$2M Lost by Coinbase Users in Support Scam

The year 2025 witnessed a worrying surge in Web3 exploits, underscoring the persistent challenges that threaten the promise of decentralization. As the crypto landscape evolves, it remains a high-stakes arena where vigilance and robust security practices are paramount. From elaborate social engineering scams targeting individual users to large-scale breaches orchestrated by nation-state actors, the need for heightened awareness is more critical than ever.

The Hacken Report: A Grim Overview

Hacken’s 2025 security report paints a concerning picture, revealing that total Web3 losses soared to a staggering $3.95 billion, a significant $1.1 billion increase from the previous year. Over half of these losses are attributed to North Korean threat actors, highlighting the increasingly sophisticated involvement of state-sponsored cybercrime in the crypto sphere. While vulnerabilities in smart contracts remain a significant concern, the report emphasizes that the majority of losses stem from fundamental access control failures and operational security weaknesses, such as compromised keys and inadequate off-boarding protocols. These are often simpler to exploit than complex coding flaws; however, their impact can be catastrophic.

– Advertisement –

Read Also: Trust Wallet Token (TWT) in 2026: Navigating Utility, Growth, and Investment Potential

Coinbase Impersonation Scam: The Human Element

In a case that highlights the vulnerability of even seasoned crypto users, blockchain investigator ZachXBT uncovered a large-scale impersonation scam targeting Coinbase customers. A Canadian actor allegedly stole over $2 million by posing as a Coinbase help desk employee, employing social engineering tactics to manipulate victims into divulging sensitive information or making fraudulent transactions. This scammer took their flaunting to social media, buying rare Telegram usernames and indulging in bottle service and gambling, leaving a trail of digital breadcrumbs that ultimately led to their identification.

The Modus Operandi

The Coinbase impersonation scam relied on classic social engineering techniques, where attackers cultivated trust by mimicking official channels. They pressured victims into believing that an urgent issue required immediate action, prompting them to bypass security protocols or share private keys. According to ZachXBT, the stolen funds were spent on luxury items and online platforms, illustrating the potential for significant financial losses tied to such scams.

Lessons Learned and Mitigation Strategies

This incident underscores the importance of digital security education and awareness within the crypto community. Users must be vigilant and avoid responding to unsolicited calls or messages claiming to be from exchanges. Always contact customer support directly through official channels, such as verified websites or apps. Reputable support staff will never ask for sensitive information like seed phrases or request fund transfers to private wallets.

  • Verify the identity of anyone claiming to represent a crypto exchange or service.
  • Never share seed phrases or private keys.
  • Enable two-factor authentication (2FA) on all accounts.
  • Be cautious of communications that create a sense of urgency or pressure.
  • Report any suspicious activity to the relevant exchange or authorities.

Web3 Losses: A Breakdown of the Damage

Hacken’s yearly assessment reveals the enormity of the problem. Web3 security losses have reached an alarming $3.95 billion, painting a grim picture for the sector. A closer look at the statistics reveals some troubling trends.

Statistical Overview

The distribution of losses throughout 2025 exhibits a worrying trend. The year began with the highest losses, exceeding $2 billion recorded in the first quarter. By the fourth quarter, losses had decreased to about $350 million. While this decline might suggest progress, Hacken warns that it reflects serious operational flaws rather than simply a decline caused by isolated software issues.

Attack Vectors and Root Causes

The Hacken report illuminates the attack vectors responsible for most losses. Although smart contract vulnerabilities are concerning, the report identifies access control failures and operational security lapses as primary culprits. Weak key management, compromised signers, and poor off-boarding practices have led to major security incidents. Consequently, these failures were responsible for nearly 54% of all losses during the year, accounting for around $2.12 billion, while smart contract exploits represented about $512 million.

The Bybit Breach: A Defining Moment

A pivotal incident during 2025 was the Bybit breach, which resulted in nearly $1.5 billion in losses, marking it as the most significant theft ever recorded in the cryptocurrency sector. Hacken’s analysts noted that this incident played a crucial role in understanding why North Korean-linked actors accounted for about 52% of all stolen funds in that year.

The Path Forward: Reinforcing Web3 Security

The Hacken report stresses the urgent need for improved security practices within the Web3 ecosystem. As regulatory scrutiny intensifies, crypto firms must prioritize robust operational protocols to safeguard user funds and maintain trust in the technology. Key recommendations include:

  • Implementing role-based access control to limit privileged access.
  • Utilizing institutional-grade custody solutions, such as hardware security modules and multi-signature setups.
  • Adopting comprehensive logging and monitoring systems for anomaly detection.
  • Conducting regular penetration testing and incident response simulations.
  • Establishing secure onboarding and off-boarding processes for employees.

According to Hacken’s Yehor Rudystia, measures like frequent penetration testing and independent audits should become non-negotiable for major exchanges and custodians by 2026. Co-founder and CEO Yevheniia Broshevan emphasized that the industry has an opportunity to elevate its security standards by integrating dedicated signing hardware and critical monitoring tools as routine practices. As the industry faces heightened regulatory expectations, proactive adoption of these measures is essential for enhancing security and regaining the trust of users and regulators alike.

Subscribe

Related articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here