Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Hackers leverage jailbroken AI to probe OT systems in Mexican Water Br...
Which four tech brands were most exploited in phishing and social medi...
The problem with CAPTCHAs – and the password perception gap
VIVOTEK AI Solutions Enhance Efficiency at Traffic Hubs in Norway
Report: more than half of APAC organizations experienced AI-related in...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      The problem with CAPTCHAs – and the password perception gap

      The problem with CAPTCHAs - and the password perception gap

      Thursday, May 7, 2026, 11:14 AM Asia/Singapore | Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
    • Featured

      Q-Day is coming. Are you ready?

      Q-Day is coming. Are you ready?

      Tuesday, April 14, 2026, 12:40 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Directory
  • E-Learning

Select Page

News

Hacker threatens crypto payments platform over alleged payment‑flow flaws

By CybersecAsia editors | Wednesday, January 28, 2026, 11:36 AM Asia/Singapore

Hacker threatens crypto payments platform over alleged payment‑flow flaws

A threat actor from a prior hack has resurfaced, demanding ransom in exchange for not diverting merchant funds or releasing secrets.

A threat actor who had previously exploited Coinbase Commerce’s payment infrastructure has resurfaced with new claims and a fresh ransom note, escalating a months‑long dispute over alleged design flaws in the crypto payments service.

The self‑described hacker has reiterated he can still abuse the merchant’s payment flow to misdirect funds, and is demanding payment in exchange for withholding technical details and not targeting major merchants that rely on the platform.

The dispute centers on Commerce’s move to a smart‑contract‑driven system that supports hundreds of tokens across Ethereum, Base and Polygon, and automatically converts customer payments into USDC for merchants at a guaranteed rate. The firm had already drawn criticism from parts of the Bitcoin community after it had removed native Bitcoin and other UTXO support in early 2024, arguing that replicating its new on‑chain feature set on Bitcoin without smart contracts and stablecoins was too difficult. Since that change, the firm has promoted higher conversion rates and less manual effort for merchants on the revamped platform, but some users have complained publicly about confusing network behavior and unresolved payment issues.

Renewed ransom demands
The new ransom push comes less than a year after Coinbase disclosed a separate major cyber incident in which attackers had bribed overseas support staff to siphon sensitive customer data and then demanded a US$20m payout for its deletion. The firm had refused to pay, instead notifying law enforcement and warning investors that remediation and potential customer reimbursements could cost up to US$400m.

Subsequent reporting indicated that nearly 70,000 users were affected and that Coinbase had set up a US$20m reward fund for information leading to the attackers’ arrest, underscoring the exchange’s public stance against yielding to extortion. In March 2025 the firm was in the crosshairs of sophisticated supply‑chain attackers, after security researchers revealed that a compromised GitHub Action initially targeted one of the exchange’s open‑source projects before expanding to hundreds of other repositories. Threat analysts had noted that the attacker showed deep knowledge of CI/CD security, and had attempted to abuse the firm’s agentkit project for likely financial gain, although Coinbase had mitigated the attempt before secrets or packages could be compromised.

The latest Commerce‑focused extortion episode, even if technically distinct, adds to a growing string of incidents testing Coinbase’s security posture and crisis response as it positions Commerce as an on‑chain payments standard for mainstream merchants.

Share:

PreviousRegASK Achieves ISO 27701 Privacy Certification, Strengthening Verifiable Trust in the AI Era
NextWhy Korea’s automotive cybersecurity regulation requires an integrated approach

Related Posts

Fighting industrialization of cybercrime requires public-private resolve: threat brief

Fighting industrialization of cybercrime requires public-private resolve: threat brief

Friday, September 16, 2022

Patching Exchange Server vulnerabilities not enough

Patching Exchange Server vulnerabilities not enough

Friday, February 18, 2022

Is there a lack of alignment between your IT and business outcomes?

Is there a lack of alignment between your IT and business outcomes?

Tuesday, September 19, 2023

DDoS attacks surge in frequency, duration and size in the last quarter of 2022

DDoS attacks surge in frequency, duration and size in the last quarter of 2022

Friday, January 13, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • VIVOTEK AI Solutions Enhance Efficiency at Traffic Hubs in Norway

    Wednesday, May 6, 2026
    TAIPEI, May 6, 2026 /PRNewswire/ …Read More »
  • Taoping Reports Fiscal Year 2025 Results

    Thursday, April 30, 2026
    Strategic Transformation Drives Platform Expansion, …Read More »
  • DESILO Launches World’s First Fully Homomorphic Encryption Library Integrating 5th-Generation FHE Scheme ‘GL’, Accelerating the Era of Private AI

    Tuesday, April 28, 2026
    SEOUL, South Korea, April 28, …Read More »
  • Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Breakthroughs Enabling Large-Scale Agent Deployment

    Thursday, April 23, 2026
    Tencent Cloud’s Cube Sandbox goes …Read More »
  • Sparrow to Demonstrate AI-Driven Security and SBOM Management at Black Hat Asia 2026

    Wednesday, April 22, 2026
    SINGAPORE, April 21, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.