Coinmama
Dear customer,
On Sunday, February 17, we learned that an unauthorized party acquired data associated with 1.4 million Coinmama accounts. This information follows our internal investigation into a large breach
that has affected 30 companies and 841 million users.
We're taking this incident extremely seriously, and want to give an overview of what it means for you, as well as the immediate actions we're taking to protect your security.
What happened
In order to sell cryptocurrency, we are required by regulation to collect certain personal information from our customers, including your name, address, email, gender and ID number. From some of our customers we are also required to collect images and copies of documents, including government issued IDs. We do not store or record any credit card information, nor do we hold any customer funds.
On February 17, during an ongoing investigation of a financial fraud incident that occurred in December 2018, we found evidence that an unauthorized party acquired data of our customers, including their personal information as mentioned above.
As of February 20, 2019, there has been no evidence of this information being used by perpetrators.
Dear customer,
Today, February 15, 2019, we learned of a breach of about 450,000 emails and hashed passwords. We are still investigating the incident, but have reason to believe your account may be affected, and want to take immediate steps to secure it:
Change your Coinmama password
. As a precautionary measure, we've reset your password. Click the link to create a new password. We recommend a unique password with 8 characters or more, using both upper-case and lower-case letters and a mixture of number and symbols
If you were using the same email and password to access other products and services, change those passwords as well
Given the dated nature of the published data, we have no reason to suspect that any other Coinmama systems are compromised. Having said that, we take your privacy seriously, and are monitoring our systems for suspicious activity.
We are also working closely with leading cybersecurity firms to understand the scope of the incident, and enhancing our systems to detect and prevent unauthorized access to user information.
|