市值: $3.5162T 2.070%
成交额(24h): $163.1221B -7.100%
  • 市值: $3.5162T 2.070%
  • 成交额(24h): $163.1221B -7.100%
  • 恐惧与贪婪指数:
  • 市值: $3.5162T 2.070%
加密货币
话题
百科
资讯
加密话题
视频
热门新闻
加密货币
话题
百科
资讯
加密话题
视频
bitcoin
bitcoin

$111233.607824 USD

0.62%

ethereum
ethereum

$2710.400604 USD

4.44%

tether
tether

$0.999989 USD

0.01%

xrp
xrp

$2.466558 USD

2.62%

bnb
bnb

$689.250459 USD

0.85%

solana
solana

$183.771663 USD

5.32%

usd-coin
usd-coin

$0.999812 USD

0.00%

dogecoin
dogecoin

$0.251507 USD

4.57%

cardano
cardano

$0.827639 USD

5.75%

tron
tron

$0.274246 USD

1.47%

sui
sui

$3.897754 USD

-2.37%

hyperliquid
hyperliquid

$35.462900 USD

17.82%

chainlink
chainlink

$17.006311 USD

4.47%

avalanche
avalanche

$25.733231 USD

9.34%

stellar
stellar

$0.310183 USD

4.44%

加密货币新闻

最新的加密数据泄露突显了一个简单的事实:黑客针对人类

2025/05/23 06:03

当交换准备加入标准普尔500指数时,这一“共依基安全事件”就碰到了,但它源于贿赂和社会工程

The latest crypto data breach serves as a stark reminder that hackers often target humans, not just software. In May 2025, fewer than 1% of Coinbase users had their personal data breached by bribery and social engineering, rather than a flaw in the exchange's technology.

最新的加密数据泄露是一个明显的提醒,即黑客通常针对人类,而不仅仅是软件。在2025年5月,不到1%的Coinbase用户对贿赂和社会工程泄露了个人数据,而不是交易所技术的缺陷。

This incident hit right as Coinbase was preparing to join the S&P 500. While no login passwords, two-factor codes or private keys were leaked, the fallout is nonetheless massive, with Coinbase now expecting $180–$400 million in costs for remediation and reimbursements.

当Coinbase准备加入标准普尔500指数时,此事件恰恰相反。虽然没有登录密码,两因素代码或私钥泄漏,但辐射却是巨大的,Coinbase现在预计补救和补偿的成本为1.80亿美元。

Coinbase's breach began quietly in late 2024. According to a regulatory filing, criminal hackers bribed Coinbase's overseas customer-support contractors to siphon customer information, starting around December 26, 2024.

Coinbase的违规行为始于2024年底。根据监管文件,犯罪黑客将Coinbase的海外客户支持承包商贿赂了Siphon客户信息,从2024年12月26日左右开始。

The fraud went unnoticed until May 11, 2025, when Coinbase's security team spotted suspicious activity – the same day the attackers emailed a $20  million ransom demand. Coinbase refused and disclosed the incident on May 15.

直到2025年5月11日,Coinbase的安全团队发现可疑活动时,欺诈行为一直没有注意到 - 袭击者通过电子邮件发送了2000万美元的赎金需求。 Coinbase拒绝并于5月15日披露了这一事件。

In total, about 69,461 customer accounts were impacted. The stolen data was personal, not technical. Attackers obtained names, postal addresses, phone numbers, and emails for these customers, plus masked identifiers: the last four digits of Social Security numbers, partial bank-account info, images of drivers’ licenses or passports, and snapshots of account balances and transaction history.

总共约有69,461个客户帐户受到影响。被盗的数据是个人的,不是技术性的。攻击者为这些客户获得了姓名,邮政地址,电话号码和电子邮件,以及蒙版标识符:社会保险号码的最后四位数字,部分银行账户信息,驾驶员许可或护照的图像以及帐户平衡和交易历史记录的快照。

Critically, no login passwords, two-factor codes or private keys were leaked – the thieves could not directly access funds or cryptocurrency wallets.

至关重要的是,没有泄露的登录密码,两因素代码或私钥 - 小偷无法直接访问资金或加密货币钱包。

Coinbase maintained that no customer funds or password data were touched. The stolen information was valuable mainly for social engineering – impersonating Coinbase in order to trick users into sending crypto to the scammers.

Coinbase坚持认为没有触摸客户资金或密码数据。被盗的信息主要对于社会工程而言是有价值的 - 冒充Coinbase,以欺骗用户将加密货币发送给骗子。

This attack was classic crypto social engineering. Rather than hacking a server, criminals preyed on trust. They targeted a “few bad apples” among Coinbase’s support staff with cash bribes.

这种攻击是经典的加密社会工程。罪犯没有侵犯服务器,而是捕食信任。他们针对Coinbase的支持人员的“几个坏苹果”,以现金贿赂。

These insiders had access to customer data and were paid to copy it. With that data, the criminals planned to pose as Coinbase support and contact victims.

这些内部人可以访问客户数据并获得付款以复制它。有了这些数据,犯罪分子计划摆姿势作为Coinbase支持并与受害者联系。

Social engineering tactics like smishing (phishing via SMS) and vishing (voice phishing) are growing in crypto. For example, security firm KnowBe4 described a Coinbase incident in which an employee first received a malicious text asking them to log into a work account; moments later, a caller pretending to be IT support urged the employee to grant access to their workstation.

Crypto中的社会工程策略(例如Smishing(网络钓鱼)和Vishing(语音网络钓鱼))正在增长。例如,安全公司Snowbe4描述了一个Coinbase事件,其中员工首先收到了恶意文字,要求他们登录工作帐户;片刻之后,一个假装支持它的来电者敦促员工授予其工作站的访问权限。

The employee grew suspicious and reported the attempt, preventing a deeper breach. “No funds were taken and no customer information was accessed… but some limited contact information for our employees was taken,” Coinbase noted after that attack.

该员工变得可疑,并报告了这一尝试,以防止更深刻的违规行为。 Coinbase在这次袭击后指出:“没有拿走资金,也没有访问客户信息……但是我们员工的联系信息有限。”

In Coinbase’s May breach, the combination of inside help and scam tactics bypassed the company’s technical barriers. The hackers did not need to break passwords or crack two-factor codes. They simply leveraged the trust placed in human agents to extract data.

在Coinbase的May违规中,内部帮助和骗局策略的结合绕开了公司的技术障碍。黑客无需打破密码或破解两因素代码。他们只是利用人类代理商的信任来提取数据。

As Coinbase’s CEO Brian Armstrong put it, attackers simply “found a few bad apples” and socially engineered their way into private data.

正如Coinbase的首席执行官Brian Armstrong所说,攻击者只是“发现了一些不好的苹果”,并在社会上进行了社会设计的方式。

The fallout was swift. Shares of Coinbase slid as the breach hit headlines, but more importantly, the company acted immediately to protect customers.

后果很快。 Coinbase的股票滑行是漏洞的头条新闻,但更重要的是,该公司立即采取行动保护客户。

In compliance with data laws, Coinbase began mailing breach notification letters to affected customers and offered them a year of credit monitoring and identity-theft insurance.

根据数据法,Coinbase开始向受影响的客户邮寄漏洞通知书,并向他们提供了一年的信用监控和身份盗用保险。

Financially, Coinbase warned the incident would be costly – on the order of $180–$400 million in total. This includes forensic costs, customer reimbursements for any social-engineering losses, and regulatory fines.

在财务上,Coinbase警告说,这一事件将是昂贵的 - 总计1.80亿美元的订单。这包括法医费用,任何社会工程损失的客户报销以及监管罚款。

The attackers’ $20M ransom demand was rebuffed. Instead, Coinbase created a $20M reward fund for tips leading to the hackers’ capture. The company also fired the support agents involved and said it will press charges.

袭击者的2000万美元赎金需求被拒绝。相反,Coinbase为导致黑客捕获的技巧创建了一笔2000万美元的奖励基金。该公司还解雇了涉及的支持代理商,并表示将提出指控。

To prevent future incidents, Coinbase beefed up security. Impacted accounts are being flagged with extra checks and scam-alert prompts.

为了防止未来的事件,共同依次加强了安全性。受影响的帐户正在标记,并附有额外的支票和骗局提示。

On May 15, Coinbase announced it would reimburse any customer tricked into sending crypto to the attackers. It is opening a new U.S.-based support center and enforcing stronger access controls in overseas offices. The exchange is also investing in better insider-threat monitoring and more employee training on spotting scams.

5月15日,Coinbase宣布将偿还任何被欺骗将加密货币发送给攻击者的客户。它正在开设一个新的美国支持中心,并在海外办事处执行更强大的访问控制。该交易所还投资了更好的内部威胁监控和更多的员工培训,以发现发现骗局。

The Coinbase security incident drives home a broader point: human error remains crypto’s weakest link. Technical defenses can be state-of-the-art, but a single compromised staffer can hand attackers the keys to the kingdom.

Coinbase安全事件引起了更广泛的重点:人为错误仍然是加密蛋白的最弱点。技术防御可能是最先进的,但是单一折衷的员工可以将攻击者掌握到王国的钥匙。

Industry surveys back this up. One IBM/Ponemon study found nearly half of all breaches involve human mistakes or insider actions. And as KnowBe4 bluntly puts it, “anyone can fall victim to a social engineering attack” – including cryptocurrency professionals.

行业对此进行了调查。一项IBM/Ponemon研究发现,几乎所有违规行为都涉及人类错误或内部行动。正如Knowbe4直言不讳的那样,“任何人都可以成为社会工程攻击的受害者”,包括加密货币专业人员。

For crypto investors, the takeaway is vigilance. Always treat unsolicited calls, texts, or emails with skepticism, even if they reference your account.

对于加密投资者来说,要点是警惕。即使他们引用您的帐户,也始终以无疑的方式对待未经请求的电话,文本或电子邮件。

Verify any Coinbase communications through official

通过官方验证任何共同沟通

免责声明:info@kdj.com

所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!

如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。

2025年05月23日 发表的其他文章