{"id":214867,"date":"2025-06-02T12:41:02","date_gmt":"2025-06-02T19:41:02","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=214867"},"modified":"2025-06-02T13:10:45","modified_gmt":"2025-06-02T20:10:45","slug":"how-to-protect-your-crypto-after-the-coinbase-breach","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/","title":{"rendered":"How to Protect Your Crypto After the Coinbase Breach"},"content":{"rendered":"<p>In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently <a href=\"https:\/\/www.coinbase.com\/blog\/protecting-our-customers-standing-up-to-extortionists\">disclosed a data breach<\/a> impacting nearly 70,000 users. This breach, attributed to &#8220;insider wrongdoing,&#8221; exposed sensitive personal information. This post details how the breach occurred, what data was compromised, and, most importantly, provides crucial steps you can take to protect yourself from potential follow-on attacks and identity theft.<\/p>\n<p>This comprehensive guide will delve into the specifics of this breach: how the &#8220;insider wrongdoing&#8221; facilitated the attack, precisely what information was exposed, and the immediate, actionable steps you can take to safeguard your digital assets and personal identity in the wake of this incident.<\/p>\n<h2>What Happened in the Coinbase Breach?<\/h2>\n<p>According to a filing with the Office of the Maine Attorney General, which mandates public disclosure for such incidents, a total of 69,461 individuals were affected by this breach. The incident itself occurred on December 26, 2024, though the first signs of the compromise were only detected on May 11, 2025. This timeline is not uncommon for data breaches, as it can often take months for criminal activity to be fully uncovered.<\/p>\n<p>Coinbase&#8217;s official statement details the progression of the breach:<\/p>\n<blockquote><p>Criminals targeted our customer support agents overseas. They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1% of Coinbase monthly transacting users. Their aim was to gather a customer list they could contact while pretending to be Coinbase\u2014tricking people into handing over their crypto. They then tried to extort Coinbase for $20 million to cover this up.<\/p><\/blockquote>\n<p>In a firm stance against such criminal activity, Coinbase has publicly refused to pay the ransom. Instead, the company has established a substantial $20 million reward fund, offering it for information that leads to the arrest and conviction of the attackers responsible.<\/p>\n<h2>What Information Was Stolen in the Coinbase Data Breach?<\/h2>\n<p>The attackers gained access to a range of sensitive user data. <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1679788\/000167978825000094\/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343\">According to Coinbase,<\/a> the compromised information includes:<\/p>\n<p>\u2022 <strong>Personal Identifiers<\/strong>: Names, physical addresses, phone numbers, and email addresses.<br \/>\n<strong>\u2022 Financial Data (Masked):<\/strong> Masked Social Security numbers (last 4 digits only) and masked bank account numbers, along with some bank account identifiers.<br \/>\n\u2022<strong> Identity Documents:<\/strong> Images of government-issued IDs (e.g., driver\u2019s licenses, passports).<br \/>\n\u2022<strong> Account Activity<\/strong>: Snapshots of account balances and transaction history.<br \/>\n\u2022 <strong>Limited Corporate Data:<\/strong> Documents, training materials, and communications accessible to support agents.<\/p>\n<p>Crucially, Coinbase has confirmed that the attackers did not gain access to the following critical elements:<\/p>\n<p>\u2022 Login credentials or two-factor authentication (2FA) codes.<br \/>\n\u2022 Private keys associated with user wallets.<br \/>\n\u2022 Any direct ability to move or access customer funds.<br \/>\n\u2022 Access to &#8220;Coinbase Prime&#8221; accounts.<br \/>\n\u2022 Access to any Coinbase or Coinbase customer hot or cold wallets.<strong><br \/>\n<\/strong><\/p>\n<h2>What is Coinbase Doing About the Breach of Customer Information?<\/h2>\n<p>To summarize the company\u2019s own words, they\u2019re &#8220;protecting their customers and standing up to extortionists\u201d by taking several steps. Highlights of their response include:<\/p>\n<p>\u2022 Affected Account Holder Notifications: Email notifications were dispatched to all affected account holders on May 15, 2025. Furthermore, &#8220;flagged accounts now require additional ID checks on large withdrawals and include mandatory scam-awareness prompts.&#8221;<br \/>\n\u2022 Enhanced Defenses: The company is significantly increasing its investment in insider-threat detection and automated response systems. They are also &#8220;simulating similar security threats to find failure points in any internal system.&#8221;<br \/>\n\u2022 Securing Support Operations: Coinbase plans to open a new support hub within the U.S. and implement &#8220;stronger security controls and monitoring across all locations.&#8221;<\/p>\n<p>Additionally, Coinbase is actively collaborating with law enforcement agencies and intends to pursue criminal charges against the insiders involved, who were reportedly terminated immediately upon discovery of their involvement.<\/p>\n<h2>What Will Scammers Do With the Stolen Coinbase Information?<\/h2>\n<p>For one, the people holding the stolen data apparently attempted to extort the company\u2014a ransom that the company says it will not pay, as covered above. With that, there\u2019s the possibility the people involved might turn to other buyers or release the info on the dark web, whether for sale or for free.<br \/>\nAs with any breach, expect follow-on scams in the wake of this breach, as a potential wave of scammers might pose as Coinbase employees. Some might use the stolen info to make the scam sound more credible, some might not. Regardless, this attack calls for extra vigilance on the part of Coinbase users and crypto holders in general.<br \/>\nCoinbase offered specific guidance for its users, which we\u2019ll add to\u2014all so Coinbase users and crypto traders in general can stay safer.<\/p>\n<p>Coinbase suggests:<\/p>\n<p>\u2022 <strong>Turn on withdrawal allow listing<\/strong>\u202f\u2014Only permit transfers to wallets that you are confident you fully control and where the seed phrase is secure and was not provided to you or shared with anyone.<br \/>\n\u2022 <strong>Enable strong two-factor authentication<\/strong>\u202f\u2014Hardware keys are best.<br \/>\n\u2022 <strong>Hang up on imposters<\/strong>\u202f\u2014Coinbase will never ask for your password, 2FA codes, or to move funds to a \u201csafe\u201d wallet.<br \/>\n\u2022 <strong>Lock first, ask later<\/strong> \u2014If something feels off, lock your account in-app and email security@coinbase.com.<\/p>\n<h2>McAfee&#8217;s Essential Safeguards<\/h2>\n<p><strong>Beyond Coinbase&#8217;s advice, McAfee offers robust solutions to further protect yourself:<\/strong><\/p>\n<p><strong>Protect yourself from scammers<\/strong><\/p>\n<p>\u2022 <strong>McAfee Scam Detector:<\/strong> Our advanced Scam Detector technology is designed to identify and block scams across text messages, emails, and videos. This is particularly crucial after a breach, as scammers might send bogus &#8220;account alerts&#8221; with links to phishing sites. Scam Detector automatically detects these threats and blocks risky links, even if you accidentally click them.<\/p>\n<p>\u2022 <strong>Reduce Your Digital Footprint:<\/strong> Limit the amount of personal information available to scammers. The more details they have about you, the more credible their phishing attempts can appear.<\/p>\n<p>\u2022 <strong>McAfee Personal Data Cleanup:<\/strong> Many scammers gather information from data broker sites. Our Personal Data Cleanup service scans the riskiest data broker sites, identifies where your personal information is being sold, and, depending on your McAfee+ plan, can help you remove it.<\/p>\n<p>\u2022 <strong>McAfee Social Privacy Manager<\/strong>: Social media platforms are notorious for being a source of personal information for scammers. McAfee Social Privacy Manager allows you to adjust over 100 privacy settings across your social media accounts in just a few clicks, significantly enhancing your online privacy.<\/p>\n<p>These features are all included in our comprehensive McAfee+ plans.<\/p>\n<h2>How to Protect Yourself from Identity Theft<\/h2>\n<p>Follow-on attacks after data breaches often involve identity theft. With pieces of personal info that they can puzzle together, thieves then try to open new accounts, lines of credit, and so forth in someone else\u2019s name. Protection like the following, also included in our <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/family.html?path=blogs\">McAfee+ plans,<\/a> can keep you safer.<\/p>\n<p>Transaction Monitoring and <a href=\"https:\/\/www.mcafee.com\/learn\/credit-monitoring?path=blogs\">Credit Monitoring<\/a> help you spot any questionable financial activity quickly. Meanwhile, <a href=\"https:\/\/www.mcafee.com\/learn\/security-freeze?path=blogs\">Security Freeze<\/a> can prevent unauthorized access to existing credit card, bank, and utility accounts or from new ones being opened in your name.<\/p>\n<p>And if identity theft unfortunately happens to you, up to <a href=\"https:\/\/www.mcafee.com\/learn\/identity-theft-coverage?path=blogs\">$2 million in ID theft coverage &amp; restoration<\/a> can help you recover quickly.<\/p>\n<p>Additionally, <a href=\"https:\/\/www.mcafee.com\/learn\/identity-monitoring?path=blogs\">Identity Monitoring<\/a> scans the dark web for your personal info, including email, government IDs, credit card and bank account numbers, and more. It helps keep your personal info safe, with early alerts if your data is found on the dark web, an average of 10 months ahead of similar services.<\/p>\n<p>The Coinbase data breach serves as a stark reminder of the persistent threats in the digital world. While Coinbase is taking steps to address the breach, proactive personal security measures are paramount. By implementing the recommendations from both Coinbase and McAfee, you can significantly reduce your risk of falling victim to scams and identity theft. Stay vigilant, secure your accounts, and protect your digital life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users&#8230;.<\/p>\n","protected":false},"author":1407,"featured_media":214888,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670],"tags":[],"coauthors":[15735],"class_list":["post-214867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Crypto After the Coinbase Breach | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Crypto After the Coinbase Breach | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-02T19:41:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T20:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Protect Your Crypto After the Coinbase Breach\",\"datePublished\":\"2025-06-02T19:41:02+00:00\",\"dateModified\":\"2025-06-02T20:10:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\"},\"wordCount\":1263,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg\",\"articleSection\":[\"How To Guides and Tutorials\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\",\"name\":\"How to Protect Your Crypto After the Coinbase Breach | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg\",\"datePublished\":\"2025-06-02T19:41:02+00:00\",\"dateModified\":\"2025-06-02T20:10:45+00:00\",\"description\":\"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg\",\"width\":600,\"height\":343,\"caption\":\"Cali, Colombia - July 20, 2021: Bitcoin BTC representation coin with Coinbase exchange logo in background. Coinbase is a cryptocurrency exchange that provides a platform for trading cryptocurrencies.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Protect Your Crypto After the Coinbase Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Crypto After the Coinbase Breach | McAfee Blog","description":"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Crypto After the Coinbase Breach | McAfee Blog","og_description":"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.","og_url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-06-02T19:41:02+00:00","article_modified_time":"2025-06-02T20:10:45+00:00","og_image":[{"width":600,"height":343,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Protect Your Crypto After the Coinbase Breach","datePublished":"2025-06-02T19:41:02+00:00","dateModified":"2025-06-02T20:10:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/"},"wordCount":1263,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg","articleSection":["How To Guides and Tutorials"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/","url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/","name":"How to Protect Your Crypto After the Coinbase Breach | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg","datePublished":"2025-06-02T19:41:02+00:00","dateModified":"2025-06-02T20:10:45+00:00","description":"In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_207103559.jpg","width":600,"height":343,"caption":"Cali, Colombia - July 20, 2021: Bitcoin BTC representation coin with Coinbase exchange logo in background. Coinbase is a cryptocurrency exchange that provides a platform for trading cryptocurrencies."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/how-to-protect-your-crypto-after-the-coinbase-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"How to Protect Your Crypto After the Coinbase Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/214867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=214867"}],"version-history":[{"count":7,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/214867\/revisions"}],"predecessor-version":[{"id":214905,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/214867\/revisions\/214905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/214888"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=214867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=214867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=214867"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=214867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}