Gemini Data Breach: Over 100k Records Leaked on Dark Web, Urgent Security Alert

Over 100k Gemini Customer Data Allegedly Leaked on the Dark Web: A Wake-Up Call for Crypto Security
A shadowy figure known as “AKM69” has reportedly compromised the personal data of over 100,000 Gemini exchange users, claiming to sell it on the dark web. This incident underscores the persistent security challenges facing the cryptocurrency industry.
- Gemini customer data allegedly for sale
- Over 100,000 records affected
- Data includes names, emails, phone numbers, and locations
- Primarily U.S. users, with some from Singapore and the UK
- Gemini yet to comment on the breach
The database purportedly contains personal information such as full names, email addresses, phone numbers, and location data. The majority of these records are from the United States, with some scattered across Singapore and the UK. It’s a stark reminder that even in the decentralized world of crypto, where privacy is often celebrated, security can be as precarious as a house of cards.
The dark web, a hidden part of the internet notorious for illegal activities, is where this alleged data leak surfaced. A threat actor using the alias “AKM69” claims to be behind this breach. As of now, Gemini has not issued any public statements, leaving the origin of the breach—whether from within Gemini’s systems or due to external vulnerabilities—up in the air.
This incident follows closely on the heels of a similar breach involving Binance, where another threat actor, “kiki88888,” tried to sell over 132,700 lines of user data. It’s a pattern becoming all too familiar in the crypto space, with recent breaches also hitting platforms like Bitnob and Byte Federal. Even OpenSea, the go-to marketplace for NFTs, wasn’t spared, with over 7 million user email addresses exposed earlier this year.
The Dark Web Informer, a cyber threat intelligence platform, broke the news of the Gemini breach. They hinted that the leak might be due to compromised user devices and issued a straightforward piece of advice: “stop clicking random stuff.” In the age of phishing attacks and social engineering, where fraudsters trick you into giving away your information, this is sage advice.
While the crypto industry champions decentralization and privacy, these breaches serve as a sobering reminder of the vulnerabilities that persist. The need for robust security measures is more urgent than ever. From using endpoint detection and response tools (which monitor and respond to suspicious activities on devices) to air-gapped devices (which are physically isolated from unsecured networks to sign transactions), the arsenal against cyber threats is vast. Yet, it’s clear that not enough platforms are wielding it effectively.
Phishing remains a significant threat, with over $15 million in losses recorded in the first two months of this year alone. And let’s not overlook the role of state-sponsored actors, like those from North Korea, whose cyber thefts saw a 102.88% increase in stolen value from 2023 to 2024. The Bybit hack in February 2025, which resulted in nearly $1.5 billion in ETH being stolen, is a grim reminder of the stakes involved.
So, what can users and exchanges do to shore up their defenses? Experts recommend a multi-faceted approach. For users, it’s about staying vigilant: avoid clicking on unfamiliar links, enable two-factor authentication, and use hardware wallets for storing crypto. For exchanges, implementing strict signer communication protocols, using multi-party computation wallets, and conducting real-time on-chain monitoring are crucial steps. And let’s not forget the importance of thorough background checks and employee training to guard against social engineering.
As we navigate the decentralized finance landscape, security must be a priority. The promise of Bitcoin and blockchain technology is immense, but it’s tempered by the harsh reality of cyber threats. We’re all in this together, striving for a future where freedom, privacy, and innovation can thrive, but it’s a journey fraught with challenges.
While it’s easy to get bogged down by the negatives, it’s worth noting that the crypto industry isn’t standing still. There are positive developments, like the adoption of advanced security protocols and real-time monitoring solutions such as Chainalysis Hexagate. These tools are making a difference, but clearly, there’s still a long way to go.
And let’s play devil’s advocate for a moment. Are these breaches really as bad as they seem, or is the industry making genuine progress in security? Some argue that the focus on high-profile breaches overshadows the daily improvements in security measures and the efforts to educate users. But when it comes to your personal data, even the slightest risk is too much—crypto platforms need to step up their game, and fast.
Key Takeaways and Questions
- What data was allegedly compromised in the Gemini breach?
The data includes full names, email addresses, phone numbers, and location data of over 100,000 Gemini customers.
- Who is responsible for the alleged Gemini data breach?
A threat actor using the alias “AKM69” claims to have obtained and listed the data for sale.
- How has Gemini responded to the data breach allegations?
Gemini has not yet made any public comments regarding the alleged data breach.
- What other recent data breaches have affected the cryptocurrency industry?
Binance faced a similar incident a day earlier, and previous breaches have affected Bitnob, Byte Federal, and OpenSea.
- What are the potential sources of the Gemini data breach?
It is unclear whether the breach originated from Gemini’s systems or from external vulnerabilities such as compromised user devices or phishing attacks.
- What advice was given regarding the prevention of data breaches?
The Dark Web Informer advised the public to “stop clicking random stuff” to avoid compromising their devices.