ZachXBT Details How Canadian Social Engineer ‘Haby’ Stole Over $2M via Coinbase Scams

Published 12/30/2025

ZachXBT Details How Canadian Social Engineer ‘Haby’ Stole Over $2M via Coinbase Scams

coinbase-impersonation">ZachXBT Details How Canadian Social Engineer ‘Haby’ Stole Over $2M via Coinbase Scams

Crypto security researcher ZachXBT has exposed a Canadian social engineer known as “Haby” who stole more than $2 million in cryptocurrency by impersonating Coinbase support agents. This case highlights the growing threat of personalized social engineering attacks that bypass technical security measures by exploiting human vulnerabilities within crypto platforms.

What happened

According to ZachXBT’s investigation, “Haby” executed a series of scams targeting Coinbase users by impersonating the platform’s customer support representatives. The attacker employed highly personalized social engineering tactics, collecting detailed personal information about victims to convincingly pose as legitimate Coinbase employees. This enabled Haby to circumvent Coinbase’s security protocols and gain unauthorized access to user accounts, resulting in the theft of over $2 million in cryptocurrency.

The attack vector centered on manipulating human factors rather than technical vulnerabilities within Coinbase’s platform. By exploiting customer support channels and the inherent trust users place in these interactions, Haby successfully bypassed multi-factor authentication and other technical controls designed to protect accounts. ZachXBT and CryptoPotato interpret this case as emblematic of a broader trend where attackers increasingly leverage social engineering to overcome technical defenses in crypto exchanges.

Independent reporting by The Block corroborates the rise of social engineering as a dominant threat to crypto security, noting that targeted scams using personal data to defeat multi-factor authentication are becoming more prevalent. Chainalysis further confirms that losses attributed to social engineering scams have surged in recent years, with attackers deploying increasingly sophisticated and personalized methods to trick users into transferring funds or revealing sensitive information.

Why this matters

The Haby case underscores a critical vulnerability in the security architecture of cryptocurrency platforms: the human element. While exchanges like Coinbase invest heavily in technical safeguards such as two-factor authentication and cold wallet storage, these protections can be undermined if attackers manipulate customer support processes or identity verification systems.

This shift in attack methodology has important implications for market participants and regulators. It suggests that current security frameworks may inadequately address the systemic risks posed by social engineering, focusing predominantly on technical defenses while leaving gaps in user verification and customer service protocols. As a result, even well-secured platforms remain exposed to losses through non-technical means.

From a broader market perspective, the persistence and growth of social engineering scams threaten user confidence in crypto platforms and could invite increased regulatory scrutiny. The inability to fully mitigate such attacks may slow adoption or push exchanges to develop more robust, multi-layered security approaches that integrate behavioral analytics and enhanced identity verification.

What remains unclear

Despite the detailed exposure of Haby’s methods, several key questions remain unanswered. The specific security protocols Coinbase had in place at the time to prevent social engineering attacks, and exactly how these were bypassed, have not been publicly disclosed. Without insight into Coinbase’s internal incident response or forensic analysis, it is difficult to assess whether procedural failures or systemic vulnerabilities were exploited.

Additionally, the initial phase of Haby’s operation—how the attacker obtained the detailed personal information necessary for convincing impersonation—is not documented. The sources do not clarify whether this data was sourced through prior breaches, phishing, or other reconnaissance methods.

There is also limited information on how other crypto exchanges compare in managing social engineering risks, and which practices have proven most effective. Furthermore, the role of regulatory frameworks in mandating protections against social engineering remains ambiguous, with no clear indication of evolving standards or compliance requirements.

Finally, the legal consequences or law enforcement actions following the exposure of Haby have not been reported, leaving questions about accountability and deterrence unanswered.

What to watch next

  • Disclosures by Coinbase or other exchanges regarding enhancements to customer support and identity verification protocols aimed at mitigating social engineering risks.
  • Regulatory developments or guidance specifically addressing protections against social engineering in cryptocurrency platforms.
  • Industry adoption of advanced detection technologies, such as AI-based behavioral analytics, to identify and prevent impersonation and manipulation attempts.
  • Research or reports providing comparative analysis of how different exchanges handle social engineering threats and which strategies reduce losses most effectively.
  • Efforts to improve user education and awareness about personalized social engineering scams to reduce susceptibility among crypto account holders.

The case of Haby’s $2 million theft from Coinbase users highlights a persistent and evolving security challenge in the cryptocurrency ecosystem. While technical defenses remain essential, addressing the human vulnerabilities exploited by social engineers requires systemic changes in platform protocols, regulatory frameworks, and user education. The absence of detailed public information on internal security measures and regulatory responses leaves significant gaps in understanding how to effectively counter this threat over the longer term.

Source: https://cryptopotato.com/zachxbt-exposes-haby-a-canadian-social-engineer-flaunting-stolen-crypto/. This article is based on verified research material available at the time of writing. Where information is limited or unavailable, this is stated explicitly.