Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Nx Console VS Code Extension Compromised: Steal Secrets
May 19, 2026
Critical Marimo Flaw Allows Remote Code Execution Attacks
May 19, 2026
Microsoft Retires Teams Together Mode for Performance Boost
May 19, 2026
Home/Threats/Coinbase Cartel Extorts High-Value Sect Targets Sectors
Threats

Coinbase Cartel Extorts High-Value Sect Targets Sectors

The ransomware landscape is in constant flux, with new threat actors consistently refining their tactics. A recent development highlights the emergence of the “Coinbase Cartel,” a group...

Jennifer sherman
Jennifer sherman
February 11, 2026 3 Min Read
6 0

The ransomware landscape is in constant flux, with new threat actors consistently refining their tactics. A recent development highlights the emergence of the “Coinbase Cartel,” a group actively employing sophisticated extortion techniques. This cartel specifically targets high-value sectors, demanding significant ransoms and posing a substantial threat to critical organizations operating within these domains.

Coinbase Cartel emerged in September 2025, quickly claiming 14 victims in its first month of operation.

Unlike traditional ransomware groups, this threat actor focuses exclusively on data exfiltration without encrypting systems, representing a shift in cybercriminal strategies.

This approach makes attacks quieter and faster to execute while maintaining leverage for ransom demands.

Victims face a simple ultimatum: pay to recover stolen data or watch it published publicly.

The group targets organizations across multiple sectors, with revenues ranging from millions to hundreds of billions of dollars.

Bitdefender analysts identified Coinbase Cartel as one of the top 10 ransomware groups in September and December 2025, with over 60 victims claimed during its initial months.

The healthcare, technology, and transportation industries account for more than half of the group’s targets, with healthcare organizations in the United Arab Emirates experiencing particularly heavy impacts.

The group’s focus on UAE healthcare facilities raises questions about underlying motivations.

While financial gain appears primary, the concentrated targeting of 10 healthcare organizations in one month suggests potential geopolitical considerations, possibly aimed at disrupting the UAE’s economy.

Infection and Extortion Mechanisms

Coinbase Cartel employs several methods to gain initial access to target systems. Social engineering remains a primary vector, alongside support from Initial Access Brokers who provide pre-compromised credentials.

The group also acquires exposed credentials through various underground channels.

Once inside a network, attackers use administrative accounts to manipulate system settings and tamper with log files, reducing detection chances.

Data of interest is systematically exfiltrated before the group publishes victim names on its data leak site.

Victims receive 48 hours to respond via a designated chat interface, followed by 10 days to submit Bitcoin payments or negotiate ransom terms.

Auctions page on Coinbase Cartel Data Leak Site (Source – Bitdefender)

Coinbase Cartel’s auctions page shows the group’s infrastructure for monetizing stolen data through multiple channels.

The group operates independently without using the Ransomware-as-a-Service model, instead recruiting cybercriminals directly.

Last fall, they requested zero-day exploits with a budget exceeding $2 million, demonstrating substantial financial resources and ambitions.

Organizations should enforce multi-factor authentication across all accounts, especially administrative ones.

Regular patch management prevents vulnerabilities that attackers exploit for initial access.

Since Coinbase Cartel doesn’t encrypt data, maintaining secure backups protects against data tampering. Creating inventories of critical data helps identify sensitive information requiring enhanced protection.

Threat intelligence solutions provide awareness of evolving tactics, while managed detection and response services offer rapid incident detection and response capabilities.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchransomwareThreatzero-day

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Sophisticated Cyber Attack Targets Wedding Industry via Teams Malware

Next Post

CISA Adds Six Microsoft 0-Days to K Vulnerabilities Catalog

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
CISA Exposes AWS GovCloud Credentials on Public Admin GitHub
May 19, 2026
Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
May 19, 2026
Mythos Previews Build PoC Exploits for Automated Vulner
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us