{"id":5250,"date":"2025-05-16T20:21:06","date_gmt":"2025-05-16T12:21:06","guid":{"rendered":"https:\/\/cicserver.com\/would-rather-pay-bounty-than-ransom-coinbase-on-20m-extortion-attempt\/"},"modified":"2025-05-16T20:21:06","modified_gmt":"2025-05-16T12:21:06","slug":"would-rather-pay-bounty-than-ransom-coinbase-on-20m-extortion-attempt","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/would-rather-pay-bounty-than-ransom-coinbase-on-20m-extortion-attempt\/","title":{"rendered":"\u2018Would rather pay bounty than ransom\u2019: Coinbase on $20M extortion attempt"},"content":{"rendered":"<p><br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/www.csoonline.com\/wp-content\/uploads\/2025\/05\/3987958-0-82422100-1747394638-ransomware-100962313-orig.jpg?quality=50&amp;strip=all\" \/><\/p>\n<div>\n<p>Instances of such personnel accessing data without business need were independently detected by the Company\u2019s security monitoring in the previous months, Coinbase said, adding that all such instances were part of a single campaign leading to the theft of data in May from internal systems.<\/p>\n<p>Speaking on the attack vector used, Ishpreet Singh, chief information officer at Black Duck, said, \u201cRegarding security architecture, moving to a zero-trust network model will help them to enforce micro-segmentation. It\u2019s important to carry out advanced security risk training, including social engineering defense training. Sensitive user data should be heavily segmented and encrypted with keys inaccessible to support agents.\u201d<\/p>\n<p>Following the discovery, Coinbase promptly terminated the individuals involved, ramped up its fraud-monitoring measures, and notified affected customers as a precaution against misuse of exposed information.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Instances of such personnel accessing data without business need were independently detected by the Company\u2019s security monitoring in the previous months, Coinbase said, adding that all such instances were part of a single campaign leading to the theft of data in May from internal systems. Speaking on the attack vector used, Ishpreet Singh, chief information [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5250","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5250"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5250\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5251"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}