{"id":94051,"date":"2026-02-07T07:00:00","date_gmt":"2026-02-07T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=94051"},"modified":"2026-02-07T07:02:03","modified_gmt":"2026-02-07T04:02:03","slug":"coinbase-confirms-data-leak-record-ransom-in-russia-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/coinbase-confirms-data-leak-record-ransom-in-russia-and-other-cybersecurity-news\/","title":{"rendered":"Coinbase confirms data leak, record ransom in Russia and other cybersecurity news"},"content":{"rendered":"<p>We have compiled the week\u2019s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Coinbase confirmed a user-data leak.<\/li>\n<li>The operator of a major darknet drug market was sentenced to 30 years.<\/li>\n<li>DeFi platform Step Finance lost $40m after a breach of treasury wallets.<\/li>\n<li>Global Ledger: crypto scammers are giving victims ever less time to react.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Coinbase confirms user-data leak<\/h2>\n<p>Attackers accessed information belonging to 30 Coinbase customers, the exchange confirmed, according to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots\/\">BleepingComputer<\/a>.<\/p>\n<p>The statement followed soon after the Scattered Lapsus$ Hunters group posted, then deleted, screenshots in Telegram of Coinbase\u2019s internal support interface. The panel showed access to customer data\u2014email addresses, names, dates of birth, phone numbers, <span data-descr=\"know your customer\" class=\"old_tooltip\">KYC<\/span> information, cryptocurrency wallet balances and transactions.<\/p>\n<p>The leak occurred in December 2025 and is unrelated to an earlier incident. It remains unclear whether the group was directly involved in the latest attack.<\/p>\n<h2 class=\"wp-block-heading\">Operator of a major darknet drug market gets 30 years<\/h2>\n<p>On February 3rd a court sentenced the alleged operator of the Incognito Market darknet drug platform, Rui-Xiang Lin, to 30 years in prison, <a href=\"https:\/\/www.justice.gov\/usao-sdny\/pr\/incognito-market-owner-sentenced-30-years-operating-one-worlds-largest-online\">the U.S. Department of Justice reported<\/a>.<\/p>\n<p>Prosecutors said the sentence closes one of the largest cases against illicit marketplaces since <a href=\"https:\/\/forklog.com\/en\/news\/silk-road-wallets-transfer-3-million-in-bitcoin\">Silk Road<\/a>.<\/p>\n<p>Each listing on Incognito Market was posted by a specific seller. To become one, users had to register on the site and pay an entry fee. The platform charged a 5% commission on sales.<\/p>\n<p>Proceeds funded Incognito Market\u2019s operations, including server costs and staff incentives. Authorities say Lin\u2019s net profit exceeded $6m.<\/p>\n<p>To simplify finances, Incognito Market ran its own \u201cbank\u201d (Incognito Bank), allowing users to deposit crypto directly into site accounts. After a drug sale closed, funds moved from the buyer\u2019s account to the seller\u2019s address minus commission, preserving a degree of anonymity.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-03035c25ddcc6793-5616799626546013.webp\" alt=\"image\" class=\"wp-image-274803\"\/><figcaption class=\"wp-element-caption\">Source: U.S. Department of Justice.<\/figcaption><\/figure>\n<p>Investigators identified the group through blockchain analysis and undercover buys, as well as Lin\u2019s basic cybersecurity blunders:<\/p>\n<ul class=\"wp-block-list\">\n<li>domain registration. Forensic analysts traced the marketplace domain to Lin because he used his real name, personal phone number and address;<\/li>\n<li>biography. Lin <a href=\"https:\/\/tw.news.yahoo.com\/%E8%81%B0%E6%98%8E3%E5%B9%B4%E7%B3%8A%E5%A1%971%E7%A7%92-%E5%8F%B0%E5%A4%A7%E5%AD%B8%E9%9C%B8%E6%AF%92%E6%A2%9F-%E8%90%BD%E7%B6%B2%E7%AB%9F%E5%9B%A0%E5%AF%A6%E5%90%8D%E5%88%B6%E8%A8%BB%E5%86%8A-054750957.html\">studied<\/a> at National Taiwan University, then performed alternative civilian service in Saint Lucia. There he worked as a technical assistant and even taught local police methods to combat cybercrime and work with cryptocurrencies in his spare time.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">DeFi platform Step Finance loses $40m after treasury-wallet hack<\/h2>\n<p>On January 31st Step Finance <a href=\"https:\/\/x.com\/StepFinance_\/status\/2018379876642804213\">disclosed<\/a> a security breach. External specialists helped the DeFi platform recover part of the stolen assets.<\/p>\n<p>Several treasury wallets were compromised via a \u201cwell-known attack vector\u201d, the team said. CertiK initially estimated losses at 261,854 SOL (about $28.9m at the time), but the figure rose to roughly $40m as the investigation progressed.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/CertiKInsight?src=hash&#038;ref_src=twsrc%5Etfw\">#CertiKInsight<\/a> \ud83d\udea8<\/p>\n<p>We have seen a security breach of <a href=\"https:\/\/twitter.com\/StepFinance_?ref_src=twsrc%5Etfw\">@StepFinance_<\/a> treasury wallets.<a href=\"https:\/\/t.co\/Zi3tMKaTqE\">https:\/\/t.co\/Zi3tMKaTqE<\/a><\/p>\n<p>261,854 SOL (~$28.9M) has been withdrawn after stake authorization had been transferred to<a href=\"https:\/\/t.co\/o51kREYPHW\">https:\/\/t.co\/o51kREYPHW<\/a> <\/p>\n<p>Stay Vigilant! <a href=\"https:\/\/t.co\/GrxpyzI2Uv\">pic.twitter.com\/GrxpyzI2Uv<\/a><\/p>\n<p>\u2014 CertiK Alert (@CertiKAlert) <a href=\"https:\/\/twitter.com\/CertiKAlert\/status\/2017610781660217643?ref_src=twsrc%5Etfw\">January 31, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>At the time of writing, about $3.7m in Remora assets and $1m in other tokens had been recovered, thanks to the <span data-descr=\"enhanced SPL token standard\" class=\"old_tooltip\">Token22<\/span> safeguards and coordination with partners.<\/p>\n<p>Some operations were paused to tighten security. The team said its Remora Markets protocol is isolated from the incident and that all rTokens remain fully backed 1:1.<\/p>\n<p>Users were <a href=\"https:\/\/x.com\/StepFinance_\/status\/2019380776760905882\">advised<\/a> not to interact with the STEP token until the investigation concludes. A pre-attack network snapshot is planned to inform compensation decisions.<\/p>\n<p>Step Finance has not disclosed details of the attack or the attackers\u2019 identities, prompting community speculation about a possible exit scam or insider involvement. These allegations have not been refuted so far.<\/p>\n<h2 class=\"wp-block-heading\">Global Ledger: crypto scammers are leaving victims less time to respond<\/h2>\n<p>In 2025, hackers targeting cryptocurrencies left victims progressively less time to react, conclude experts at <a href=\"https:\/\/blog.globalledger.io\/hubfs\/Press%20Materials\/Laundering_Race_2025.pdf\">Global Ledger<\/a>.<\/p>\n<p>Laundering sped up in the second half compared with the first, reaching new extremes. The report cites a case in which funds moved in just two seconds\u2014twice as fast as in H1 and twice as fast as the quickest public alert.<\/p>\n<p>In most cases, attackers began moving funds before the market learned of the breach itself. On average last year this occurred in roughly 76.4% of incidents. In H2 the rate rose to 84.6%, from 68.1% in H1.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-cd99fd7bc9fc93d6-5616800255153499-1024x566.png\" alt=\"image\" class=\"wp-image-274804\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-cd99fd7bc9fc93d6-5616800255153499-1024x566.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-cd99fd7bc9fc93d6-5616800255153499-300x166.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-cd99fd7bc9fc93d6-5616800255153499-768x425.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-cd99fd7bc9fc93d6-5616800255153499.png 1418w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Global Ledger.<\/figcaption><\/figure>\n<p>At the same time, the laundering phase itself slowed by about 25% on average: from roughly eight days in H1 to 10.6 days in H2.<\/p>\n<p>According to Global Ledger, in H2 hackers split sums more aggressively and relied more on non-custodial wallets, DeFi protocols, <span data-descr=\"decentralised exchanges\" class=\"old_tooltip\">DEX<\/span>, <a href=\"https:\/\/forklog.com\/en\/news\/what-are-cross-chain-bridges\">cross-chain bridges<\/a> and mixers.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055-1024x389.png\" alt=\"image\" class=\"wp-image-274805\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055-1024x389.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055-300x114.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055-768x292.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055-1536x584.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-05621cc0317fc3df-5616800397555055.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Global Ledger.<\/figcaption><\/figure>\n<p>After sanctions were lifted, use of <a href=\"https:\/\/forklog.com\/en\/news\/what-is-the-tornado-cash-mixer-and-why-was-it-sanctioned\">Tornado Cash<\/a> rose by more than 31 percentage points. Over the year, the mixer handled more than $2.05bn in Ethereum, about $655m of which was high risk. The share of funds exiting Tornado Cash to <span data-descr=\"centralised exchanges\" class=\"old_tooltip\">CEX<\/span> increased from 0.16% (during restrictions) to 4.74% (after they were lifted).<\/p>\n<p>Roughly 64% of incidents involved smart-contract hacks, the researchers said. Yet the largest losses\u2014$1.5bn\u2014hit users who signed fake approvals.<\/p>\n<h2 class=\"wp-block-heading\">Crypto extortionists set a record in Russia<\/h2>\n<p>In January 2025 hackers demanded a record ransom in cryptocurrency from a Russian fishing company, according to <a href=\"https:\/\/www.f6.ru\/cybercrime-trends-annual-report-2025-2026\/\">F6<\/a>.<\/p>\n<p>The attackers demanded 50 BTC (about 500m rubles at the time of publication) to restore access to encrypted data. The victim\u2019s name was not disclosed.<\/p>\n<p>For the Russian market this is the largest ransom on record. The attack was linked to the CyberSec\u2019s group, known for hacking Russian firms and online resources, stealing data and publishing it. The group gained wider notoriety after the leak of the sysadmins.ru forum database and claims of mass breaches of Bitrix servers.<\/p>\n<h2 class=\"wp-block-heading\">Notepad++ developer discloses details of the breach<\/h2>\n<p>On February 2nd Notepad++ developer Don Ho <a href=\"https:\/\/notepad-plus-plus.org\/news\/hijacked-incident-info-update\/\">shared<\/a> findings from an investigation involving external cybersecurity experts and staff at the project\u2019s former hosting provider.<\/p>\n<p>He said the service was attacked back in June 2025 via a compromise at the hosting-provider level.<\/p>\n<p>The attackers acted surgically, targeting specific victims. Several independent experts concluded the attack was carried out by a Chinese \u201cgovernment\u201d group.<\/p>\n<p>The hosting server that housed the site and its update mechanism was compromised until September 2nd 2025. Maintenance took place that day, after which suspicious patterns disappeared from the logs.<\/p>\n<p>The backdoor let the hackers redirect part of the traffic going to notepad-plus-plus.org\/update\/getDownloadUrl.php to their own servers, where victims were served update URLs containing malicious files.<\/p>\n<p>Version 8.9.2 is expected within a month\u2014certificate and signature verification will become mandatory. Don Ho recommended users manually download version 8.9.1, which already includes the required safeguards.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>A Chainstory study <a href=\"https:\/\/forklog.com\/en\/news\/chainstory-study-uncovers-scam-indicators-in-most-crypto-press-releases\">found<\/a> signs of scam in most crypto press releases.<\/li>\n<li>A vulnerability was <a href=\"https:\/\/forklog.com\/en\/news\/security-flaw-discovered-in-ai-agent-social-network-moltbook\">found<\/a> in the Moltbook social network for AI agents.<\/li>\n<li>Curve Finance\u2019s CrossCurve bridge was <a href=\"https:\/\/forklog.com\/en\/news\/crosscurve-bridge-hacked-for-3-million\">hacked<\/a> for $3m.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>Andrey Asmakov explores whether humans will retain the right to intervene in the work of AI agents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A roundup of the week\u2019s key cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":94052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"The week's key cybersecurity news: Coinbase leak, Step Finance hack, record ransom, and more.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-94051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"248","promo_type":"1","layout_type":"1","short_excerpt":"The week's key cybersecurity news: Coinbase leak, Step Finance hack, record ransom, and more.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=94051"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94051\/revisions"}],"predecessor-version":[{"id":94053,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94051\/revisions\/94053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/94052"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=94051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=94051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=94051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}