Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center

Gal Nakash
Updated
June 27, 2025
June 27, 2025
5 min read

Because why hack the vault when you can just schmooze your way in through customer service?

Introduction: Meet Coinbase—Crypto’s Favorite Middleman

Coinbase is no stranger to the limelight. With over 100 million registered users, it’s the polished face of the cryptocurrency world. If Binance is the Wild West of crypto, Coinbase is the Wall Street brokerage that your cousin, who works in finance, finally trusts to buy Bitcoin. Publicly traded and based in San Francisco, Coinbase provides a platform for people to buy, sell, store, and learn about cryptocurrencies.

It boasts industry-grade security, cutting-edge cold storage for assets, and a comprehensive compliance playbook that exceeds those of most tech firms. But despite its shiny exterior, Coinbase has discovered the hard way that no tech stack is stronger than its weakest human link, especially when that link is being paid $4 an hour overseas.

The Breach: An Inside Job with Outsider Consequences

SEC Form 8-K filed by Coinbase Global, Inc. on May 14, 2025, reporting a corporate event from its New York office.
SEC Data Breach Report

In the midst of 2025, the crypto giant disclosed a data breach that compromised the sensitive information of 69,461 users. The breach, which stemmed from unauthorized access by outsourced call centers, didn't directly touch crypto wallets, but the consequences are severe.

Attackers did not need to brute-force crypto vaults or exploit a flaw in blockchain protocols. All they needed was access to just enough personal data to impersonate Coinbase staff—and prey on unsuspecting users through social engineering scams.

The stolen data included:

  • Full names
  • Dates of birth
  • Email addresses
  • Phone numbers
  • Physical addresses
  • The last four digits of Social Security numbers
  • Masked bank account numbers
  • Partial bank identifiers

No passwords, seed phrases, or private keys were taken. But when you are running phishing and impersonation campaigns, that kind of detail is gold.

Shortly after the breach, Coinbase’s security team received a threatening email. The attackers demanded $20 million in exchange for not publishing the stolen data.

Ransom Demands and Coinbase’s Countermove

Rather than negotiate with the attackers, Coinbase chose a bold PR maneuver: they flipped the ransom. The company announced a $20 million bounty for information leading to the identification and arrest of the perpetrators. It was a calculated gamble—showing strength in the face of pressure while avoiding the “we paid the hackers” headlines that have sunk others before.

 Timeline graphic showing Coinbase's 2024–2025 breach, including ransom demand, public disclosure, $20M bounty, and termination of TaskUs contract.
Coinbase Breach Timeline

Coinbase attempted to contain the fire with a series of legally precise disclosures and a tightly wrapped narrative. In data breach notifications filed with the Office of the Maine Attorney General, Coinbase wrote that:

"A small number of individuals, performing services for Coinbase at our overseas retail support locations, improperly accessed customer information."

Data breach notification from Maine Attorney General showing Coinbase's insider breach affecting 69,461 people.
Data Breach Notification by Maine Attorney General

In other words, it wasn’t us—it was them. The company emphasized that no crypto assets were accessed and that the stolen data wasn't enough to compromise user accounts directly.

Still, they acknowledged that social engineering scams had taken place and announced plans to reimburse any user who lost funds “as a direct result of this incident before the date of this post.”

Financially, Coinbase estimated remediation costs could range from $180 million to $400 million, factoring in investigation costs, customer support, legal action, and customer reimbursements. That number alone makes it one of the most expensive social engineering campaigns in the history of cryptocurrency.

Following the hack, users started reporting an increase in spam and phishing attempts masquerading as Coinbase support on sites like Reddit and Twitter. One user posted on r/CoinBase:

“Got a call claiming to be from Coinbase Support. Caller ID even spoofed the real number. They knew my full name and email. Almost fell for it until they asked for my 2FA code.” 

Others on Twitter warned via hashtags like #CoinbaseScamCalls that scammers were calling, texting, and messaging users with seemingly legitimate information. These warnings align with a reported case where a 72-year-old woman lost $36,000 after trusting a caller impersonating Coinbase, despite official calls being disabled, further demonstrating that scammers were actively exploiting partial data exposure.

Call log showing multiple missed calls from unfamiliar U.S. numbers, with one flagged as “Potential Spam” and timestamps from today and yesterday.
Social media posts about spamming

Following The Money Trail 

As crypto sleuth ZachXBT began connecting the dots, a clearer picture of the breach’s depth and timeline emerged.

Blockchain report showing $65.7M lost in Coinbase social engineering scams linked to address 0xc823...e7b9, submitted by ZachXBT on February 4, 2025.
Chaniabuse Report

According to Chainabuse, several phishing and social engineering scams involving the Blockchain address 0xc8234dda2bc3758eb90224d0025871001e8ee7b9 have resulted in losses exceeding $65.7 million. This address is believed to be connected to the now-infamous ENS domain: coinbase-hold.eth.

Ethereum address showing 2 transactions totaling ~35.46 ETH received from Coinbase; nearly all funds sent out, leaving a $0.04 balance.
Transaction Detailsof ETH 0xc…7b9

The Ethereum address 0xc823...8ee7b9 exhibits the telltale symptoms of a burner wallet, which is made for a single transaction flow. It received 35.46 ETH (~$98,038) in two deposits directly from Coinbase contracts and emptied shortly after, sending nearly the full amount to another wallet in one go. With only one outbound transaction, minimal fees, and a leftover balance of just $0.04, this address was used to quickly transfer value post-exfiltration.

Line chart showing Ethereum wallet balance near $0.04 with no transfers from March to June 2025, indicating minimal activity post-major transactions.
Transaction Graph of ETH address 0xc…7b9

The final transaction graph ties everything together visually, offering a clear trace of the suspicious activity surrounding the Ethereum address 0xc823...8ee7b9. On January 3, 2025, the wallet received two transfers totaling 35.46 ETH from Coinbase hot wallets—both of which were well-identified and tagged in blockchain intelligence platforms. 

MetaSleuth transaction graph showing 35.46 ETH flow from Coinbase hot wallets to address 0xc823...ee7b9, then to another wallet in a single outbound transfer.
Map for ETH 0xc…7b9

These simultaneous fund injections strongly suggest either an exploitation of Coinbase's infrastructure or, more plausibly, the attacker gaining temporary access to custodial wallets through compromised credentials or internal abuse. Just 80 minutes later, the full amount—35.46 ETH—was moved to another wallet (0xf0f9...5226a) in a single outbound transfer.

Cross-Chain Movement and Bitcoin Traces

Another wallet has surfaced in the ongoing investigation — this time on the Bitcoin side of the chain. The address bc1q4ks5gus8uv88vk8yage4r89kv8uxlgwhemz545 isn’t just a random wallet; it's part of something much more deliberate.

Bitcoin transaction log showing wallet bc1q4ks...mz545 receiving 7.13 BTC, then consolidating and transferring funds through 45 outputs to obfuscate origins.
Bitcoin bc1q…545 Transaction Details

It first caught attention after receiving a sizable chunk of BTC — over 7.13 BTC, worth around $780,000. But the real red flag? That BTC came from a wallet that had just spread funds across 45 different addresses. That’s a classic laundering tactic: split funds, shuffle them, then pull them back together to muddy the trail.

MetaSleuth graph showing 7.13 BTC moving from Coinbase address to bc1q4ks...mz545, then quickly transferred to bc1q3nm...heyn, suggesting laundering activity.
Map for bc1…545

But it doesn’t stop there. The movement pattern of bc1q4ks5...mz545 shows a rapid consolidation of those funds, which were quickly moved again, likely to throw off tracking tools. It's like watching someone wipe their digital fingerprints in real-time.

What’s even more interesting is where the funds went next. Along with lesser-known P2P addresses and mixers, blockchain mapping reveals connections to well-known exchanges like Binance, Kraken, and OKX since some of these endpoints are connected to high-risk or flagged services.

Ethereum transaction showing a tiny transfer to zachxbt.eth from a phishing-tagged address, including encoded input data and $0.06 in fees with a $0.04 burn.
The ETH Transaction to zachxbt

On May 21, the same threat actor moved roughly $42.5 million from Bitcoin to Ethereum using THORChain. But it wasn’t just about shifting funds—they also embedded a message in the Ethereum transaction input: “L bozo,” followed by a meme video of NBA player James Worthy smoking a cigar. The message appeared to be a direct taunt to blockchain investigator ZachXBT, who later flagged it on his Telegram channel.

The BPO Angle: When Cost Savings Backfire

TaskUs highlighting clients like Zoom, Uber, Coinbase, and Netflix, emphasizing digital services and AI-driven customer experience solutions.
Contract between Taskus and Coinbase

The heart of the story lies in a three-letter acronym: BPO—Business Process Outsourcing. Coinbase had outsourced a significant chunk of its customer service operations to TaskUs, a Texas-based publicly traded outsourcing firm with service centers in India and the Philippines.

TaskUS has provided customer support agents to Coinbase since 2017. The office in Indore, India, was a cost-effective management for the crypto firm.

But in January 2025, just weeks after the breach occurred, TaskUs laid off 226 employees from the Coinbase project. According to internal sources and regulatory filings, the breach appears to have originated from within this very group.

According to a report published by Fortune, the online criminal group 'Comm' bribed the agents. The malefactors accessed the customer profiles, screenshots, and data in exchange for cash or crypto.

Inside the Attackers’ Playbook

Unlike the typical state-sponsored cyberattackers from Russia or North Korea, the perpetrators are not the usual suspects. This time, the threat actor appears to be a ragtag group of teenagers and young adults operating under aliases like “Puffy Party” on Telegram.

The crime syndicate is not strictly financially motivated. While money is nice, clout is better. The group is the Reddit-meets-Grand Theft Auto generation that figured out that stealing real money gets you real points.

According to Josh Cooper-Duckett, director of investigations at Cryptoforensic Investigators:

“They come from video games, and now they’re bringing their high scores into the real world. And their high score is how much money they can steal.”

Screenshots shared by one of the attackers with Fortune showed emails with Coinbase security, images of high-profile user dashboards, and internal documents, proving the attackers were not bluffing.

A class action lawsuit filed in New York on behalf of Coinbase users specifically named TaskUs as a defendant, alleging negligence in protecting customer data. The company denies the charges, issuing a standard corporate statement:

“We place the highest priority on safeguarding the data of our clients and their customers and continue to strengthen our global security protocols and training programs.”

But legal disclaimers aside, the breach has cracked open a much-needed conversation: if crypto exchanges trust overseas workers with sensitive data, shouldn’t there be far stricter access controls, auditing mechanisms, and real-time detection?

Conclusion: When the Human Layer Fails

An important turning point in the crypto industry has been reached with the Coinbase hack, as the backend operations—the unseen framework that supports billion-dollar ecosystems—are now being examined. Companies have trusted outsourced labor without putting in place strong enough safeguards to resist temptation in their frantic efforts to scale and cut costs.

One thing has become painfully obvious as the investigations and lawsuits continue: no vault is safe when the gatekeeper is selling the keys.

No items found.

Gal Nakash

ABOUT THE AUTHOR

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Technical Review by:
Gal Nakash
Technical Review by:
Gal Nakash

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Ready for SaaS Security
that can keep up?

Request a demo