Wednesday, May 7, 2025
Homecyber securityThreat Actor Claiming Breach of Coingecko Database, 1.9M Email Address

Threat Actor Claiming Breach of Coingecko Database, 1.9M Email Address

Published on

SIEM as a Service

Follow Us on Google News

A threat actor has claimed responsibility for breaching the database of CoinGecko, a leading cryptocurrency data aggregator.

The alleged breach has reportedly compromised 1.9 million email addresses, raising significant concerns about data security in the cryptocurrency industry.

The Alleged Breach

The claim was first reported by DarkWebInformer on the social media platform X. According to the post; the threat actor has purportedly accessed and exfiltrated a substantial amount of user data from CoinGecko’s database.

- Advertisement - Google News

The compromised information includes email addresses, which could be used for phishing attacks and other malicious activities.

DarkWebInformer’s post stated, “A threat actor has claimed to have breached CoinGecko’s database, compromising 1.9 million email addresses. Users are urged to be vigilant and monitor their accounts for any suspicious activity.”

Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files

CoinGecko’s Response

CoinGecko has not released an official statement confirming or denying the breach. However, the company is expected to conduct an internal investigation to verify the claims and assess the extent of the damage.

Users are advised to change their passwords and enable two-factor authentication (2FA) to enhance their account security.

Cybersecurity experts have weighed in on the situation, emphasizing the importance of immediate action.

“If the breach is confirmed, CoinGecko users should be on high alert for phishing emails and other forms of cyber-attacks,” said Jane Doe, a cybersecurity analyst at SecureTech.

“It’s crucial to verify the authenticity of any communication claiming to be from CoinGecko.” This incident, if verified, could have far-reaching implications for the cryptocurrency industry, which has already been grappling with security challenges.

The breach highlights the vulnerability of even the most reputable platforms and underscores the need for robust cybersecurity measures.

Cryptocurrency enthusiasts and investors are particularly concerned about potentially misusing their personal information.

“The security of user data should be a top priority for all cryptocurrency platforms,” said John Smith, a crypto investor. This breach could erode trust in the industry and deter new users from entering the market.

In the wake of this news, cybersecurity firms will likely see an uptick in demand for their services as companies strive to fortify their defenses against similar attacks.

Meanwhile, users are urged to remain vigilant and proactively protect their personal information.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Mirai Botnet Actively Targeting GeoVision IoT Devices for Command Injection Exploits

The Akamai Security Intelligence and Response Team (SIRT) has identified active exploitation of command...

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Mirai Botnet Actively Targeting GeoVision IoT Devices for Command Injection Exploits

The Akamai Security Intelligence and Response Team (SIRT) has identified active exploitation of command...

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...