Access Restricted for EU Residents
You are attempting to access a website operated by an entity not regulated in the EU. Products and services on this website do not comply with EU laws or ESMA investor-protection standards.
As an EU resident, you cannot proceed to the offshore website.
Please continue on the EU-regulated website to ensure full regulatory protection.
Saturday Nov 22 2025 16:50
2 min
Crypto exchange Coinbase initiated a large fund migration on Saturday, moving digital assets to new internal wallets. This procedure is a scheduled, routine security protocol designed to reduce the long-term exposure of funds held in publicly known wallet addresses.
Key Takeaways:
Coinbase clarified in an official statement that the migration is unrelated to any cybersecurity breaches or external threats. The company explained that periodically migrating wallets is a widely accepted best practice to minimize long-term exposure of funds.
Coinbase emphasized that this migration is planned and unrelated to industry changes or price conditions. It is not a response to a data breach incident or external threat.
Coinbase warned users that scammers might exploit the situation by impersonating Coinbase representatives. These individuals may contact customers requesting login information or asking users to transfer funds, which Coinbase never does.
This warning serves as a reminder that cryptocurrency users must remain vigilant against phishing attempts, hacks, scams, and other cybersecurity attacks in the ever-evolving threat landscape.
Idle balances can be a honeypot for hackers. This is why periodically shifting funds is considered a best practice. Hackers target centralized servers, information systems, and hot crypto wallets connected to the internet to extract information and value from users.
These centralized repositories containing vast quantities of information or tokens are attractive to threat actors, who often plan these attacks for months and see large centralized systems as honeypots.
Quantum computers also pose a threat to current cryptographic technology. While not immediate, the threat may have already materialized retroactively, according to Gianluca Di Bella, a smart-contract and zero-knowledge (ZK) proof researcher.
Threat actors might be compiling crypto public keys now until a sufficiently powerful quantum computer is invented. The quantum computer could then derive the private key from the public address in a "harvest now, decrypt later" attack.
Cryptographic protocols must switch to post-quantum security standards as soon as possible to neutralize the risk of retroactive hacking, Di Bella stated.
Risk Warning: this article represents only the author’s views and is for reference only. It does not constitute investment advice or financial guidance, nor does it represent the stance of the Markets.com platform.When considering shares, indices, forex (foreign exchange) and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and could result in capital loss.Past performance is not indicative of any future results. This information is provided for informative purposes only and should not be construed to be investment advice. Trading cryptocurrency CFDs and spread bets is restricted for all UK retail clients.