←back to thread

410 points gpi | 1 comments | | HN request time: 0.289s | source
Show context
J0nL ◴[] No.43999084[source]
I'm having de ja vu here. If they only found out when they attempted to extort them does it mean they don't even bother to log employee access? Is there any means for accountability at all internally?

It would be so simple to have access tracking and flag or lock out rogue employees... I look forward to seeing what the golden parachutes look like.

replies(3): >>43999239 #>>43999433 #>>43999940 #
fckgw ◴[] No.43999433[source]
Looking at their blog post, it seems like they paid customer support agents to hand over sensitive data. The attackers did not have access to any agent accounts themselves, and the customer service agents were accessing data they were already privileged to anyways.

https://www.coinbase.com/blog/protecting-our-customers-stand...

replies(2): >>43999539 #>>43999978 #
1. lavezzi ◴[] No.43999978[source]
The customer service agents were accessing data they were already privileged to anyways.

That's not how front line support agent access should work. You get access based on active cases you are working on, not the keys to the kingdom because you might need to support a member at some future point in time.