
5月15日,Coinbase披露,有不法分子竊取了數(shù)萬(wàn)名客戶(hù)的個(gè)人信息,成為該公司有史以來(lái)最為嚴(yán)重的一次安全事件,預(yù)計(jì)損失高達(dá)4億美元。此次數(shù)據(jù)泄露事件之所以引人關(guān)注,不僅是因?yàn)槭录囊?guī)模,更因?yàn)槠涫址ǜ裢夂币?jiàn):黑客通過(guò)賄賂海外客服人員,獲取了機(jī)密的客戶(hù)資料。
Coinbase已公開(kāi)宣布懸賞2,000萬(wàn)美元追緝此次數(shù)據(jù)盜竊事件的幕后黑手。這些不法分子還試圖以此勒索公司,要求其隱瞞事件真相。但Coinbase尚未披露有關(guān)黑客身份或其如何精準(zhǔn)鎖定公司客服人員的具體細(xì)節(jié)。
《財(cái)富》雜志近期的一項(xiàng)調(diào)查,通過(guò)查閱Coinbase與其中一名黑客之間的郵件往來(lái),揭示了有關(guān)該事件的更多細(xì)節(jié)。這些信息強(qiáng)烈暗示,一個(gè)由講英語(yǔ)的年輕黑客組成的松散組織可能要對(duì)此次事件負(fù)部分責(zé)任。同時(shí),調(diào)查也凸顯出所謂“BPO”(業(yè)務(wù)流程外包)公司,成了科技公司安全運(yùn)營(yíng)中的薄弱環(huán)節(jié)。
“內(nèi)鬼”作案
事件的起點(diǎn)是一家名為T(mén)askUs的小型上市公司,總部位于得克薩斯州新布朗費(fèi)爾斯。與其他BPO公司一樣,TaskUs通過(guò)雇傭海外員工,以低成本為大型科技公司提供客戶(hù)服務(wù)。據(jù)該公司發(fā)言人透露,今年1月,TaskUs在印度印多爾的服務(wù)中心裁減了226名為Coinbase提供服務(wù)的員工。
根據(jù)提交給美國(guó)證券交易委員會(huì)(Securities and Exchange Commission)的文件,自2017年以來(lái),TaskUs一直為美國(guó)加密貨幣巨頭Coinbase提供客戶(hù)服務(wù)人員,這一合作為后者大幅節(jié)省了人力成本。但問(wèn)題也隨之而來(lái):當(dāng)客戶(hù)發(fā)送郵件咨詢(xún)賬戶(hù)或Coinbase的新產(chǎn)品時(shí),回復(fù)他們的可能是身處海外的TaskUs員工。由于這些客服人員的薪資遠(yuǎn)低于美國(guó)本土員工,事實(shí)證明他們更容易受到賄賂誘惑。
TaskUs發(fā)言人在回應(yīng)Coinbase事件時(shí)對(duì)《財(cái)富》雜志表示:“今年年初,我們發(fā)現(xiàn)有兩人非法獲取了我們某一客戶(hù)的信息。我們認(rèn)為,這兩人是被一個(gè)規(guī)模更大、組織嚴(yán)密的針對(duì)該客戶(hù)的犯罪活動(dòng)所招募,這起犯罪活動(dòng)還波及到為這位客戶(hù)提供服務(wù)的其他多家機(jī)構(gòu)?!?/p>
根據(jù)Coinbase提交的監(jiān)管文件,TaskUs在1月的裁員發(fā)生于Coinbase發(fā)現(xiàn)客戶(hù)數(shù)據(jù)被盜之后不到一個(gè)月。上周二,在紐約提起的一項(xiàng)代表Coinbase客戶(hù)的聯(lián)邦集體訴訟指控TaskUs在客戶(hù)數(shù)據(jù)保護(hù)方面存在重大疏忽。TaskUs發(fā)言人表示:“雖然我們無(wú)法就訴訟發(fā)表評(píng)論,但我們認(rèn)為相關(guān)指控毫無(wú)根據(jù),并將積極應(yīng)訴。我們始終將保障客戶(hù)及其用戶(hù)的數(shù)據(jù)安全置于最高優(yōu)先級(jí),并持續(xù)加強(qiáng)我們的全球安全機(jī)制與培訓(xùn)項(xiàng)目。”
一位了解此次安全事件的知情人士表示,黑客還曾以其他BPO公司為目標(biāo),在部分情況下曾經(jīng)得手,且每次竊取的數(shù)據(jù)性質(zhì)各不相同。這位人士因希望坦率發(fā)言要求匿名。
這些被竊數(shù)據(jù)尚不足以讓黑客攻破Coinbase的加密貨幣金庫(kù),卻為犯罪分子提供了大量信息,幫助他們冒充Coinbase客服人員聯(lián)系客戶(hù),并誘導(dǎo)客戶(hù)交出加密貨幣資金。Coinbase表示,黑客共竊取了超過(guò)6.9萬(wàn)名客戶(hù)的數(shù)據(jù),但并未透露其中有多少人成了所謂“社會(huì)工程詐騙”的受害者。
在此次事件中,社會(huì)工程詐騙的手法包括:犯罪分子利用竊取的數(shù)據(jù)冒充Coinbase員工,騙取受害者的信任,并誘騙受害者轉(zhuǎn)移其加密貨幣資金。
Coinbase在一份聲明中表示:“正如我們此前已披露的,我們近期發(fā)現(xiàn)有不法分子自2024年12月起唆使海外客服人員獲取客戶(hù)賬戶(hù)信息。我們已通知受影響用戶(hù)和監(jiān)管機(jī)構(gòu),終止了與涉事TaskUs員工及其他相關(guān)海外客服人員的合作,并加強(qiáng)了內(nèi)部管控。”Coinbase還表示,公司將對(duì)在詐騙中遭受資金損失的客戶(hù)予以賠償。
Coinbase補(bǔ)充指出,其公開(kāi)引用的4億美元這個(gè)數(shù)字是其對(duì)數(shù)據(jù)泄露總成本預(yù)估范圍的上限,下限估算為1.8億美元。
雖然冒充公司員工實(shí)施“社會(huì)工程詐騙”的方式并不新鮮,但此次黑客以BPO公司目標(biāo)所達(dá)到的規(guī)模之大實(shí)屬罕見(jiàn)。盡管目前尚未有確切證據(jù)指向具體作案者,但多條線(xiàn)索均指向了一個(gè)由講英語(yǔ)的年輕黑客組成的松散組織。
“他們來(lái)自電子游戲世界”
在5月中旬Coinbase數(shù)據(jù)泄露事件曝光后的幾天里,《財(cái)富》雜志通過(guò)Telegram與一名自稱(chēng)“puffy party”的人士進(jìn)行過(guò)信息交流,對(duì)方聲稱(chēng)自己是此次黑客事件的參與者之一。
兩位與該匿名黑客有過(guò)交流的安全研究人員對(duì)《財(cái)富》表示,他們認(rèn)為此人的話(huà)具有可信度。其中一人表示:“根據(jù)他分享給我的內(nèi)容,我認(rèn)為他的說(shuō)法值得重視,且未找到證據(jù)證明他的陳述是虛假的?!眱晌谎芯咳藛T均要求匿名,理由是擔(dān)心因與疑似黑客接觸而收到法院傳票。
在交流中,此人分享了大量據(jù)稱(chēng)是與Coinbase安全團(tuán)隊(duì)之間的電子郵件截圖。其與公司溝通時(shí)使用的姓名為“Lennard Schroeder”。他還分享了一名Coinbase前高管的賬戶(hù)截圖,顯示了該賬戶(hù)的加密貨幣交易記錄以及大量個(gè)人信息。
Coinbase方面并未否認(rèn)這些截圖的真實(shí)性。
這位自稱(chēng)黑客的人士分享的郵件中,包括要求支付價(jià)值2,000萬(wàn)美元的比特幣的勒索威脅,但Coinbase已拒絕支付。郵件中還嘲諷稱(chēng),該黑客團(tuán)伙將用部分贖金為Coinbase光頭首席執(zhí)行官布賴(lài)恩·阿姆斯特朗購(gòu)買(mǎi)假發(fā)。黑客在郵件中寫(xiě)道:“我們?cè)敢赓澲ブ舶l(fā),讓他能帶著一頭新發(fā)優(yōu)雅地走遍世界?!?/p>
在Telegram上的對(duì)話(huà)中,這位黑客(《財(cái)富》雜志從一位安全研究員處得知其存在)還表達(dá)了對(duì)Coinbase的蔑視。
雖然許多加密貨幣劫案通常由俄羅斯犯罪團(tuán)伙或朝鮮軍方實(shí)施,但這名所謂的黑客表示,此次事件是由一群松散聯(lián)系的青少年和二十出頭的年輕人所為,他們自稱(chēng)為“Comm”或“Com”——即“Community”(社區(qū))的簡(jiǎn)稱(chēng)。
過(guò)去兩年間,關(guān)于Comm組織的報(bào)道不斷出現(xiàn)在其他黑客事件的媒體報(bào)道中。本月早些時(shí)候,《紐約時(shí)報(bào)》的一篇報(bào)道中,一名涉嫌參與多起加密貨幣盜竊的嫌疑人自稱(chēng)為該組織成員。另?yè)?jù)《華爾街日?qǐng)?bào)》報(bào)道,2023年,調(diào)查人員確認(rèn)一批與“Comm”有關(guān)的黑客曾入侵拉斯維加斯多家賭場(chǎng)的線(xiàn)上系統(tǒng),并試圖向米高梅度假村(MGM Resorts)勒索3,000萬(wàn)美元。
與主要以牟利為目的的俄羅斯或朝鮮加密貨幣黑客不同,“Comm”組織成員的動(dòng)機(jī)往往源于追求關(guān)注度,或者制造惡作劇帶來(lái)的刺激感。他們有時(shí)協(xié)作發(fā)動(dòng)攻擊,有時(shí)則彼此競(jìng)爭(zhēng),看誰(shuí)能盜走更多資產(chǎn)。
加密貨幣調(diào)查取證機(jī)構(gòu)Cryptoforensic Investigators的調(diào)查主管喬?!?kù)珀-達(dá)克特表示:“他們最初來(lái)自電子游戲世界,然后把游戲里的‘高分’帶到了現(xiàn)實(shí)中。在現(xiàn)實(shí)世界里,他們的‘高分’就是偷到多少錢(qián)?!?/p>
在Telegram對(duì)話(huà)中,這位自稱(chēng)的黑客表示,“Comm”組織內(nèi)部各成員在黑客行動(dòng)中分工明確。他所在的小組負(fù)責(zé)賄賂客服人員并收集客戶(hù)數(shù)據(jù),然后將這些信息交給其他擅長(zhǎng)實(shí)施“社會(huì)工程詐騙”的團(tuán)隊(duì)操作。他補(bǔ)充道,這些與“Comm”有關(guān)的不同團(tuán)體通過(guò)Telegram和Discord等社交平臺(tái)協(xié)調(diào)各自負(fù)責(zé)的環(huán)節(jié),并約定好分贓方式。
加密貨幣調(diào)查公司Tracelon的創(chuàng)始人塞爾希奧·加西亞對(duì)《財(cái)富》雜志表示,這位黑客對(duì)Coinbase被攻擊事件的描述,與他所觀察到的“Comm”組織運(yùn)作模式及其他加密詐騙案例高度一致。一位了解安全事件的知情人士補(bǔ)充道,近期針對(duì)客戶(hù)實(shí)施“社會(huì)工程詐騙”的攻擊者所使用的是無(wú)口音的北美英語(yǔ)。
據(jù)一位了解BPO行業(yè)薪資情況的知情人士透露,TaskUs在印度的員工每月薪資在500至700美元之間。TaskUs對(duì)此拒絕置評(píng)。盡管這一收入水平高于印度人均國(guó)內(nèi)生產(chǎn)總值,但Tracelon創(chuàng)始人加西亞對(duì)《財(cái)富》雜志表示,如此低的薪資使客服人員更容易受到賄賂誘惑。
他補(bǔ)充道:“顯然,這就是整個(gè)鏈條中最薄弱的環(huán)節(jié),因?yàn)樗麄冇薪邮苜V賂的經(jīng)濟(jì)動(dòng)機(jī)?!保ㄘ?cái)富中文網(wǎng))
譯者:劉進(jìn)龍
審校:汪皓
5月15日,Coinbase披露,有不法分子竊取了數(shù)萬(wàn)名客戶(hù)的個(gè)人信息,成為該公司有史以來(lái)最為嚴(yán)重的一次安全事件,預(yù)計(jì)損失高達(dá)4億美元。此次數(shù)據(jù)泄露事件之所以引人關(guān)注,不僅是因?yàn)槭录囊?guī)模,更因?yàn)槠涫址ǜ裢夂币?jiàn):黑客通過(guò)賄賂海外客服人員,獲取了機(jī)密的客戶(hù)資料。
Coinbase已公開(kāi)宣布懸賞2,000萬(wàn)美元追緝此次數(shù)據(jù)盜竊事件的幕后黑手。這些不法分子還試圖以此勒索公司,要求其隱瞞事件真相。但Coinbase尚未披露有關(guān)黑客身份或其如何精準(zhǔn)鎖定公司客服人員的具體細(xì)節(jié)。
《財(cái)富》雜志近期的一項(xiàng)調(diào)查,通過(guò)查閱Coinbase與其中一名黑客之間的郵件往來(lái),揭示了有關(guān)該事件的更多細(xì)節(jié)。這些信息強(qiáng)烈暗示,一個(gè)由講英語(yǔ)的年輕黑客組成的松散組織可能要對(duì)此次事件負(fù)部分責(zé)任。同時(shí),調(diào)查也凸顯出所謂“BPO”(業(yè)務(wù)流程外包)公司,成了科技公司安全運(yùn)營(yíng)中的薄弱環(huán)節(jié)。
“內(nèi)鬼”作案
事件的起點(diǎn)是一家名為T(mén)askUs的小型上市公司,總部位于得克薩斯州新布朗費(fèi)爾斯。與其他BPO公司一樣,TaskUs通過(guò)雇傭海外員工,以低成本為大型科技公司提供客戶(hù)服務(wù)。據(jù)該公司發(fā)言人透露,今年1月,TaskUs在印度印多爾的服務(wù)中心裁減了226名為Coinbase提供服務(wù)的員工。
根據(jù)提交給美國(guó)證券交易委員會(huì)(Securities and Exchange Commission)的文件,自2017年以來(lái),TaskUs一直為美國(guó)加密貨幣巨頭Coinbase提供客戶(hù)服務(wù)人員,這一合作為后者大幅節(jié)省了人力成本。但問(wèn)題也隨之而來(lái):當(dāng)客戶(hù)發(fā)送郵件咨詢(xún)賬戶(hù)或Coinbase的新產(chǎn)品時(shí),回復(fù)他們的可能是身處海外的TaskUs員工。由于這些客服人員的薪資遠(yuǎn)低于美國(guó)本土員工,事實(shí)證明他們更容易受到賄賂誘惑。
TaskUs發(fā)言人在回應(yīng)Coinbase事件時(shí)對(duì)《財(cái)富》雜志表示:“今年年初,我們發(fā)現(xiàn)有兩人非法獲取了我們某一客戶(hù)的信息。我們認(rèn)為,這兩人是被一個(gè)規(guī)模更大、組織嚴(yán)密的針對(duì)該客戶(hù)的犯罪活動(dòng)所招募,這起犯罪活動(dòng)還波及到為這位客戶(hù)提供服務(wù)的其他多家機(jī)構(gòu)?!?/p>
根據(jù)Coinbase提交的監(jiān)管文件,TaskUs在1月的裁員發(fā)生于Coinbase發(fā)現(xiàn)客戶(hù)數(shù)據(jù)被盜之后不到一個(gè)月。上周二,在紐約提起的一項(xiàng)代表Coinbase客戶(hù)的聯(lián)邦集體訴訟指控TaskUs在客戶(hù)數(shù)據(jù)保護(hù)方面存在重大疏忽。TaskUs發(fā)言人表示:“雖然我們無(wú)法就訴訟發(fā)表評(píng)論,但我們認(rèn)為相關(guān)指控毫無(wú)根據(jù),并將積極應(yīng)訴。我們始終將保障客戶(hù)及其用戶(hù)的數(shù)據(jù)安全置于最高優(yōu)先級(jí),并持續(xù)加強(qiáng)我們的全球安全機(jī)制與培訓(xùn)項(xiàng)目?!?/p>
一位了解此次安全事件的知情人士表示,黑客還曾以其他BPO公司為目標(biāo),在部分情況下曾經(jīng)得手,且每次竊取的數(shù)據(jù)性質(zhì)各不相同。這位人士因希望坦率發(fā)言要求匿名。
這些被竊數(shù)據(jù)尚不足以讓黑客攻破Coinbase的加密貨幣金庫(kù),卻為犯罪分子提供了大量信息,幫助他們冒充Coinbase客服人員聯(lián)系客戶(hù),并誘導(dǎo)客戶(hù)交出加密貨幣資金。Coinbase表示,黑客共竊取了超過(guò)6.9萬(wàn)名客戶(hù)的數(shù)據(jù),但并未透露其中有多少人成了所謂“社會(huì)工程詐騙”的受害者。
在此次事件中,社會(huì)工程詐騙的手法包括:犯罪分子利用竊取的數(shù)據(jù)冒充Coinbase員工,騙取受害者的信任,并誘騙受害者轉(zhuǎn)移其加密貨幣資金。
Coinbase在一份聲明中表示:“正如我們此前已披露的,我們近期發(fā)現(xiàn)有不法分子自2024年12月起唆使海外客服人員獲取客戶(hù)賬戶(hù)信息。我們已通知受影響用戶(hù)和監(jiān)管機(jī)構(gòu),終止了與涉事TaskUs員工及其他相關(guān)海外客服人員的合作,并加強(qiáng)了內(nèi)部管控。”Coinbase還表示,公司將對(duì)在詐騙中遭受資金損失的客戶(hù)予以賠償。
Coinbase補(bǔ)充指出,其公開(kāi)引用的4億美元這個(gè)數(shù)字是其對(duì)數(shù)據(jù)泄露總成本預(yù)估范圍的上限,下限估算為1.8億美元。
雖然冒充公司員工實(shí)施“社會(huì)工程詐騙”的方式并不新鮮,但此次黑客以BPO公司目標(biāo)所達(dá)到的規(guī)模之大實(shí)屬罕見(jiàn)。盡管目前尚未有確切證據(jù)指向具體作案者,但多條線(xiàn)索均指向了一個(gè)由講英語(yǔ)的年輕黑客組成的松散組織。
“他們來(lái)自電子游戲世界”
在5月中旬Coinbase數(shù)據(jù)泄露事件曝光后的幾天里,《財(cái)富》雜志通過(guò)Telegram與一名自稱(chēng)“puffy party”的人士進(jìn)行過(guò)信息交流,對(duì)方聲稱(chēng)自己是此次黑客事件的參與者之一。
兩位與該匿名黑客有過(guò)交流的安全研究人員對(duì)《財(cái)富》表示,他們認(rèn)為此人的話(huà)具有可信度。其中一人表示:“根據(jù)他分享給我的內(nèi)容,我認(rèn)為他的說(shuō)法值得重視,且未找到證據(jù)證明他的陳述是虛假的?!眱晌谎芯咳藛T均要求匿名,理由是擔(dān)心因與疑似黑客接觸而收到法院傳票。
在交流中,此人分享了大量據(jù)稱(chēng)是與Coinbase安全團(tuán)隊(duì)之間的電子郵件截圖。其與公司溝通時(shí)使用的姓名為“Lennard Schroeder”。他還分享了一名Coinbase前高管的賬戶(hù)截圖,顯示了該賬戶(hù)的加密貨幣交易記錄以及大量個(gè)人信息。
Coinbase方面并未否認(rèn)這些截圖的真實(shí)性。
這位自稱(chēng)黑客的人士分享的郵件中,包括要求支付價(jià)值2,000萬(wàn)美元的比特幣的勒索威脅,但Coinbase已拒絕支付。郵件中還嘲諷稱(chēng),該黑客團(tuán)伙將用部分贖金為Coinbase光頭首席執(zhí)行官布賴(lài)恩·阿姆斯特朗購(gòu)買(mǎi)假發(fā)。黑客在郵件中寫(xiě)道:“我們?cè)敢赓澲ブ舶l(fā),讓他能帶著一頭新發(fā)優(yōu)雅地走遍世界。”
在Telegram上的對(duì)話(huà)中,這位黑客(《財(cái)富》雜志從一位安全研究員處得知其存在)還表達(dá)了對(duì)Coinbase的蔑視。
雖然許多加密貨幣劫案通常由俄羅斯犯罪團(tuán)伙或朝鮮軍方實(shí)施,但這名所謂的黑客表示,此次事件是由一群松散聯(lián)系的青少年和二十出頭的年輕人所為,他們自稱(chēng)為“Comm”或“Com”——即“Community”(社區(qū))的簡(jiǎn)稱(chēng)。
過(guò)去兩年間,關(guān)于Comm組織的報(bào)道不斷出現(xiàn)在其他黑客事件的媒體報(bào)道中。本月早些時(shí)候,《紐約時(shí)報(bào)》的一篇報(bào)道中,一名涉嫌參與多起加密貨幣盜竊的嫌疑人自稱(chēng)為該組織成員。另?yè)?jù)《華爾街日?qǐng)?bào)》報(bào)道,2023年,調(diào)查人員確認(rèn)一批與“Comm”有關(guān)的黑客曾入侵拉斯維加斯多家賭場(chǎng)的線(xiàn)上系統(tǒng),并試圖向米高梅度假村(MGM Resorts)勒索3,000萬(wàn)美元。
與主要以牟利為目的的俄羅斯或朝鮮加密貨幣黑客不同,“Comm”組織成員的動(dòng)機(jī)往往源于追求關(guān)注度,或者制造惡作劇帶來(lái)的刺激感。他們有時(shí)協(xié)作發(fā)動(dòng)攻擊,有時(shí)則彼此競(jìng)爭(zhēng),看誰(shuí)能盜走更多資產(chǎn)。
加密貨幣調(diào)查取證機(jī)構(gòu)Cryptoforensic Investigators的調(diào)查主管喬?!?kù)珀-達(dá)克特表示:“他們最初來(lái)自電子游戲世界,然后把游戲里的‘高分’帶到了現(xiàn)實(shí)中。在現(xiàn)實(shí)世界里,他們的‘高分’就是偷到多少錢(qián)?!?/p>
在Telegram對(duì)話(huà)中,這位自稱(chēng)的黑客表示,“Comm”組織內(nèi)部各成員在黑客行動(dòng)中分工明確。他所在的小組負(fù)責(zé)賄賂客服人員并收集客戶(hù)數(shù)據(jù),然后將這些信息交給其他擅長(zhǎng)實(shí)施“社會(huì)工程詐騙”的團(tuán)隊(duì)操作。他補(bǔ)充道,這些與“Comm”有關(guān)的不同團(tuán)體通過(guò)Telegram和Discord等社交平臺(tái)協(xié)調(diào)各自負(fù)責(zé)的環(huán)節(jié),并約定好分贓方式。
加密貨幣調(diào)查公司Tracelon的創(chuàng)始人塞爾希奧·加西亞對(duì)《財(cái)富》雜志表示,這位黑客對(duì)Coinbase被攻擊事件的描述,與他所觀察到的“Comm”組織運(yùn)作模式及其他加密詐騙案例高度一致。一位了解安全事件的知情人士補(bǔ)充道,近期針對(duì)客戶(hù)實(shí)施“社會(huì)工程詐騙”的攻擊者所使用的是無(wú)口音的北美英語(yǔ)。
據(jù)一位了解BPO行業(yè)薪資情況的知情人士透露,TaskUs在印度的員工每月薪資在500至700美元之間。TaskUs對(duì)此拒絕置評(píng)。盡管這一收入水平高于印度人均國(guó)內(nèi)生產(chǎn)總值,但Tracelon創(chuàng)始人加西亞對(duì)《財(cái)富》雜志表示,如此低的薪資使客服人員更容易受到賄賂誘惑。
他補(bǔ)充道:“顯然,這就是整個(gè)鏈條中最薄弱的環(huán)節(jié),因?yàn)樗麄冇薪邮苜V賂的經(jīng)濟(jì)動(dòng)機(jī)?!保ㄘ?cái)富中文網(wǎng))
譯者:劉進(jìn)龍
審校:汪皓
On May 15, Coinbase revealed that criminals had stolen personal data from tens of thousands of customers—the biggest security incident in the company’s history, and one that is poised to cost it as much as $400 million. The breach is notable not only for its scale, but the way the hackers went about it: Bribing overseas customer support agents to share confidential customer records.
Coinbase has responded by publicly announcing it had put a $20 million bounty on those who stole the data, and who sought to blackmail the company so as not to reveal the incident. But it has shared few details about who carried out the attack or how the hackers were able to target its agents so successfully.
A recent investigation by Fortune, including a review of email messages between Coinbase and one of the hackers, has uncovered new details about the incident that strongly suggest a loose network of young English-speaking hackers are partly responsible. Meanwhile, the findings also highlight the role of so-called BPOs, or business process outsourcing units, as a weak link in tech firms’ security operations.
An inside job
The story starts with a small but publicly traded company based in New Braunfels, Texas, called TaskUs. Like other BPOs, it provides customer services to big tech at a low cost by employing staff overseas. In January, TaskUs laid off 226 staff members working for Coinbase from its service center in Indore, India, according to a company spokesperson.
Since 2017, according to a filing with the Securities and Exchange Commission, TaskUs has provided customer service personnel to Coinbase, an arrangement that reaps the U.S. crypto giant significant savings in labor costs. But there’s a catch, of course: When customers email to inquire about their accounts or a new Coinbase product, they’re likely talking to an overseas TaskUs employee. And because these agents earn low wages compared to workers in the U.S., they’ve proved susceptible to bribes.
“Early this year we identified two individuals who illegally accessed information from one of our clients,” a TaskUs spokesperson told Fortune, in reference to Coinbase. “We believe these two individuals were recruited by a much broader, coordinated criminal campaign against this client that also impacted a number of other providers servicing this client.”
The TaskUs firings in January came less than a month after Coinbase discovered theft of customer data, according to a regulatory filing from the company. On Tuesday, a federal class action suit filed in New York on behalf of Coinbase customers accused TaskUs of negligence in protecting customer data. “While we cannot comment on litigation, we believe these claims are without merit and intend to defend ourselves,” a TaskUs spokesperson said. “We place the highest priority on safeguarding the data of our clients and their customers and continue to strengthen our global security protocols and training programs.”
A person familiar with the security incident, who asked not to be identified in order to speak candidly, said the hackers had also targeted other BPOs, in some cases successfully, and that the nature of the data stolen varied according to each incident.
This stolen data was not enough for the hackers to break into Coinbase’s crypto vaults. But it did provide a wealth of information to help criminals pose as fake Coinbase agents, who contacted customers and persuaded them to hand over their crypto funds. The company says the hackers stole the data of over 69,000 customers, but did not say how many of these had been victims of so-called social engineering scams.
The social engineering scams in this case involved criminals who used the stolen data to impersonate Coinbase employees and persuade victims to transfer their crypto funds.
“As we’ve already disclosed, we recently discovered that a threat actor had solicited overseas agents to capture customer account information dating back to December of 2024. We notified affected users and regulators, cut ties with the TaskUs personnel involved and other overseas agents, and tightened controls,” said Coinbase in a statement, adding it is reimbursing customers who lost funds in the scams.
Coinbase also stated that the $400 million figure it has cited publicly as the overall cost of the breach is at the top end of its estimates, and that its low-end figure is $180 million.
While social engineering scams that revolve around impersonation of company representatives are hardly new, the scale at which hackers targeted BPOs does appear to be novel. And while no one has definitively identified the perpetrators, a number of clues point strongly to a loosely affiliated network of young English-speaking hackers.
‘They come from video games’
In the days following the disclosure of the Coinbase breach in mid-May, Fortune exchanged messages on Telegram with an individual who called himself “puffy party” and who claims to be one of the hackers.
Two other security researchers who spoke with the anonymous hacker told Fortune they found the individual to be credible. “Based on what he shared with me, I took his statements seriously and was unable to find evidence that his statements were false,” said one. Both researchers requested anonymity because they were afraid of receiving subpoenas for speaking with the purported hacker.
In the exchanges, the individual shared numerous screenshots of what they said were emails with Coinbase’s security team. The name they used to communicate with the company was “Lennard Schroeder.” They also shared screenshots of a Coinbase account belonging to a former executive of the company that displayed crypto transactions and extensive personal details.
Coinbase did not deny the authenticity of the screenshots.
The emails shared by the purported hacker include the blackmail threat for $20 million in Bitcoin, which Coinbase refused to pay, and mocking comments about how the hacking group would use some of the proceeds to purchase hair for Brian Armstrong, the company’s bald CEO. “We’re willing to sponsor a hair transplant so that he may graciously traverse the world with a fresh set of hair,” wrote the hackers.
In the Telegram messages, the person—whose existence Fortune learned of from a security researcher—expressed contempt for Coinbase.
Many crypto robberies are carried out by Russian criminal gangs or the North Korean military, but the alleged hacker says the job was pulled off by a loose affiliation of teenagers and 20-somethings alternatively called the “Comm” or “Com” —shorthand for the Community.
In the last two years, reports of the Comm have bubbled up in media reports about other hacking incidents, including a New York Times story earlier this month in which one of the alleged perpetrators of a series of crypto thefts identified himself as a member of the group. And in 2023, hackers, whom investigators identified as part of the Comm, targeted the online operations of a handful of Las Vegas casinos and tried to extort MGM Resorts for $30 million, according to the Wall Street Journal.
Unlike the Russian and North Korean crypto hackers, who are typically seeking only money, members of the Comm are often motivated by attention seeking or the thrill of mischief as well. They sometimes collaborate on hacking attacks but also compete with each other to see who can steal more.
“They come from video games, and then they bring their high scores into the real world,” said Josh Cooper-Duckett, director of investigations at Cryptoforensic Investigators. “And their high score in this world is how much money they steal.”
In the Telegram messages, the purported hacker said that members of the Comm specialize in different parts of a heist. The hacker’s team bribed the customer support agents and gathered the customer data, which they gave to others outside of their group who are well-versed in carrying out social engineering scams. They added that different Comm-affiliated groups coordinated on social platforms like Telegram and Discord about how to carry out different portions of the operation and agreed to split the proceeds.
Sergio Garcia, founder of the crypto investigations company Tracelon, told Fortune that the hacker’s description of the Coinbase exploit mirrors his observations of how the Comm operates and other crypto social engineering scams. The person familiar with the security incidents said those who targeted customers in recent social engineering scams spoke in unaccented North American English.
TaskUs workers in India are paid between $500 and $700 per month, according to a source familiar with the BPO workers’ wages. TaskUs declined to comment. Even though that amounts to more than India’s gross domestic product per person, the low wages of customer support agents often make them more susceptible to bribes, Garcia told Fortune.
“Obviously that’s the weakest point in the chain, because there is an economic reason for them to accept the bribe,” he added.