The post Coinbase Breach Actor Behind the $300M Heist Shifts $5M in Fresh Moves appeared on BitcoinEthereumNews.com. The threat actor behind the Coinbase customer breach resurfaced on October 2, moving fresh capital across stablecoin rails before bridging funds away within minutes, according to blockchain investigator ZachXBT. He reported that roughly 5 million DAI was swapped into an equivalent amount of USDC and sat for only about 35 minutes before being bridged, with a portion routed through Circle’s Cross-Chain Transfer Protocol (CCTP). This was not the first time the actor signaled activity on-chain. On May 21, the same wallet complex transferred more than $42.5 million from Bitcoin to Ethereum through THORChain. On the occasion, the hack left a message trolling ZachXBT. Latest movement by Coinbase’s threat actor | Source: DeBank A $300 Million Breach Coinbase disclosed on May 15 that a data breach had occurred, affecting less than 1% of its monthly active users, according to the exchange. A group of overseas support agents with privileged access was bribed and recruited by outside actors. Those insiders exposed names, contact details, identity documents, and partially masked financial data, which was enough to supercharge impersonation campaigns. Coinbase emphasized that core infrastructure, including authentication secrets, private keys, and Prime wallets, remained uncompromised, and it pledged to compensate affected users. CEO Brian Armstrong stated that the attackers attempted to extort $20 million in Bitcoin. However, the company refused the ransom and instead announced a $20 million reward fund for information leading to arrests and convictions. Coinbase response to the data breach and thefts | Source: X The US Department of Justice initiated an investigation immediately afterward, and Coinbase’s preliminary estimate for remediation and reimbursements ranges from $180 million to $400 million. That insider-enabled data trove became the raw material for industrial-grade social engineering. Alliance DAO’s Qiao Wang described a highly scripted playbook. Impostors posing as Coinbase staff flagged “compromised” accounts, steering targets… The post Coinbase Breach Actor Behind the $300M Heist Shifts $5M in Fresh Moves appeared on BitcoinEthereumNews.com. The threat actor behind the Coinbase customer breach resurfaced on October 2, moving fresh capital across stablecoin rails before bridging funds away within minutes, according to blockchain investigator ZachXBT. He reported that roughly 5 million DAI was swapped into an equivalent amount of USDC and sat for only about 35 minutes before being bridged, with a portion routed through Circle’s Cross-Chain Transfer Protocol (CCTP). This was not the first time the actor signaled activity on-chain. On May 21, the same wallet complex transferred more than $42.5 million from Bitcoin to Ethereum through THORChain. On the occasion, the hack left a message trolling ZachXBT. Latest movement by Coinbase’s threat actor | Source: DeBank A $300 Million Breach Coinbase disclosed on May 15 that a data breach had occurred, affecting less than 1% of its monthly active users, according to the exchange. A group of overseas support agents with privileged access was bribed and recruited by outside actors. Those insiders exposed names, contact details, identity documents, and partially masked financial data, which was enough to supercharge impersonation campaigns. Coinbase emphasized that core infrastructure, including authentication secrets, private keys, and Prime wallets, remained uncompromised, and it pledged to compensate affected users. CEO Brian Armstrong stated that the attackers attempted to extort $20 million in Bitcoin. However, the company refused the ransom and instead announced a $20 million reward fund for information leading to arrests and convictions. Coinbase response to the data breach and thefts | Source: X The US Department of Justice initiated an investigation immediately afterward, and Coinbase’s preliminary estimate for remediation and reimbursements ranges from $180 million to $400 million. That insider-enabled data trove became the raw material for industrial-grade social engineering. Alliance DAO’s Qiao Wang described a highly scripted playbook. Impostors posing as Coinbase staff flagged “compromised” accounts, steering targets…

Coinbase Breach Actor Behind the $300M Heist Shifts $5M in Fresh Moves

2025/10/03 02:42

The threat actor behind the Coinbase customer breach resurfaced on October 2, moving fresh capital across stablecoin rails before bridging funds away within minutes, according to blockchain investigator ZachXBT.

He reported that roughly 5 million DAI was swapped into an equivalent amount of USDC and sat for only about 35 minutes before being bridged, with a portion routed through Circle’s Cross-Chain Transfer Protocol (CCTP).

This was not the first time the actor signaled activity on-chain. On May 21, the same wallet complex transferred more than $42.5 million from Bitcoin to Ethereum through THORChain. On the occasion, the hack left a message trolling ZachXBT.

Latest movement by Coinbase’s threat actor | Source: DeBank

A $300 Million Breach

Coinbase disclosed on May 15 that a data breach had occurred, affecting less than 1% of its monthly active users, according to the exchange.

A group of overseas support agents with privileged access was bribed and recruited by outside actors.

Those insiders exposed names, contact details, identity documents, and partially masked financial data, which was enough to supercharge impersonation campaigns.

Coinbase emphasized that core infrastructure, including authentication secrets, private keys, and Prime wallets, remained uncompromised, and it pledged to compensate affected users.

CEO Brian Armstrong stated that the attackers attempted to extort $20 million in Bitcoin.

However, the company refused the ransom and instead announced a $20 million reward fund for information leading to arrests and convictions.

Coinbase response to the data breach and thefts | Source: X

The US Department of Justice initiated an investigation immediately afterward, and Coinbase’s preliminary estimate for remediation and reimbursements ranges from $180 million to $400 million.

That insider-enabled data trove became the raw material for industrial-grade social engineering. Alliance DAO’s Qiao Wang described a highly scripted playbook.

Impostors posing as Coinbase staff flagged “compromised” accounts, steering targets into “verification,” and then captured assets by supplying pre-generated seed phrases for supposed security wallets.

The con blended urgency, authenticity cues from stolen personal data, and technical theater to extract custody.

Meanwhile, market voices, such as Wintermute’s Evgeny Gaevoy, argued that rigid KYC/AML frameworks can paradoxically increase civilian exposure by centralizing sensitive identity data, which, once leaked, fuels more crime.

Normalized Thefts

The October 2 transfers also re-exposed how compliant, allowlisted infrastructures are used in flight.

ZachXBT said part of the funds moved through Circle’s official CCTP, a legitimate bridge that burns USDC on one chain and mints it on another.

That matters because it converts bridging into an issuance workflow rather than an asset swap, potentially complicating freeze-and-seize options if controls are not wired to fire rapidly.

ZachXBT vented recently about how the crypto industry is dependent on government agencies. He said:

“For an industry that was founded on principles of independence from the government it’s embarrassing how reliant we are on them to find a solution for victims.

There’s no other industry that has normalized thefts to the same extent.” In his statement, the investigator emphasized “major problems” without a solution, and these issues continue to worsen.

Among the problems listed, he questioned what would happen when the majority of law enforcement agents are incapable of tracking funds on-chain.

He further questioned when there are jurisdiction barriers, and when there is a lack of action from stablecoin issuers to freeze funds quickly.

Viewed narrowly, the latest movement from the Coinbase threat actor is a status update. Hackers remain active, opportunistic, and confident in outrunning asset-level controls.

Viewed broadly, it is a stress test of the “full stack.” Exchanges’ internal access controls, customer-support vendor management, data-handling hygiene, law enforcement speed, and the responsiveness of stablecoin issuers and bridges when red flags are triggered.

Source: https://www.thecoinrepublic.com/2025/10/02/coinbase-breach-actor-behind-the-300m-heist-shifts-5m-in-fresh-moves/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Coinbase Slams ‘Patchwork’ State Crypto Laws, Calls for Federal Preemption

Coinbase Slams ‘Patchwork’ State Crypto Laws, Calls for Federal Preemption

The post Coinbase Slams ‘Patchwork’ State Crypto Laws, Calls for Federal Preemption appeared on BitcoinEthereumNews.com. In brief Coinbase has filed a letter with the DOJ urging federal preemption of state crypto laws, citing Oregon’s securities suit, New York’s ETH stance, and staking bans. Chief Legal Officer Paul Grewal called state actions “government run amok,” warning that patchwork enforcement “slows innovation and harms consumers.” A legal expert told Decrypt that states risk violating interstate commerce rules and due process, and DOJ support for preemption may mark a potential turning point. Coinbase has gone on the offensive against state regulators, petitioning the Department of Justice that a patchwork of lawsuits and licensing schemes is tearing America’s crypto market apart. “When Oregon can sue us for services that are legal under federal law, something’s broken,” Chief Legal Officer Paul Grewal tweeted on Tuesday. “This isn’t federalism—this is government run amok.” When Oregon can sue us for services that are legal under federal law, something’s broken. This isn’t federalism–this is government run amok. We just sent a letter to @TheJusticeDept urging federal action on crypto market structure to remedy this. 1/3 — paulgrewal.eth (@iampaulgrewal) September 16, 2025 Coinbase’s filing says that states are “expansively interpreting their securities laws in ways that undermine federal law” and violate the dormant Commerce Clause by projecting regulatory preferences beyond state borders. “The current patchwork of state laws isn’t just inefficient – it slows innovation and harms consumers” and demands “federal action on crypto market structure,” Grewal said.  States vs. Coinbase It pointed to Oregon’s securities lawsuit against the exchange, New York’s bid to classify Ethereum as a security, and cease-and-desist orders on staking as proof that rogue states are trying to resurrect the SEC’s discredited “regulation by enforcement” playbook. Oregon Attorney General Dan Rayfield sued Coinbase in April for promoting unregistered securities, and in July asked a federal judge to return the…
Share
BitcoinEthereumNews2025/09/18 11:52
Share
Nomura’s Laser Digital Prepares To Enter Japan’s Crypto Market

Nomura’s Laser Digital Prepares To Enter Japan’s Crypto Market

The post Nomura’s Laser Digital Prepares To Enter Japan’s Crypto Market appeared on BitcoinEthereumNews.com. Financial services holding company Nomura Holdings is preparing to expand into Japan’s cryptocurrency market through its Switzerland-based subsidiary, Laser Digital Holdings. A Laser Digital spokesperson confirmed Friday that the unit is in pre-consultation talks with Japan’s Financial Services Agency (FSA) and intends to apply for a license to offer crypto trading services to institutional investors in the country.  However, the spokesperson told Cointelegraph that the application date remains “undetermined,” and will depend on the outcome of the discussions with the FSA.  If approved, Laser Digital would launch broker-dealer services for traditional financial and crypto-focused companies, including exchanges in Japan. Nomura is part of the Nomura Group, Japan’s largest investment bank and brokerage group. Japanese institutions plan to invest in crypto The move follows a broader push by institutions into the Japanese crypto market. Earlier this week, Daiwa Securities Group, one of Japan’s largest brokerages, introduced a crypto lending service that allows clients to borrow Japanese yen using Bitcoin (BTC) and Ether (ETH) as collateral.  Laser Digital and Daiwa’s push into the Japanese market seems to be a response to growing demand for crypto investments in the region.  In June, Nomura and Laser Digital unveiled the results of a survey exploring institutional appetite for crypto. The survey showed 54% of investment managers — including family offices, corporations and institutional investors — expect to invest in cryptocurrencies within the next three years. Related: Metaplanet expands Bitcoin strategy with new US, Japan units Japan regulator proposes crypto rule overhaul Alongside rising institutional interest, Japan’s regulatory stance on crypto has also shifted in a more favorable direction. Japan has looked to reform its crypto laws to align the sector’s rules with those of its traditional securities market, and also plans to lower taxes on crypto. In August, the country’s regulators quietly greenlit the country’s…
Share
BitcoinEthereumNews2025/10/04 09:23
Share