Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

What’s Better? The MAGA Account Vs. The Child IRA

May 17, 2025

College majors with the best, worst job prospects

May 17, 2025

Texas credit union’s members OK merger with big CEO payout

May 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»Coinbase breach underscores insider risk in finance
Banking

Coinbase breach underscores insider risk in finance

May 16, 2025No Comments8 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Coinbase breach underscores insider risk in finance
Share
Facebook Twitter LinkedIn Pinterest Email

A recent cybersecurity incident at crypto exchange Coinbase, which was the result of a threat actor bribing some of the company’s customer support agents, serves as a reminder to U.S. financial institutions about the persistent and evolving threats posed by insiders.

The threat actor in this case appears to have obtained information by paying multiple contractors or employees working for the company in support roles outside the U.S. Coinbase did not say where these employees lived and worked, nor did it identify the threat actor.

The bribed insiders collected data from internal Coinbase systems they could access as part of their job responsibilities. Coinbase said its security monitoring independently detected instances of this improper data access in the months prior to receiving an extortion email.

Upon discovering these access instances, Coinbase terminated the involved personnel and implemented heightened fraud-monitoring protections. The company also warned customers whose information was potentially accessed to prevent misuse.

The fallout of the Coinbase breach

While Coinbase stated it has not experienced material operational impacts as of the date of the report, it is still assessing the full financial impact. Preliminary estimates for expenses related to remediation costs and voluntary customer reimbursements range from approximately $180 million to $400 million, according to a public financial disclosure.

The crypto exchange also suggested that the attack could result in targeted attempts to scam customers out of money by leveraging the personal information stolen in the breach. Coinbase said it would reimburse customers who get tricked into sending the threat actors money.

“Expect imposters,” the company warned customers. “Scammers — related to this incident or not — may pose as Coinbase employees and try to pressure you into moving your funds.

Instead of paying the $20 million ransom demanded by the threat actor, Coinbase said it refused and established a $20 million reward fund for information leading to the arrest and conviction of the attackers.

Coinbase also implemented extra customer safeguards, such as requiring additional ID checks on large withdrawals for flagged accounts and showing scam-awareness prompts to these accounts, the company said. Additionally, Coinbase said it is increasing investment in insider-threat detection, automated response and simulating similar security threats.

What makes insider threats different in cybersecurity

Insider threats are a human problem requiring human solutions, rather than solely technical ones, according to a report for critical infrastructure entities about insider threat mitigation, created by the National Counterintelligence and Security Center (NCSC).

See also  The CD catch-22: Why locking up your money now could be risky

“Technology can enable organizations to get a better sense of workforce behavior, particularly in its virtual domains, but the most important resource an organization has to counter insider threats is the workforce itself,” the report reads.

Because insiders have authorized access to systems, sensitive data and knowledge of business processes, detecting their malicious actions can be challenging. In many cases, the only signals of an impending attack are commonly exhibited human behaviors that foreshadow the attacker’s intent.

Insider threat management programs

Proactive insider threat programs work to identify risk indicators by focusing on anomalous human behaviors so early intervention can occur, according to the NCSC report.

SIFMA recommends developing an insider risk protection strategy that considers criticality, vulnerability and the source of potential threats. It also recommends developing criteria for anomalous behavior that focuses the program on intentional and unintentional threats.

Although the vast majority of insider risk activities are due to accidents or negligence, there are malicious insiders determined to steal sensitive information or cause harm, according to the NCSC.

An effective insider threat program is not just a security or cybersecurity program; it is a unique discipline focused on human behavior, looking for anomalies and contextualizing them, according to NCSC. It requires incorporating components from across the organization, including human resources, security, cybersecurity/information security, legal and front-line leaders.

Crucially, successful programs are fueled by an upward flow of information from the workforce to managers. Employees and managers observing behaviors in the real world are often the most effective “sensors” for potential insider threats, as the NCSC report put it.

“Such flow of information may seem like an employee responsibility, but the conditions for such flow are set by the leadership of an organization — based on corporate policy, training and awareness measures, expectations on adverse reactions, adjudication, and the cultural dimensions of trust,” reads the report.

Behaviors a manager might want to flag are not limited to network security violations, such as downloading large amounts of data or altering code on sensitive files. Managers should also watch out for personnel issues, such as an employee getting into disputes with co-workers or superiors or showing signs of absenteeism, according to NCSC.

“Recent studies of insider threats further demonstrate that certain situational or environmental factors affecting the business may increase the likelihood of an insider attack,” reads the NCSC report.

See also  Pro-Russia hackers target Italian banks with DDoS attack

The report cites businesses undergoing a merger, acquisition or significant reorganization as potentially having a higher proportion of employees that are “disgruntled, stressed” or otherwise prone to destructive behavior due to uncertainty about their own future or a perceived lack of organizational control.

Managing privileged access to information

The Coinbase incident involved personnel abusing their access. This highlights the risk associated with privileged access. Firms should have processes to ensure access privileges are revoked promptly for former employees and malicious insiders, according to SIFMA. Limiting access to sensitive files and systems to only those who need it is also crucial.

Technical controls, such as network monitoring software or behavioral analytics platforms, are important for detecting suspicious activity like high-volume data transfers. Investing in insider-threat detection tools and monitoring systems is necessary. However, these tools must be deployed carefully to balance security with privacy considerations, SIFMA’s report said.

Furthermore, regular training and awareness programs for all personnel are essential, according to Narendran Vaideeswaran, chief information officer at Crowdstrike. This training should cover protocols for handling sensitive information, responsibilities for reporting suspicious activities and avoiding security vulnerabilities.

Third parties as insider threats

Given that the threat actors in the Coinbase case paid overseas contractors, according to the company’s SEC filing, the incident also touches upon third-party risk.

Financial firms often rely on third-party vendors, which introduces risks if the third party’s security practices are not adequate. Banks must carefully vet and monitor third-party providers, ensuring they have robust security measures in place to protect shared data, according to Mara Alioto and Jessie Cheng, two attorneys whose practices cover financial services.

Insider threats originate from individuals within the organization who have authorized access to facilities, personnel and information. This includes current or former employees, contractors, vendors and partners. Therefore, third-party threats can be viewed as a specific category or source of insider threat, arising when an external entity is granted internal access and trust.

Both malicious insiders and compromised third parties (where external actors exploit a third party’s access) can use this authorized access, making their activities potentially appear legitimate and difficult to detect with traditional security tools focused on external threats.

Given the reliance of financial institutions on third parties for key operations and sensitive data storage, managing the risks they pose is critical, and regulators are intensifying their focus on this area. Banks cannot diminish or remove their responsibilities for operating in a safe and sound manner and ensuring compliance simply by outsourcing activities to a third party.

See also  Personal Finance Tips From The Remote Work Boom

Eight recommendations for banks

To counter bribes and insider threats, here are eight recommendations for banks, based on advice from Atioto and Cheng, Vaideeswaran, SIFMA, NCSC, FDIC and fTLD:

  1. Cultivate a strong ethical culture: Foster an environment where integrity is paramount and employees feel empowered and safe to report suspicious activity without fear of retaliation. A strong ethical foundation makes employees less susceptible to initial approaches for bribery.
  2. Implement rigorous vetting and continuous monitoring: Conduct thorough background checks during hiring, especially for roles that involve access to sensitive data or critical systems, including for third-party vendors and outsourced staff. Implement ongoing monitoring of employee behavior and system access for anomalies that might indicate an insider is compromised or acting improperly.
  3. Enforce principle of least privilege and segregation of duties: Limit employee access to only the data and systems absolutely necessary for their specific job functions. Implement segregation of duties so that no single employee has complete control over a critical process or access to multiple sensitive areas, making it harder for one bribed individual to cause a significant breach alone.
  4. Enhance security controls and monitoring: Use technical controls such as strong authentication (including multi-factor authentication), data loss prevention systems to monitor and prevent unauthorized data exfiltration, and user and entity behavior analytics to detect unusual patterns of activity that could signal a bribe influencing behavior.
  5. Provide targeted security awareness training: Train employees specifically on the risks of bribery attempts and social engineering tactics. Educate them on how to recognize potential signs of being targeted for bribery and the proper procedures for reporting such incidents.
  6. Establish clear internal reporting mechanisms: Ensure employees have accessible, confidential, and trusted channels to report any concerns about potential bribery, corruption, or suspicious activity they observe.
  7. Manage third-party risk: Apply stringent security and anti-bribery requirements to all third-party vendors and outsourced service providers who have access to bank systems or customer data. Regularly audit and monitor their compliance and security posture.
  8. Integrate anti-bribery efforts with cybersecurity and risk management: Ensure that compliance, internal audit, legal, HR and cybersecurity teams collaborate closely to identify, assess, and mitigate risks related to bribery and insider threats. Information sharing between these functions is crucial.

Source link

breach Coinbase Finance insider risk underscores
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous ArticleMinnesota Court Of Appeals Issues First UPEPA Decision In Dalvin Cook Case
Next Article Eliminating Social Security benefit tax vs. senior bonus

Related Posts

Texas credit union’s members OK merger with big CEO payout

May 17, 2025

Appeals court hears CFPB argument for 90% reduction in force

May 16, 2025

Banks turn to little-used financing option for buyouts

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Berkshire Hathaway BRK earnings Q3 2024

November 3, 2024

Ex-Russian politician caught in the British sanction case for 40 months

April 11, 2025

Steve Bannon To Be Released From Prison This Week, Right On Time

October 28, 2024
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

What’s Better? The MAGA Account Vs. The Child IRA

May 17, 2025

College majors with the best, worst job prospects

May 17, 2025

Texas credit union’s members OK merger with big CEO payout

May 17, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.