95% of Coinbase Users Rely on SMS-Based 2FA, Account Takeover Stats Reveal

Cryptocurrency platform Coinbase has revealed the account takeover rates for user accounts in an effort to encourage customers to upgrade their security settings. 

The stats(Opens in a new window) say about 95% of Coinbase’s customers are enrolled in SMS-based two-factor authentication—the weakest 2FA method available. These same users made up 95.65% of all account takeovers Coinbase had experienced as of November 2022. 

Coinbase stats


ATO stands for account takeovers.
(Credit: Coinbase)

Meanwhile, users who protected their accounts with stronger two-factor authentication modes, such as authenticator apps and security keys, made up less than 5% of the account takeovers. 

Coinbase requires all users to protect their accounts with two-factor authentication. This forces anyone logging in to supply both the correct password and a one-time passcode generated on their phone, thereby making it much harder to break in. 

The only problem? Not all two-factor authentication setups are equal. By default, Coinbase secures user accounts with an SMS-based 2FA system, which can still be vulnerable to hacking. This is because the one-time passcode is sent to the user’s phone through their cellular provider. (An authenticator app, on the other hand, cuts out the cellular provider and generates the one-time passcode directly on the device.)

SIM cards to a cellphone


(Credit: Getty Images/bin kontan)

Over the years, hackers have shown they can intercept SMS-based two-factor authentication codes by tricking cellular providers into cloning a victim’s mobile phone number to a new SIM card, which they can then place in their own phone. These so-called SIM-swapping attacks can involve the hacker resorting to identity theft or bribing cellular employees for such access. 

The results can be devastating for victims. SIM-swapping attacks have helped cybercriminals steal cryptocurrency and even infiltrate major tech companies, including Reddit and Twitter

In 2021, Coinbase itself disclosed that hackers stole cryptocurrency from at least 6,000 users, likely through a combination of phishing emails and SIM swapping. The heists have caused a growing number of consumers to file class-action lawsuits(Opens in a new window) against the cryptocurrency industry and cellular providers for failing to protect their accounts from SIM-swapping attacks. 

hacker stealing cryptocurrency from a phone.


(Credit: Getty Images/wenjin chen)

As Coinbase noted in its disclosure: “While text based two-factor authentication is significantly better than a simple username/password combination it isn’t perfect.”

As a result, the company is urging users to switch to stronger two-factor authentication methods, which also include using the Coinbase app to directly send a push notification(Opens in a new window) to the user’s smartphone to unlock access. 

Recommended by Our Editors

Interestingly, though, the Coinbase stats reveal the stronger 2FA authentication modes haven’t been impervious to account takeover attempts. Accounts secured with authenticator apps made up 4.13% of the account takeovers. Meanwhile, accounts protected with security keys comprised 0.04% of the takeovers. This suggests the hackers planted malware on the victim’s smartphone or physically stole access to the user’s devices or security key to break in. 

Although 95% of Coinbase’s customers rely on the vulnerable SMS-based 2FA mode, the company said those with high balances tend to adopt the strongest forms of two-factor authentication.

“Just over 5% of our user base has chosen push, time-based one-time passwords, and physical security keys—but those users represent over 57% of the assets we have under custody,” it said.

Coinbase didn’t immediately respond to a request for comment, making it unclear if the company plans on ever retiring SMS-based 2FA. But in the meantime, users can upgrade their two-factor authentication method by going into account settings(Opens in a new window).

SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.”,”first_published_at”:”2021-09-30T21:22:09.000000Z”,”published_at”:”2022-03-24T14:57:33.000000Z”,”last_published_at”:”2022-03-24T14:57:28.000000Z”,”created_at”:null,”updated_at”:”2022-03-24T14:57:33.000000Z”})” x-show=”showEmailSignUp()” class=”rounded bg-gray-lightest text-center md:px-32 md:py-8 p-4 mt-8 container-xs” readability=”31.423799582463″>

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Facebook Comments Box

Hits: 0