Access Restricted for EU Residents
You are attempting to access a website operated by an entity not regulated in the EU. Products and services on this website do not comply with EU laws or ESMA investor-protection standards.
As an EU resident, you cannot proceed to the offshore website.
Please continue on the EU-regulated website to ensure full regulatory protection.
Saturday Nov 22 2025 16:50
2 min
Crypto exchange Coinbase initiated a large fund migration on Saturday, moving digital assets to new internal wallets. This procedure is a scheduled, routine security protocol designed to reduce the long-term exposure of funds held in publicly known wallet addresses.
Key Takeaways:
Coinbase clarified in an official statement that the migration is unrelated to any cybersecurity breaches or external threats. The company explained that periodically migrating wallets is a widely accepted best practice to minimize long-term exposure of funds.
Coinbase emphasized that this migration is planned and unrelated to industry changes or price conditions. It is not a response to a data breach incident or external threat.
Coinbase warned users that scammers might exploit the situation by impersonating Coinbase representatives. These individuals may contact customers requesting login information or asking users to transfer funds, which Coinbase never does.
This warning serves as a reminder that cryptocurrency users must remain vigilant against phishing attempts, hacks, scams, and other cybersecurity attacks in the ever-evolving threat landscape.
Idle balances can be a honeypot for hackers. This is why periodically shifting funds is considered a best practice. Hackers target centralized servers, information systems, and hot crypto wallets connected to the internet to extract information and value from users.
These centralized repositories containing vast quantities of information or tokens are attractive to threat actors, who often plan these attacks for months and see large centralized systems as honeypots.
Quantum computers also pose a threat to current cryptographic technology. While not immediate, the threat may have already materialized retroactively, according to Gianluca Di Bella, a smart-contract and zero-knowledge (ZK) proof researcher.
Threat actors might be compiling crypto public keys now until a sufficiently powerful quantum computer is invented. The quantum computer could then derive the private key from the public address in a "harvest now, decrypt later" attack.
Cryptographic protocols must switch to post-quantum security standards as soon as possible to neutralize the risk of retroactive hacking, Di Bella stated.
Risk Warning: This article is provided for informational purposes only and does not constitute investment advice, investment research, or a recommendation to trade. The views expressed are those of the author and do not necessarily reflect the position of Markets.com. When considering shares, indices, forex (foreign exchange), and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and may not be suitable for all investors. Leveraged products can result in capital loss. Past performance is not indicative of future results. Before trading, ensure you fully understand the risks involved and consider your investment objectives and level of experience. Cryptocurrency CFD trading restrictions may apply depending on jurisdiction.