Written by
Jack Clarke
Updated 7 months ago
3 min read
Coinbase, a leading global cryptocurrency exchange, has confirmed it was the victim of a recent cyber attack. The incident resulted in a data breach and a subsequent extortion attempt, highlighting the increasing sophistication of cybercriminals targeting the digital asset space.
The attack compromised sensitive employee information, including access credentials. While the breach was quickly contained, it underscores the vulnerabilities even major cryptocurrency platforms face.
According to an official statement from Coinbase, the attackers demanded $20 million in exchange for keeping the stolen data private. This tactic is a hallmark of double extortion schemes, which are becoming increasingly prevalent in the digital landscape.
Researchers at Check Point Research (CPR), the threat intelligence division of Check Point Software, recently analyzed the attack and emphasized that this type of incident is not isolated.
“This case demonstrates that even the largest crypto platforms, with robust security structures, are vulnerable to well-coordinated attacks,” says Eli Smadja, Research Group Manager at Check Point Software. “We are facing a new era of organized cybercrime, with highly professional structures, service-based business models, and international affiliate networks.”
The Check Point Research (CPR) team has identified the return of Inferno Drainer, a stealthy Drainer-as-a-Service (DaaS) scheme. In the past six months, it has drained over $9 million in digital assets from more than 30,000 wallets.
This illicit model allows affiliates to rent complete attack kits, including phishing pages, automated scripts, and technical support, to execute large-scale fraud. The new version of Inferno Drainer employs advanced techniques, such as:
While high-profile cases target large platforms like Coinbase, cybercriminals also target individual investors, users of decentralized applications, and anyone who frequently uses digital wallets.
Check Point Software also warns of an increase in attempts to emotionally manipulate users through fraudulent messages that mimic promotions, airdrops, security updates, or urgent verification requests.
“We are witnessing the fusion of classic social engineering and highly evasive technological tools. The result is fraud that accurately replicates the legitimate communication channels of crypto brands and trading platforms,” highlights Muhammad Yahya Patel, Security Engineering Lead at Check Point Software.