See Virtru In Action
Crypto giant Coinbase recently disclosed a security breach that exposed sensitive customer data, including government-issued IDs, Social Security numbers, account balances, and other internal documentation. Interestingly, this attack was not the result of advanced malware or a brute-force attack—it was an inside job.
Hackers reportedly paid overseas contractors and support staff to exfiltrate data from Coinbase’s internal systems, capitalizing on the access those employees had to perform their daily responsibilities. The breach affected fewer than 1% of Coinbase’s nearly 10 million monthly customers—but the fallout is still significant: a ransom demand of $20 million and estimated costs up to $400 million in remediation and reimbursements.
This incident reinforces a hard truth: perimeter-based security alone is no longer sufficient. When insiders—even trusted support staff—can extract sensitive data at will, it’s time to rethink how that data is protected.
Data-centric security shifts the focus from securing networks and endpoints to securing the data itself, wherever it resides or travels. With this approach, controls and protections travel with the data, making it far harder for bad actors—internal or external—to misuse it.
Through this approach, access isn’t determined by where a user sits in the network — it’s dictated by what data they actually need, and for how long.
Here’s how this would work in practice:
Policy-Based Access Control: Instead of blanket permissions for job roles, access is governed by dynamic policies. A support contractor would only be able to view the specific metadata or masked information needed for customer service — and nothing else.
Context-Aware Controls: Access can be restricted based on geography, device, time of day, or other behavioral signals. If an offshore contractor suddenly acts suspiciously, alarms go off — or access is denied entirely.
While we don’t know for certain if all of the exposed data was essential for the support staff's duties, there are a few important points from a security best practices perspective to consider.
Even if some of this data was needed by support staff to do their job, that doesn’t mean they needed unrestricted access to it all, all the time. In most modern security frameworks, especially under Zero Trust models, access should be:
The concern isn't just that support staff had access — it's that there may not have been enough guardrails or segmentation to prevent overly broad access or monitor for misuse. If sensitive personal data was extracted at scale, that suggests a lack of fine-grained, data-centric controls.
As employees become increasingly distributed and contractors play a larger role in enterprise operations, the risk of insider threats grows. Organizations must assume that any user—even those with legitimate access—could become a threat vector.
Data-centric security isn’t just a best practice; it’s a necessity. Companies that embrace this new reality are positioning themselves to withstand the next wave of security challenges—with defenses that are embedded in the data itself.
Coinbase’s breach is a wake-up call. Let it also be a turning point.
Nick is the Communications Manager at Virtru. With 8 years of experience in tech-focused public relations and media content, he has a passion for news analysis and finding the story behind the story.
View more posts by Nick MichaelSee Virtru In Action
Sign Up for the Virtru Newsletter
Contact us to learn more about our partnership opportunities.