An alarming report has surfaced regarding a scam involving an individual impersonating a Coinbase support representative who allegedly stole over $2 million in cryptocurrency. This revelation comes from blockchain investigator ZachXBT, who meticulously traced the fraudulent activity linked to a single perpetrator over the past year. In a recent post on social media platform X, ZachXBT detailed his findings after analyzing Telegram conversations, the movement of funds across digital wallets, and various social media interactions.
The alleged scammer has been identified as a Canadian individual who utilized social engineering techniques to deceive victims into believing he was affiliated with Coinbase. According to ZachXBT, the stolen funds were used for extravagant purchases, including rare social media usernames, lavish bottle service, and gambling. He also shared a video that purportedly shows the scammer engaging in a phone conversation with a victim whilst presenting a façade of customer support.
ZachXBT highlighted several operational missteps made by the suspect, including unguarded leaks of personal information during calls, which ultimately helped in the investigation. “In the screen recording he leaks the email…. and his Telegram account with a number,” he noted, shedding light on the perpetrator’s errors.
Impersonation scams targeting user support have become increasingly prevalent as they represent a straightforward method for criminals to extract funds from exchange users. Even well-established platforms struggle to mitigate losses when users are led to act on deceptive instructions.
The operation reportedly involved the scammer reaching out directly to users, claiming to be part of Coinbase’s support team. By instilling urgency or citing potential account issues, the suspect was able to foster trust and guide victims into transactions that removed their cryptocurrency from their control. This approach relies heavily on manipulation rather than technological prowess. Scammers often pose as employees of legitimate companies and use convincing language and insider references to coax victims into revealing personal information or authorizing fund transfers. Unfortunately, once the funds are transferred on the blockchain, recovery is often a daunting, if not impossible, task.
According to ZachXBT, the suspect attempted to mask his identity by purchasing expensive usernames on Telegram and deleting previous accounts. Despite these efforts, the individual’s inclination to post selfies and share lifestyle content inadvertently facilitated the attribution process. Screenshots shared by ZachXBT indicated a pattern of public boasting with a striking disregard for operational security. While he managed to identify the suspect’s home address through public records, he refrained from disclosing it in accordance with platform policies.
The persistence of support impersonation scams can be attributed to the vast pool of customer assets held by crypto exchanges, making them prime targets for such fraudulent schemes. Scammers do not need to breach security systems if they can convince users to act against their interests. New users can be particularly vulnerable, often struggling to differentiate between authentic support communications and well-crafted impersonations.
Common tactics employed by scammers include cold calls, direct messaging, and unsolicited emails, which often lead victims to believe they are addressing routine account concerns. Tragically, by the time many individuals recognize that they’ve been manipulated, the assets have already been transferred.
The scale of losses associated with social engineering schemes has significantly grown as the popularity of cryptocurrencies has risen. With exchanges attracting millions of new users, the potential target pool for scammers has broadened, allowing them to refine their methods using actual interface images, leaked communications, or recycled support dialogues.
From an investor’s perspective, it’s essential to recognize that often the most vulnerable aspect of exchange security is the user rather than the platform itself. Social engineering exploits trust and urgency to bypass technical safeguards.
To protect themselves, users can adopt basic defensive measures. They should refrain from clicking links in unsolicited messages and avoid engaging in cold calls purporting to be from an exchange. Contacting customer support should always be done through official websites or apps rather than following links provided in questionable communications.
Legitimate help desk representatives will never ask for sensitive information like seed phrases, passwords, or login credentials, nor will they request that users transfer funds to a private wallet or discuss matters on unsecured messaging platforms. Any such request should be immediately flagged as fraudulent.
Additionally, employing security best practices is crucial. Using unique passwords across different platforms minimizes risks if one account is compromised, while storing larger cryptocurrency holdings in hardware wallets can limit losses even if an exchange account is breached.
While seasoned users often understand these precautions instinctively, new users should take incidents like this as potent reminders that scams require neither advanced hacking skills nor technical expertise—only a convincing narrative and a brief lapse in vigilance.

