Address poisoning tricks users into sending Bitcoin to attacker-controlled addresses that look like familiar ones. This guide explains the attack, how to identify poisoned transactions, and the simple rules that prevent it.
Bitcoin Exchange Account Security: Protecting Your Accounts from Hackers in 2026
Exchange hacks aren't the main threat to Bitcoin holders anymore — it's account takeovers. Sophisticated attackers don't need to hack Coinbase directly when they can just log into your account with your stolen credentials or bypass SMS 2FA with a SIM swap.
Here's how to lock down your exchange accounts properly in 2026.
The Current Threat Landscape
Credential stuffing: Attackers purchase leaked password databases (billions of email/password combinations from data breaches) and try them on exchanges. If you reuse passwords, this works.
SIM swap attacks: Attackers convince your mobile carrier to transfer your phone number to their SIM. With your number, they receive your SMS 2FA codes. Exchange accounts with only SMS 2FA are vulnerable to this.
Phishing: Fake exchange websites and emails that look identical to legitimate ones. You enter your credentials on the fake site; attacker captures them.
Malware: Keyloggers and screen capture software that record your credentials and 2FA codes as you type them.
Layer 1: Unique Strong Passwords
Every exchange should have a unique, random password — not related to any other password you use anywhere.
Requirements:
- At minimum 16 characters
- Random (use a password manager to generate)
- Unique to this account (no reuse)
Password managers: 1Password, Bitwarden (open source), or Dashlane. Your master password for the password manager should be the strongest, most memorable password you have — and never written in plain text.
Why this matters: If your email password is the same as your Coinbase password and your email is in a breach, your Coinbase account is compromised. Unique passwords ensure each breach is isolated.
Layer 2: Hardware Security Key (Best 2FA)
Replace SMS 2FA with a hardware security key (YubiKey, Google Titan) for the strongest available two-factor authentication.
Hardware keys use the FIDO2/WebAuthn protocol:
- Plug the key into USB (or tap it for NFC on mobile)
- The key generates a cryptographic challenge response
- Cannot be phished — the key verifies it's talking to the real website domain
- Cannot be SIM-swapped — it's a physical device
Where to use it: Coinbase, Kraken, Gemini, Binance.US all support hardware security keys.
Keep a backup key: Register two hardware keys. Store the backup securely. If you lose your primary, you have recovery access.
Layer 3: Authenticator App (If Hardware Key Not Available)
If a service doesn't support hardware keys, use an authenticator app (not SMS):
Recommended apps:
- Aegis Authenticator (Android, open source, offline)
- Raivo (iOS, offline)
- Google Authenticator (widely supported but no cloud backup)
- Authy (cloud backup — convenient but cloud is a risk vector)
Avoid: SMS 2FA for any significant Bitcoin holdings. SIM swap attacks make SMS 2FA a weak link.
When switching: When you disable SMS 2FA on an exchange, it typically requires going through a re-verification process. Do this proactively, not reactively.
Layer 4: Email Account Security
Your exchange account's password reset often goes through email. If your email is compromised, all accounts that use password reset via that email can be taken over.
Harden your email:
- Use a dedicated email address only for Bitcoin/financial services (not your personal email)
- Enable hardware key 2FA on your email account (Gmail and ProtonMail both support this)
- Consider a privacy email provider (ProtonMail, Tutanota) for your crypto email
- Never link this email to any public profiles or social media
Layer 5: Withdrawal Address Whitelisting
Enable withdrawal address whitelisting on every exchange you use:
- Coinbase: Security → Whitelisted Addresses
- Kraken: Security → Whitelisted Addresses (Master Lock)
- Gemini: Security → Whitelisted Withdrawal Addresses
With whitelisting enabled:
- Adding a new withdrawal address requires 24-48 hour verification delay
- No new address can be added without email confirmation
- An attacker who gains account access cannot immediately send your Bitcoin to their address
This is one of the most underused security features. Enable it on every account.
Layer 6: SIM Lock
Contact your mobile carrier and add a SIM lock (sometimes called a "SIM PIN" or "account PIN"):
- Requesting a SIM transfer requires your SIM lock code in-store
- Some carriers also support "port freeze" that prevents your number from being ported
This doesn't fully prevent SIM swap (carriers make mistakes), but it adds friction that defeats most attacks.
Account Activity Monitoring
Enable all security notifications on your exchange accounts:
- Login alerts (new device or location)
- Withdrawal notifications
- Password change notifications
Check account activity logs monthly. If you see login activity you don't recognize, change your password and 2FA immediately.
What to Do After a Security Incident
If you suspect your exchange account has been compromised:
- Immediately change your password from a clean device
- Revoke all API keys — attackers often create API keys for persistent access
- Review and revoke all authorized sessions (active logins on other devices)
- Change 2FA — generate new TOTP codes or register new hardware key
- Contact exchange support and report the incident
- Move remaining funds to cold storage immediately
- Check if other accounts using the same email were affected
FAQ
What is the most common way Bitcoin exchange accounts get hacked?
The most common attack is SIM swap + SMS 2FA bypass. Attackers convince your mobile carrier to transfer your phone number, receive your SMS verification codes, and log into your accounts. Switching to a hardware security key eliminates this attack vector.
Is SMS 2FA better than no 2FA?
Yes, but only slightly for targeted attacks. SMS 2FA defeats automated credential stuffing. It doesn't defeat targeted SIM swap attacks. For any significant Bitcoin holdings, upgrade to an authenticator app or hardware key.
Do hardware security keys work on mobile?
Yes. YubiKey 5 NFC and Google Titan key both work with iOS and Android via NFC (tap the key near your phone's NFC reader). Some phones also support USB-C key connection.
Should I use the same hardware key for multiple exchanges?
One hardware key can be registered with multiple services. Register your primary key with all exchanges, and your backup key as a secondary. This is the correct approach — you don't need separate keys per service.
Compare secure exchanges in our Bitcoin Exchange Directory. See also: Bitcoin Exchange Withdrawal Best Practices and Bitcoin OpsEC Guide.