Educational & easy-to consume visual guides to understanding attacks & enhancing resilience
In early 2025, Coinbase began detecting suspicious activity linked to its customer support reps—what followed was a shocking revelation of insider collusion. Cybercriminals allegedly bribed overseas contractors to access internal systems and steal user data. Though only a small fraction of users were directly affected, the threat was serious enough for attackers to demand a $20 million ransom in Bitcoin, threatening to leak the data if their demands weren’t met.
Coinbase CEO Brian Armstrong took a bold public stance: “We will not fund criminal activity,” refusing to bow to the ransom threat. Instead, the company offered a $20 million reward for tips leading to the attackers.
Our detailed Coinbase Cyber Attack Timeline breaks down every critical moment—from the first signs of insider manipulation to the public ransom standoff and beyond. Understand how the breach unfolded, how leadership responded, and what it means for cybersecurity in 2025.
Download the full timeline now and gain actionable insights to strengthen your own incident response strategy.
Don't forget to read our blog on the Coinbase Cyber Attack.
Disclaimer: This document has been created with the sole purpose of encouraging discourse on the subject of cybersecurity and good security practices. Our intention is not to defame any company, person or legal entity. Every piece of information mentioned herein is based on reports and data freely available online. Cyber Management Alliance neither takes credit nor any responsibility for the accuracy of any source or information shared herein.
We offer a host of courses including our NCSC Assured Training in Cyber Incident Planning and Response and our NCSC Assured Training in Building and Optimising Incident Response Playbooks.
Hands On, full-support 'Security As a Service', specifically designed for organisations that require access to experienced cybersecurity, governance, risk and compliance professionals.
A unique, affordable, subscription-based, cybersecurity service for small to medium businesses, offering 280+ services in cybersecurity.
Scenario-based, verbally-simulated tabletop attack exercises that test your organisation's ability to effectively respond to a cyber-attack.