On September 22, 2025, Bloomberg published a bombshell investigation revealing that Crypto.com, one of the world’s largest cryptocurrency exchanges by user count, failed to publicly disclose a security breach orchestrated by the notorious Scattered Spider hacking group. The breach, which occurred in 2023, involved attackers gaining access to an employee’s account through sophisticated phishing techniques — and the full extent of the incident only came to light two years later. With Bitcoin trading at $112,748 and Ethereum at $4,202 on the day of the report, the revelation sent shockwaves through an industry already on edge.
The Exploit Mechanics
The attack on Crypto.com was carried out by teenager Noah Urban, a member of the Scattered Spider collective known for targeting major technology and financial institutions. Urban and an accomplice employed carefully crafted phishing campaigns designed to harvest login credentials from Crypto.com employees. Once they obtained valid credentials for an employee account, the attackers gained access to internal systems containing sensitive personal data.
The Scattered Spider group has built a reputation for social engineering attacks that bypass traditional perimeter defenses. Rather than exploiting software vulnerabilities, they exploit human psychology — crafting emails and messages that appear to come from trusted sources, creating urgency, and manipulating targets into handing over credentials willingly. In this case, the phishing vector was sufficiently convincing to compromise an employee with access to customer-facing systems.
According to Bloomberg’s reporting, the breach resulted in the exposure of personal data belonging to what Crypto.com described as “a very small number of individuals.” However, the incident raised serious questions about what other access the attackers may have obtained during their time inside the network.
Affected Systems
The compromised employee account provided attackers with a foothold inside Crypto.com’s infrastructure. While the exchange maintained that customer funds were never at risk, the data exposure itself represents a significant security failure. Personal information — including names, contact details, and potentially financial information — was accessible to the attackers.
What makes this case particularly concerning is the timeline. The breach occurred in 2023, yet Crypto.com did not issue a public disclosure to its users. The company stated that it filed a notice with the U.S. Nationwide Multistate Licensing System (NMLS) and informed relevant regulators, but no public announcement was made to the affected customers directly.
The FBI’s investigation into Noah Urban’s activities led to the seizure of approximately $4 million in cryptocurrency, cash, and jewelry. Urban was ultimately arrested in January 2024 on charges related to hacking 13 companies and was later sentenced to 10 years in prison. The scope of his operations underscores the professionalization of cybercrime, even among young actors.
The Mitigation Strategy
Crypto.com’s CEO Kris Marszalek took to social media on September 22 to address the controversy, calling reports of a cover-up “misinformation from uninformed sources.” He stated that the company had properly reported the incident through regulatory channels and that the suggestion they had not disclosed the breach was “completely unfounded.”
However, on-chain investigator ZachXBT publicly challenged this narrative, stating that Crypto.com “has been breached several times” and criticizing the exchange for concealing the data theft from its user base. The discrepancy between regulatory reporting and public transparency highlights a growing tension in the crypto industry — compliance with minimum legal requirements does not necessarily equate to adequate user protection.
For organizations looking to strengthen their defenses against similar attacks, several mitigation strategies prove essential:
- Employee security awareness training: Regular, realistic phishing simulations help staff recognize and resist social engineering attempts before they succeed.
- Mandatory multi-factor authentication: All employee accounts, particularly those with access to customer data, should require hardware-based MFA that cannot be bypassed through phishing.
- Principle of least privilege: Employee accounts should have access only to the systems and data necessary for their role, limiting the blast radius of any single compromise.
- Rapid incident disclosure: Transparent communication with affected users builds trust and allows individuals to take protective action promptly.
Lessons Learned
The Crypto.com breach, and its delayed public disclosure, offers several critical lessons for the broader cryptocurrency industry. First, social engineering remains the most effective attack vector for compromising even well-resourced organizations. No amount of cryptographic security can protect against an employee who is tricked into sharing their credentials.
Second, regulatory compliance alone is insufficient. Filing an NMLS notice satisfies legal requirements but does nothing to inform users that their data may have been compromised. The industry must adopt higher standards of transparency, treating user notification as an ethical obligation rather than a checkbox exercise.
Third, the Scattered Spider case demonstrates that attackers are becoming younger, more sophisticated, and more organized. Noah Urban was a teenager when he orchestrated attacks against 13 major companies, yet his operations were sophisticated enough to evade detection for extended periods. Exchange security teams must assume they are facing advanced persistent threats, regardless of the attacker’s age.
Finally, the incident underscores the importance of defense-in-depth strategies. No single security control — whether technical, procedural, or educational — provides adequate protection on its own. Organizations need layered defenses that can contain and detect breaches even when initial perimeter controls fail.
User Action Required
If you have ever held an account with Crypto.com, consider taking the following steps regardless of whether you were directly affected by this breach:
- Change your password and ensure it is unique to your Crypto.com account.
- Enable hardware-based two-factor authentication if you have not already done so.
- Monitor your email for phishing attempts that may leverage information obtained in the breach.
- Check your credit reports for any suspicious activity, as personal data from crypto exchanges can be used for identity theft.
- Consider using a dedicated email address for cryptocurrency accounts to limit exposure from potential future breaches.
The Crypto.com disclosure controversy serves as a stark reminder that in cryptocurrency security, transparency is not optional — it is fundamental to trust. As the industry matures, users must demand accountability, and exchanges must deliver it proactively rather than waiting for investigative journalists to force their hand.
This article is for informational purposes only and does not constitute financial or security advice. Always conduct your own research before making decisions about your digital assets.
The industry needs standardized security audit frameworks
Social engineering attacks are becoming more sophisticated
Hardware wallet adoption is the single biggest security improvement anyone can make