After doing that several million times, the phishers would then take the email addresses that failed new account signups and target them with Coinbase-themed phishing emails. Rather, the bad guys understood that any attempts to sign up using an email address tied to an existing Coinbase account would fail. His team also managed to recover the username and password data that victims submitted to the site, and virtually all of the submitted email addresses ended in “.it”.īut the phishers in this case likely weren’t interested in registering any accounts. Holden said the phishing group appears to have identified Italian Coinbase users by attempting to sign up new accounts under the email addresses of more than 2.5 million Italians.
![coinbase app not sending coinbase app not sending](https://cyberbump.net/wp-content/uploads/2021/12/1638352771_maxresdefault.jpg)
![coinbase app not sending coinbase app not sending](https://miro.medium.com/max/1838/1*MtGV-ZP8k6PCNqD-holh0g.jpeg)
Coinbase app not sending verification#
Armed with the target’s mobile number, they could also click “Send verification SMS” with a text message prompting them to text back a one-time code. Pressing the “Send Info” button prompted visitors to supply additional personal information, including their name, date of birth, and street address. “These guys have real-time capabilities of soliciting any input from the victim they need to get into their Coinbase account,” Holden said. In each case, the phishers manually would push a button that caused the phishing site to ask visitors for more information, such as the one-time password from their mobile app. Holden said each time a new victim submitted credentials at the Coinbase phishing site, the administrative panel would make a loud “ding” - presumably to alert whoever was at the keyboard on the other end of this phishing scam that they had a live one on the hook.