On May 15, 2025, Coinbase acknowledged its most serious security lapse to date, a breach that could ultimately cost the exchange as much as $400 million and has compromised records for more than 69,000 customers. Investigators traced the incident to an overseas contact center operation: hackers bribed a handful of support agents in Indore, India, to capture screenshots and copies of customer data stored in internal systems.
Those agents worked for TaskUs, a U.S.–headquartered BPO firm that has handled Coinbase support queues since 2017. According to multiple reports, the attackers, described as a loose network of young, English-speaking cybercriminals, offered cash incentives to TaskUs employees willing to leak sensitive information, including names, email addresses, and partial account details.
Internal logs show Coinbase first spotted suspicious activity months before the disclosure. By January 2025 the exchange had quietly asked TaskUs to dismiss 226 agents from its Indore office, many of whom were later linked to the leak. When criminals attempted to extort Coinbase on May 11, the company cut the remaining ties, tightened access controls, and publicly confirmed the breach four days later.
Although no passwords, private keys, or crypto balances were exposed, the stolen data is still valuable for targeted phishing and social engineering schemes. In response, Coinbase posted a $20 million reward for information leading to the perpetrators and pledged to reimburse any customers tricked into sending funds to attackers.
This event underscores how quickly a single compromised vendor can undermine even a well-resourced security program. With call center staff often granted broad view access to resolve user tickets, bribery, extortion, or simple negligence can open the door to large-scale data theft.
Vendor-Access Hardening
Perform stringent due diligence reviews of every third-party help desk or BPO partner. Enforce least-privilege access, screen for insider-threat indicators, and require periodic audits that map who can see customer data and why.
Zero-Trust Architecture
Implement identity-centric controls so support personnel must re-authenticate for sensitive actions, and isolate customer records behind segmented networks.
24×7 Insider-Threat Monitoring
Deploy behavioral analytics tools that flag unusual data exports, screenshotting, or off-hours access by frontline agents—even if they connect from approved workstations.
Real-Time Data-Leak Detection
Integrate dark web monitoring and breach-intelligence feeds to identify stolen client information quickly, enabling rapid customer notifications and credential resets.
Phishing-Resilience Training
Offer continuous education and simulation campaigns so both vendor staff and end users can recognize and report social engineering attempts spawned by leaked records.
Incident-Response Playbooks
Maintain clear escalation paths that include vendors. Regular tabletop exercises should cover scenarios where outsourced employees become malicious insiders.
Post-Breach Remediation Guidance
After an exposure, MSPs can coordinate forced password rotations, enable or enforce multi-factor authentication, and assist with credit- or identity-protection services for affected users.
Contractual Security Clauses
Help clients renegotiate BPO agreements to include penalties for lapses, mandatory breach reporting within defined timelines, and explicit cybersecurity framework adherence (e.g., SOC 2 or ISO 27001).
By combining preventive controls with rapid detection and a vendor-inclusive response strategy, MSPs and MSSPs can turn the Coinbase incident into a blueprint for stronger, more resilient security across their customer base. To extend this service around the clock, Secucenter has its army ready to assist at all times.
Our SOC monitoring services are designed for MSSPs that offer a complete package of cybersecurity to their customers. We understand the importance of data and privacy, and thus, our proactive approach makes us fit in the cyber market to detect and deter threat actors.