Wednesday, March 22, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Coinbase faces a phishing attack

Coinbase faces a phishing attack

A phishing attack targeted Coinbase employees which resulted in some contact information of the employees to be taken.


Ezgi Koc Ezgi Koc
February 22, 2023
3 min read
Coinbase faces cybersecurity attack
  • A cybersecurity attack reportedly targeted Coinbase employees. Using a username and password that belonged to an actual Coinbase employee, the attacker attempted to connect to Coinbase many times, remotely.
  • When all tries failed, the malicious actor called an employee and gave them instructions to follow, who started to grow suspicious of it.
  • A small quantity of contact information for Coinbase workers, including names, email addresses, and a few phone numbers, was obtained but no money was taken and no client information was accessed.

Coinbase reports that an employee was reportedly the subject of a cybersecurity attack. The attacker repeatedly tried to get into Coinbase remotely while armed with a login and password belonging to a real Coinbase employee but Coinbase‘s defense held up. The attacker was prevented from obtaining access because he was unable to pass the necessary Multi-Factor Authentication (MFA) credentials.

What happened?

First, the attacker has conducted a phishing campaign against Coinbase employees by sending them SMS messages that direct them to fake sites to enter their credentials. Most of the employees who received those SMS messages understood that it is a scam. However, one of them failed to understand it and entered his/her credentials on the fake landing page. In this step, attackers managed to get the credentials, but they were still unable to log in since there was a 2FA enabled.

After around 20 minutes, that particular Coinbase employee received a call. The malicious actor claimed to be from Coinbase’s corporate IT department and that they were in need of the employee’s assistance. The employee started following the attacker’s instructions since they thought they were chatting with a real member of the Coinbase IT department. In 10 minutes, Coinbase Computer Security Incident and Incident Response (CSIRT) team detected the unusual activities and contacted with the victim employee; the employee then stopped communication with the malicious actor.

No money was stolen, and no customer information was accessed or seen. Nevertheless, a small amount of contact information for Coinbase employees, including names, email addresses, and a few phone numbers, was taken.

The CSIRT team started a thorough investigation while also promptly suspending all access for the victimized employee. No money was lost, and no client information was exposed.

How to watch out for these attacks

After the attack, Coinbase shared its experience with users to help them watch out for attacks such as these.

Any web traffic from your technology assets to the following addresses, where * represents your company or organization name:

  • sso-*.com
  • *-sso.com
  • login.*-sso.com
  • dashboard-*.com
  • *-dashboard.com

Any downloads or attempted downloads of the following remote desktop viewers:

  • AnyDesk (anydesk dot com)
  • ISL Online (islonline dot com)

Any attempts to access your organization from a third-party VPN provider, specifically Mullvad VPN.

Incoming phone calls/text messages from the following providers:

  • Google Voice
  • Skype
  • Vonage/Nexmo
  • Bandwidth [dot] com

Any unexpected attempts to install the following browser extension(s):

  • EditThisCookie

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Coinbase
Ezgi Koc

Ezgi Koc

Ezgi Koc is an editor at Cloud7. She graduated from Ege University with a bachelor's degree in English Language and Literature. She has always had great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
OpenAI's Foundry lets users run its AI on dedicated capacity

OpenAI's Foundry lets users run its AI on dedicated capacity

Related News

7 best cybersecurity schools

7 best cyber security schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
The number of ransomware attacks increased by 82% in 2022

The number of ransomware attacks increased by 82% in 2022

March 14, 2023 6:45 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • 7 best cyber security schools
  • 7 oldest Linux distros that are still being maintained
  • OVHcloud purchases its first Quandela quantum computer
  • Leil Storage launches an innovative data storage solution
  • Tails 5.11 is released, download it now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.