate internal controls, and failure to promptly inform customers of the breach. The plaintiffs say the delay in notification made the breach worse and allowed the attackers to exploit the stolen data longer 1 .
  • Regulatory pressure and investigations . Coinbase is under the supervision of the U.S. Securities and Exchange Commission (SEC), which may initiate additional investigations and impose fines for violations of data protection and timely notification of customers and regulators. Failure to comply with cyber incident disclosure rules may result in sanctions and stricter scrutiny 5 .
  • Allegations of systemic security flaws . The lawsuits highlight the existence of vulnerabilities in Coinbase’s security infrastructure that allowed attackers to bribe support staff and gain unauthorized access to data. This could result in demands for the company to improve its security systems and pay damages 1 .
  • Reputational Risks and Further Litigation : The delay in notification and the scale of the leak increase negative perceptions of the company among customers and investors, which could lead to further lawsuits, including class action lawsuits, and loss of confidence and market value of the stock.
  • Potential Criminal Investigations : If violations of privacy and cybersecurity laws are found, or if management negligence is proven, criminal cases or administrative investigations may be initiated against Coinbase.

As such, the delay in notifying Coinbase of the breach exposes the company to significant legal risks, including lawsuits, regulatory sanctions, and reputational damage, requiring the company to actively cooperate with authorities and take steps to compensate affected customers 5 .

What is the role of external contractors in an incident and how does it affect the company’s security?

The role of external contractors in the Coinbase data breach incident was key and had a serious negative impact on the company’s security. During the hack, the attackers were able to bribe several Coinbase customer service representatives who were contractors in order to gain access to sensitive user information. This indicates that it was through external contractors that the internal security was compromised.

This involvement of contractors created a number of vulnerabilities:

  • Insufficient control and monitoring of contractors. External contractors are often not fully integrated into the company’s security processes, making it difficult to monitor their actions and prevent abuse. In the case of Coinbase, contractors had access to sensitive information, but there was insufficient control over their actions.
  • Human Factor Risks: Contractors, being outside the corporate culture and subject to different rules, may be more vulnerable to social manipulation, bribery, or errors, increasing the likelihood of insider threats.
  • Lack of or inadequate legal and technical measures: Often, contractors do not sign strict non-disclosure agreements (NDAs) or undergo comprehensive security checks, increasing the risk of data leakage.
  • Security management challenges when outsourcing. Transferring critical functions to external organizations requires careful monitoring, regular audits, and transparent reporting, otherwise there may be delays in identifying and responding to incidents.

The impact on a company’s security is that using external contractors without proper oversight and integration into the corporate security system creates additional entry points for attackers and increases the likelihood of internal leaks. In the case of Coinbase, it was through contractors that attackers gained access to data, which led to a large-scale leak and serious reputational and financial losses.

To improve the company’s security it is necessary:

  • Implement strict procedures for the selection, training and monitoring of contractors.
  • Conduct regular internal and external security audits with a focus on working with contractors.
  • Restrict contractor access to critical data using the principle of least privilege.
  • Provide transparency and monitoring of all contractor activities in real time.
  • Sign legally binding confidentiality and liability agreements.

The role of external contractors in the Coinbase incident thus highlights the importance of comprehensive outsourcing risk management and the need to integrate contractors into the overall corporate security system.

What lessons can be learned from this case for the cryptocurrency industry and user data protection?

There are several key lessons that can be drawn from the Coinbase data breach and other major cyberattacks in the crypto industry that are important for the entire cryptocurrency industry and the protection of user data:

Lessons from the incidentSignificance for the industry
Multi-layered security and the principle of least privilegeComprehensive security systems, including multi-signature wallets, strict access control, and restriction of employee and contractor privileges, must be implemented to minimize the risks of internal and external attacks 1 .
Continuous monitoring and anomaly detectionIt is important to use real-time monitoring tools using AI and machine learning to detect suspicious activity, phishing attempts and system anomalies 2 .
Training and awareness raising for employees and usersRegular training and attack simulations help improve preparedness for social engineering and phishing attacks, which remain one of the main vulnerabilities 2 .
Comprehensive security auditThe audit should cover not only smart contracts and blockchain algorithms, but also infrastructure, development processes, supply chains and interactions with contractors 1 .
Outsourcing Risk ManagementStrict controls and transparency in dealing with external contractors, including legal obligations and technical monitoring, are necessary to prevent insider leaks 1 .
Transparency and timely informationDelays in reporting breaches undermine user trust and increase legal risks. Prompt disclosure and support for affected customers strengthens reputation 1 .
Creation of insurance and compensation fundsThe formation of insurance funds to protect user funds and compensate for losses reduces the financial risks of clients and increases trust in platforms 1 .
Balancing KYC and PrivacyThere is a need to find solutions that ensure compliance with regulations while minimizing the risks of personal data leaks while maintaining user privacy 5 .
Regularly check and update security systemsTechnologies and attack methods are constantly evolving, so crypto platforms must regularly update their security protocols and conduct stress tests 2 .

Overall, these lessons highlight that protecting cryptocurrency platforms and user data requires a comprehensive approach that combines technical measures, human factor management, and transparent communications. Adopting these principles will help reduce the risk of cyberattacks, increase user trust, and ensure the sustainable development of the crypto industry.

What vulnerability assessment methods help prevent crypto incidents

To prevent crypto incidents and improve the cybersecurity of cryptocurrency platforms, various vulnerability assessment methods are used to identify weak points in systems before they are exploited by attackers. Key methods and approaches include:

  • Automated vulnerability assessment (Vulnerability Assessment) is a regular scan of the entire IT infrastructure (networks, servers, applications, cloud services) using specialized tools (e.g. Nessus, Qualys, OpenVAS). This method helps to identify incorrectly configured systems, outdated software, weak passwords and other vulnerabilities, as well as rank them by risk level 1 .
  • Penetration Testing is a simulation of real attacks with the aim of exploiting the identified vulnerabilities. Pentests are performed by experienced professionals (ethical hackers) who check how deeply an attacker can penetrate a system and what consequences this may have for the business 1 .
  • Static and dynamic application testing (SAST and DAST) are the analysis of source code and running applications to detect vulnerabilities at the software level. SAST identifies errors in the code before launch, DAST identifies vulnerabilities while the application is running 3 .
  • Software composition analysis (SCA) and component trust assessment (SCS) – checks the external libraries and components used for known vulnerabilities and licensing risks. This helps prevent vulnerable or insecure software from getting into the product 3 .
  • Prioritizing vulnerabilities by risk level – after identifying vulnerabilities, they are classified by their level of criticality (low, medium, high risk). This allows resources to be focused on eliminating the most dangerous vulnerabilities first 2 .
  • Using risk assessment models and statistical analysis helps to determine which parts of the system are most vulnerable and require increased attention, as well as to predict potential threats 4 .
  • Implementation of machine learning and artificial intelligence – modern methods such as support vector machines (SVM) are used to automatically identify and predict vulnerabilities based on the analysis of big data and system behavior 8 .
  • Regular security audits and real-time monitoring – Continuous monitoring of your security posture, including log and event analysis, allows you to quickly respond to new threats and prevent attacks at an early stage 1 .
  • Additional protection methods: Red Team, Purple Team, Bug Bounty – complex approaches that include attack simulations and the involvement of external specialists and the community to search for vulnerabilities 7 .

An effective combination of these methods allows cryptocurrency platforms to promptly identify and eliminate security vulnerabilities, reducing the risk of data leaks, hacks, and financial losses. Regular and systematic vulnerability assessments, as well as prioritization based on business risks, are key factors in successfully protecting digital assets and user data.


Summary and Conclusions on the Coinbase Data Leak Incident and Its Impact on the Crypto Industry

The Coinbase hack was one of the most high-profile events in the history of the cryptocurrency industry, demonstrating the vulnerabilities of even the largest and most technologically advanced platforms. The incident highlighted critical issues related to cybersecurity management, especially in terms of control over external contractors and the protection of users’ personal data.

The delay in detecting and reporting the breach compounded the impact, triggering a wave of lawsuits and attracting the attention of regulators. This underscored the importance of transparency and prompt communication with customers and government agencies to maintain user trust and minimize legal risks.

The incident also raised ethical questions about KYC procedures: the need to collect large amounts of personal data to comply with regulations is faced with the risk of leaks and privacy compromise. Balancing security, compliance, and respect for privacy is becoming a major challenge for crypto platforms.

There are important lessons for the entire industry to learn from what happened:

  • A comprehensive and multi-layered approach to security is required, including strict access controls, real-time monitoring and employee training.
  • Particular attention should be paid to managing risks associated with outsourcing and contractors to minimize internal threats.
  • Regular audits, penetration tests and the use of modern vulnerability assessment technologies help to promptly identify and eliminate weaknesses.
  • Establishing compensation funds and reward programs for information about bad actors helps build trust and accountability.
  • It is important to develop innovative KYC solutions that ensure data protection and user privacy while meeting regulatory requirements.

Overall, the Coinbase incident has become a signal to the entire crypto industry about the need for continuous improvement of security systems and ethical standards. Only a comprehensive, transparent and responsible approach will ensure the protection of digital assets, maintain user trust and ensure the sustainable development of the cryptocurrency market in the context of ever-growing cyber threats.


  1. https://www.securitylab.ru/analytics/558284.php
  2. https://infars.ru/blog/predotvratit-ataku-do-eye-nachala-kak-rabotaet-analiz-uyazvimostey/
  3. https://rt-solar.ru/products/solar_appscreener/blog/4446/
  4. https://ya.ru/neurum/c/tehnologii/q/kakie_suschestvuyut_metody_ocenki_uyazvimosti_fbcba78f
  5. https://ya.ru/neurum/c/tehnologii/q/kakie_suschestvuyut_metodiki_ocenki_uyazvimostey_3afce747
  6. https://itglobal.com/ru-ru/company/glossary/analiz-uyazvimostej/
  7. https://www.sberbank.ru/ru/person/kibrary/articles/kakie-byvayut-uyazvimosti-i-kak-ocenit-stepen-ikh-riska
  8. https://www.secuteck.ru/articles/analiz-i-prognozirovanie-uyazvimostej-s-pomoshchyu-iskusstvennogo-intellekta-i-bolshih-yazykovyh-modelej
  1. https://www.hx.technology/ru/blog-ru/bybit-hack-other-major-cryptocurrency-incidents-ru
  2. https://www.kaspersky.ru/resource-center/preemptive-safety/strengthen-cryptocurrency-security
  3. https://brka.by/articles/obvinyayut-v-nezakonnom-oborote-kriptovalyuty-chto-delat_1/
  4. https://www.garant.ru/article/1150927/
  5. https://www.rbc.ru/crypto/news/6454e2639a7947cdb1454bd2
  6. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
  7. https://cyberleninka.ru/article/n/mery-po-protivodeystviyu-ispolzovaniya-kriptovalyuty-v-nezakonnoy-deyatelnosti
  8. https://cryptocloud.plus/blog/sell-cryptocurrency-for-rubles
  9. https://econs.online/articles/techno/regulirovanie-kriptovalyuty-mirovoy-opyt/
  10. https://sbersova.ru/sections/invest/rynok-kriptovalyut-vozmozhnosti-i-riski
  1. https://onlanta.ru/press/blog/razlichie-vnutrennego-i-vneshnego-audita-ib/
  2. https://www.cleverence.ru/articles/biznes/postroenie-korporativnoy-bezopasnosti-kak-opredelit-ugrozy-i-obespechit-kompleksnuyu-zashchitu-bizne/
  3. https://xn--80aidjgwzd.xn--p1ai/news/korporativnaya_bezopasnost/
  4. https://www.it-world.ru/security/er2pb4kqc54wgso88kcwwkgkswgk8wk.html
  5. https://www.aladdin-rd.ru/company/pressroom/articles/cto_iz_bezopasnosti_nelza_otdavat_na_autsorsing/
  6. https://sec-company.ru/articles/economics/korporativnaya_bezopasnost_postroenie_sistemy_korporativnoy_bezopasnosti/
  7. https://i-pusk.ru/blog/bezopasnost/kakie-riski-biznesu-neset-otkladyvanie-proverki-informatsionnoy-bezopasnosti/
  8. https://rt-solar.ru/products/solar_dozor/blog/2571/
  9. https://ibs.ru/media/autsorsing-informatsionnoy-bezopasnosti-preimushchestva-riski-i-perspektivy/
  10. https://mustread.kept.ru/articles/risks/sluzhba-bezopasnosti-2-0-ot-rassledovaniy-k-prediktivnosti/
  1. https://yellow.com/ru/news/coinbase-%D0%BF%D0%BE%D0%B4%D0%B2%D0%B5%D1%80%D0%B3%D0%BB%D0%B0%D1%81%D1%8C-%D1%81%D1%83%D0%B4%D0%B5%D0%B1%D0%BD%D0%BE%D0%BC %D1%83-%D0%B8%D1%81%D0%BA%D1%83-%D0%B8%D0%B7-%D0%B7%D0%B0-%D0%B2%D0%B7%D1%8F %D1%82%D0%BE%D1%87%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%B0-%D1%81%D1 %80%D0%B5%D0%B4%D0%B8-%D1%81%D0%BE%D1%82%D1%80%D1%83%D0%B4%D0%BD%D0%B8%D0%BA %D0%BE%D0%B2-%D0%BF%D0%BE%D0%B4%D0%B4%D0%B5%D1%80%D0%B6%D0%BA%D0%B8-%D0%B8-% D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%B8-%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0% B0%D1%86%D0%B8%D0%B8-%D0%BE-%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0%D1%85
  2. https://axcrypt.net/ru/blog/coinbase-data-breach-and-european-blackout-highlight-critical-cybersecurity-threats/
  3. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
  4. https://www.reddit.com/r/CoinBase/comments/1gzg529/status_of_coinbase_support/?tl=en
  5. https://habr.com/ru/news/909858/
  6. https://www.fa.ru/upload/iblock/290/xnxs286wz0z59p6rfhbt4mu4awdfgful/Krutyakov-103_Dissertatsiya.pdf
  7. https://sec-company.ru/articles/news/zarubezhnye_oblachnye_i_setevye_servisy_sluzhby_i_platformy_kotorye_mogut_byt_zablokirovany_v_rf_/
  8. https://www.reddit.com/r/CoinBase/comments/1l96hrw/coinbase_fraud/?tl=en
  9. https://mgimo.ru/upload/diss/2023/dolgieva-diss.pdf
  10. https://www.block-chain24.com/faq/chto-takoe-nizkaya-zaderzhka-i-pochemu-ona-vazhna-dlya-kriptobirzh
  1. https://plisio.net/ru/blog/what-is-kyc-in-crypto
  2. https://cryptocloud.plus/blog/kak-rabotaet-procedura-kyc
  3. https://fastercapital.com/ru/content/KYC—%D0%B7%D0%BD%D0%B0%D0%B9-%D1%81%D0%B2%D0%BE%D0%B5%D0%B3%D0%BE-%D0%BA%D0%BB%D0%B8%D0%B5%D0%BD%D1%82%D0%B0—%D1%81%D0%BE%D0 %B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D0%B5-%D1%82%D1%80%D0%B5%D0%B1%D0%BE%D0% B2%D0%B0%D0%BD%D0%B8%D0%B9.-%D0%92%D0%B0%D0%B6%D0%BD%D0%BE%D1%81%D1%82%D1%8C-%D1% 81%D0%BE%D0%B1%D0%BB%D1%8E%D0%B4%D0%B5%D0%BD%D0%B8%D1%8F-KYC-%D0%B4%D0%BB%D1%8F- %D1%81%D1%82%D0%B0%D1%80%D1%82%D0%B0%D0%BF%D0%BE%D0%B2—%D1%80%D1%83%D0%BA%D0%BE%D 0%B2%D0%BE%D0%B4%D1%81%D1%82%D0%B2%D0%BE-%D0%B4%D0%BB%D1%8F-%D0%BF%D1%80%D0%B5%D 0%B4%D0%BF%D1%80%D0%B8%D0%BD%D0%B8%D0%BC%D0%B0%D1%82%D0%B5%D0%BB%D0%B5%D0%B9.html
  4. https://orion-solutions.ru/kyc
  5. https://ibmm.ru/news/kriptoindustriya/chto-takoe-kyc-i-dlya-chego-nuzhna-verifikaciya/
  6. https://vc.ru/crypto/1856025-kyc-i-aml-v-kriptovalyute-pochemu-proverki-stali-obyazatelnymi
  7. https://www.anti-malware.ru/analytics/Threats_Analysis/Know-Your-Customer
  8. https://naufor.ru/tree.asp?n=20211
  9. https://rexex.io/ru/blog/articles/aea32bcd-1b71-493a-a79d-8edfcccc0b21
  10. https://iidx.ru/blog/proverka-kyc-i-aml-dlya-kriptoplatform-chto-eto-takoe/
  1. https://bithide.io/blog/ru/crypto-exchange-hack-coinbase-2025/
  2. https://yellow.com/ru/news/%D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%B0-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85-coinbase-%D1%80%D0%B0%D1%81%D0%BA%D1%80%D1%8B%D0%B2%D0%B0%D0%B5%D1%82-%D0%B8%D0%BD% D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D1%8E-%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D 0%B0%D1%82%D0%B5%D0%BB%D0%B5%D0%B9-%D1%83%D1%81%D0%B8%D0%BB%D0%B8%D0%B2%D0%B0%D1%8F-%D0%BE%D 0%B1%D0%B5%D1%81%D0%BF%D0%BE%D0%BA%D0%BE%D0%B5%D0%BD%D0%BD%D0%BE%D1%81%D1%82%D1%8C-%D0%BF%D0 %BE-%D0%BF%D0%BE%D0%B2%D0%BE%D0%B4%D1%83-%D1%86%D0%B5%D0%BD%D1%82%D1%80%D0%B0%D0%BB%D0%B8%D0 %B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%BD%D0%BE%D0%B9-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0% BD%D0%BE%D1%81%D1%82%D0%B8-%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82
  3. https://www.block-chain24.com/news/novosti-kriptovalyutnyh-birzh/novosti-birzhi-coinbase/coinbase-zahlestnula-volna-sudebnyh-iskov
  4. https://startx.team/blog/daydzhest/420
  5. https://yellow.com/ru/news/%D0%BF%D1%80%D0%B5%D1%81%D0%B5%D1%87%D0%B5%D0%BD-%D0%B8%D0%BD%D1%81%D0%B0%D0%B9%D0%B4%D0%B5%D1%80%D1%81%D0%BA%D0%B8%D0%B9-%D0%B7%D0%B0%D0%B3%D0%BE%D0%B2%D0%BE%D1%80-%D0%BD%D0%B0-binan ce-%D0%B8-kraken-%D0%BF%D0%BE%D1%81%D0%BB%D0%B5-%D0%BF%D0%BE%D1%81%D0%BB%D0%B5%D0%B4%D1%81%D1%82%D0%B2%D0 %B8%D0%B9-%D1%83%D1%82%D0%B5%D1%87%D0%BA%D0%B8-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85-%D0%BD%D0%B0-coinbase
  6. https://axcrypt.net/ru/blog/coinbase-data-breach-and-european-blackout-highlight-critical-cybersecurity-threats/
  7. https://layerxsecurity.com/ru/blog/what-coinbase-got-wrong-and-how-you-can-get-it-right/
  8. https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%A3%D1%82%D0%B5%D1%87%D0%BA%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85
  9. https://2bitcoins.ru/na-coinbase-podali-v-sud/
  10. https://www.binance.com/ru/square/post/24496236421570
  1. https://www.bitdefender.com/en-gb/blog/hotforsecurity/data-breach-at-coinbase-exposes-information-of-nearly-70-000-customers
  2. https://cryptorank.io/news/feed/04797-coinbase-reveals-69461-users-affected-heist
  3. https://www.securityweek.com/coinbase-says-rogue-contractor-data-breach-affects-69461-users/
  4. https://www.interest.co.nz/technology/133318/criminals-bribed-rogue-overseas-support-agents-steal-customer-data-coinbase
  5. https://proton.me/blog/coinbase-breach
  6. https://milberg.com/news/coinbase-data-breach-class-action-lawsuit/
  7. https://cryptonews.com/news/coinbase-insider-leak-20m-bounty/
  8. https://www.benzinga.com/markets/cryptocurrency/25/05/45441997/coinbase-hit-by-data-breach-refuses-to-pay-20m-ransom
  9. https://www.cybersecurity-insiders.com/experts-react-coinbase-discloses-breach-faces-up-to-400-million-in-losses/
  10. https://www.reuters.com/business/coinbase-says-cyber-criminals-stole-account-data-some-customers-2025-05-15/
  11. https://financefeeds.com/doj-launches-criminal-probe-into-coinbase-insider-data-breach/
  12. https://www.financemagnates.com/cryptocurrency/coinbase-faces-doj-investigations-after-customer-data-leak/
  13. https://cryptorank.io/news/feed/b305b-coinbase-confirms-doj-investigation-following-major-security-incident
  14. https://www.reuters.com/sustainability/boards-policy-regulation/us-doj-opens-investigation-into-coinbases-recent-cryberattack-bloomberg-news-2025-05-19/
  15. https://www.zyphe.com/resources/blog/coinbase-data-breach-2025
  16. https://areteir.com/article/coinbase-data-breach-2025-impacts-70k-users/
  17. https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists
  18. https://cointelegraph.com/explained/coinbase-data-breach-2025-what-was-stolen-and-what-you-need-to-know
  19. https://idtechwire.com/coinbase-data-breach-exposes-70000-customers-in-20m-ransom-scheme/
  20. https://www.reuters.com/sustainability/boards-policy-regulation/coinbase-breach-linked-customer-data-leak-india-sources-say-2025-06-02/