Connect with us

Coin Market

Axie Infinity creator works with studios to push Web3 adoption through new games

Published

on

Sky Mavis head of business development Kathleen Osgood told Cointelegraph that their goal is to onboard as many people into the ecosystem as possible.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Coin Market

Crypto custodian BitGo secures MiCA license in Germany

Published

on

By

Goldman Sachs-backed cryptocurrency custody firm BitGo is the latest cryptocurrency company to secure regulatory approval to operate across the European Union.

Germany’s financial regulator, the Federal Financial Supervisory Authority (BaFin), granted BitGo Europe a Markets in Crypto-Assets Regulation (MiCA) license to provide digital asset services in the EU, the firm announced on May 12.

The license allows BitGo to offer services to crypto-native firms and traditional finance institutions, including banks and asset managers within the EU.

Source: BitGo

“This license underscores our commitment to the highest standards of security, transparency, and trust,” BitGo Europe managing director Harald Patt said.

BitGo set up the EU headquarters in 2023

Founded in 2013 in Palo Alto, California, BitGo is a major platform in the cryptocurrency industry specializing in crypto custodial services, holding cryptocurrencies like Bitcoin (BTC) on behalf of its clients. 

BitGo’s latest regulatory milestone in Europe follows efforts to increase its presence in the EU, including establishing local headquarters in Frankfurt in 2023.

Since setting up BitGo Europe in Germany, BitGo has received multiple registrations in EU states, including Italy, Spain, Poland and Greece.

“With the MiCA license now secured, BitGo can operate across the entire EU under a unified, forward-looking regulatory framework,” the firm said in the announcement.

“Broad range of institutional-grade solutions”

BitGo did not specify the services it intends to roll out immediately under the new MiCA license.

“BitGo’s MiCA licence comes at a pivotal moment as BitGo expands its product suite to offer a broad range of institutional-grade digital asset solutions,” the announcement added.

Related: Tether CEO defends decision to skip MiCA registration for USDT

As of May 12, BaFin’s official records did not yet reflect BitGo’s MiCA license, showing only earlier registrations.

BaFin data on BitGo’s registrations in Germany as of May 12, 2025, 8:30 am UTC. Source: BaFin

Cointelegraph approached BitGo for additional details on its MiCA license but did not receive a response by the time of publication.

As previously mentioned, Germany has emerged as a major jurisdiction for European businesses seeking MiCA registration, with BaFin issuing licenses to several companies, including Bitpanda and Boerse Stuttgart Digital Custody, in 2025.

Magazine: Crypto wanted to overthrow banks, now it’s becoming them in stablecoin fight

Continue Reading

Coin Market

What is social engineering in crypto (and how to protect yourself)?

Published

on

By

Social engineering in crypto, explained

In the world of cryptocurrency, security goes beyond just protecting your wallet with a password or private key. One of the most deceptive and increasingly dangerous threats to crypto users today is social engineering.

While you might think of cyberattacks as highly technical affairs, social engineering manipulates the most vulnerable aspect of security: human nature. 

At its core, social engineering refers to the act of manipulating people into divulging confidential information or granting unauthorized access to systems. 

Unlike traditional hacking, which typically exploits technological vulnerabilities, social engineering targets the human element. Attackers rely on deception, psychological manipulation and trust-building tactics to deceive their victims. By exploiting psychological weaknesses, attackers can trick individuals into giving up their private information, credentials or funds. 

In the world of crypto, this kind of manipulation is especially dangerous because transactions are irreversible, and the decentralized nature of cryptocurrencies can make it even harder to recover lost funds. Once funds are transferred or access is granted, it’s almost impossible to reverse the action. This makes crypto users a prime target for social engineering attacks.

Did you know? In 2024, phishing and spoofing topped the US Federal Bureau of Investigation’s list of reported cybercrimes, with victims also losing over $6.5 billion to crypto-related investment fraud, according to the Internet Crime Complaint Center.

Anatomy of a social engineering attack: Step by step

Social engineering attacks trick crypto users by gaining trust, creating urgency, and then stealing sensitive info to drain their wallets.

Step 1: The setup — Scouting for targets

Scammers start by lurking on social media platforms such as X, Discord, Telegram and Reddit.

They look for:

Newbies asking for helpPeople showing off their gains or NFTsUsers who accidentally leak wallet addresses or emails.

The more info they gather, the easier it is to craft a personalized attack.

Step 2: The approach — Gaining trust

Next, they reach out, pretending to be:

A helpful support agent (e.g., from MetaMask, Binance)A famous crypto influencerA friend or community manager.

They copy profile pictures, usernames (sometimes with slight changes), and even fake verification badges to seem real. This is all about lowering your guard.

Step 3: The hook — Creating urgency or fear

Now they trigger your emotions with urgent, scary or tempting messages:

“Your wallet is at risk — act now!”“Exclusive airdrop ending in 5 minutes!”“We detected suspicious activity — please verify your account!”They use fear, excitement and time pressure to force you into quick action without thinking.

Step 4: The ask — Extracting sensitive info

This is where the real trap springs. They ask you to:

Share your private key or seed phrase (a big red flag)Click a link to a phishing site that looks like MetaMask, Phantom or OpenSeaApprove a suspicious smart contract that drains your walletSend a small amount of crypto to “verify your account” or “unlock” funds.

If you fall for this step — game over.

Step 5: The heist — Draining your crypto

Once they get your sensitive info or get you to sign a malicious transaction, they:

Instantly drain your wallet of coins and tokensSwap your assets into privacy coins (e.g., Monero) to hide the trailLaunder the funds through mixers or exchanges.

Victims usually realize the theft too late; sadly, funds are gone forever in most cases.

Did you know? Onchain analyst ZachXBT uncovered an additional $45 million stolen from Coinbase users in early May 2025 through social engineering scams — a tactic he says is uniquely prevalent on the platform compared to other crypto exchanges.

Common types of social engineering scams in crypto

Scammers target crypto users via phishing, impersonation, giveaway and romance scams, and fake investment platforms.

Phishing

Phishing remains one of the most prevalent forms of social engineering in the crypto world. This can take several forms but typically involves fake websites, apps or emails designed to look legitimate.

Fake wallet apps: Scammers create fake versions of popular wallet apps like MetaMask or Trust Wallet. They trick users into downloading these apps, which then steal the private keys and funds stored within them.Fake exchanges: Similarly, attackers might impersonate well-known cryptocurrency exchanges. Victims are sent a link to a phishing site that looks identical to a legitimate platform, such as Binance or Coinbase. Once users log in and input their details, the attacker gains access to their funds.Fake MetaMask pop-ups: One common trick involves fake pop-ups that prompt MetaMask users to enter their seed phrase or private keys, thereby giving scammers control over their wallets.

Impersonation

Impersonation scams occur when attackers pose as legitimate figures — whether that’s support staff, crypto influencers or even friends — to convince victims to hand over their information or funds.

Fake support staff: In many cases, scammers will impersonate customer support agents for popular crypto wallets or exchanges. They might reach out to users claiming there’s an issue with their account and ask for sensitive information, such as a password or seed phrase.Influencers and friends: Attackers might pretend to be well-known crypto influencers or friends, asking for funds or convincing victims to participate in a scam. In some cases, attackers even go as far as to hijack a social media account of a crypto personality, offering fake giveaways or investment opportunities.

Giveaway scams

“Send 1 ETH, get 2 ETH back” — this is the classic giveaway scam that has made its rounds throughout the crypto community. Scammers pose as trusted entities, often mimicking celebrities like Elon Musk or official crypto exchanges, claiming they’re running a giveaway.

The catch? The scammer asks you to send cryptocurrency to a specified wallet address in exchange for a larger amount of crypto that you’ll receive “later.” Once the funds are sent, they disappear.

Romance and friendship scams

Romance and friendship scams, often known as pig butchering, occur when an attacker builds an emotional connection with the victim through messaging platforms like Telegram or even dating apps. Over time, the scammer gains the victim’s trust and then lures them into a fake investment opportunity, often involving cryptocurrency.

Victims are manipulated into sending funds to what they believe is a secure investment, only to lose all their money when the scammer disappears.

Fake investment platforms

Fake investment platforms promise extremely high returns with minimal risk — too good to be true. These scams might mimic legitimate crypto investment platforms, promising high returns on crypto investments or passive income streams. 

Once users deposit their funds, the platform either disappears or the scammer stops responding to communication.

Why social engineering works so well in crypto

Social engineering attacks thrive in the cryptocurrency world because they take advantage of certain vulnerabilities that are unique to the space. The combination of psychological manipulation, technical complexity and the irreversible nature of crypto transactions makes crypto users particularly susceptible to these types of scams. 

Below are the key factors that explain why social engineering is so effective in the crypto environment:

Fear and urgency: Crypto scams often create a sense of urgency to pressure victims into acting quickly. Common examples include emails or messages stating, “Your account is locked!” or “You need to verify your identity to avoid losing access to your funds!” These messages push users to make impulsive decisions that they later regret.Greed: Social engineering tactics often prey on a person’s desire to make quick, easy money. Scammers might promise users huge returns on investment or offer “exclusive” crypto deals that seem too good to pass up. This appeals to the greed of crypto investors, making them more likely to act impulsively.

Lack of crypto security knowledge: Many crypto users, especially beginners, may not fully understand how crypto security works. This makes them more susceptible to attacks like phishing, where they might unknowingly give up their private keys or passwords. Scammers take advantage of this lack of knowledge to manipulate and deceive.

How to protect yourself from social engineering attacks

While social engineering is hard to prevent entirely, staying vigilant, using 2FA, verifying links and practicing strong security habits can significantly reduce your risk.

Several steps you can take to minimize your risk include:

Be skeptical of unsolicited messages: Always be cautious when you receive unsolicited messages, whether by email, SMS or social media. If someone contacts you out of the blue asking for sensitive information or money, verify the authenticity of the message before acting.Enable two-factor authentication (2FA): Always use 2FA whenever possible. This adds an extra layer of security to your accounts, making it harder for attackers to gain access — even if they manage to obtain your password.Verify links and URLs: Before clicking on any link, hover your cursor over it to see where it leads. If the URL looks suspicious or doesn’t match the official site, don’t click it. Always double-check URLs for legitimacy, especially when dealing with crypto transactions.Educate yourself and others: The best defense against social engineering is knowledge. Stay informed about common scams and share this knowledge with others. The more you know, the less likely you are to fall for a scam.Use strong security practices: Consider using hardware wallets for storing your crypto assets, as these are considered much safer than keeping them on exchange platforms or software wallets. Always keep your private keys and seed phrases secure and never share them with anyone.

In a crypto world full of scammers, your best defense is vigilance, education and strong security practices — because even the smartest tech can’t protect you from a well-crafted con.

Continue Reading

Coin Market

Ethereum flips Coca-Cola and Alibaba as ETH gains 42% in 5 days

Published

on

By

Ether’s market capitalization surged 42% in five days following the successful launch of Ethereum’s Pectra upgrade on its mainnet. 

On May 12, the company data tracker 8marketcap showed that Ether (ETH) surpassing Coca-Cola and Alibaba, ranking as the world’s 39th-largest asset by market capitalization. At publication time, ETH was trading at approximately $2,550, with a market cap exceeding $308 billion. 

By comparison, Coca-Cola stock trades at around $70, giving it a market cap of $303.53 billion. Alibaba stock trades at about $125, with a market capitalization of $303.72 billion. 

ETH’s recent price action comes on the heels of a network upgrade that improves the storage of layer-2 scaling data, validator user experience and smart account wallet user experience features. 

Ether surpasses Coca-Cola and Alibaba in market capitalization. Source: 8marketcap

Ethereum implements the Pectra upgrade on mainnet

Originally scheduled for March 2025, Pectra faced delays after technical challenges arose during testing.

On Feb. 24, the upgrade was deployed on Ethereum’s Holesky testnet. Following the deployment, the upgrade failed to finalize on the network, leading the developers to investigate and address the issues. On March 5, Pectra was rolled out to the Sepolia testnet, but the developers encountered errors made worse by an attacker who caused the mining of empty blocks

To further prepare for the deployment, Ethereum core developers created a new testnet called “Hoodi” before deploying the upgrade to the mainnet on May 7

With the upgrade, externally owned accounts (EOAs) can act as smart contracts to cover gas fees and payments using tokens that are not ETH. In addition, validator staking limits were increased from 32 ETH to 2,048 ETH, simplifying operations for large stakers. The upgrade also increases the number of data blobs per block, allowing better scalability for layer-2 networks.

Since the upgrade, ETH’s price has started to skyrocket. On May 7, Ether traded at about $1,786, according to CoinGecko. On May 12, Ether went as high as $2,550, representing a 42% increase in value. 

Ether’s seven-day price chart. Source: CoinGecko

Related: Vitalik Buterin outlines vision as Ethereum ecosystem addresses hit new high

Security professionals warn of risks post Pectra upgrade

However, the upgrade introduced potential security risks. Post upgrade, cybersecurity experts warned that attackers could exploit a new transaction type to control EOAs without users signing onchain transactions. 

Solidity smart contract auditor Arda Usman previously cautioned in comments to Cointelegraph that these vulnerabilities could allow attackers to drain funds through offchain signed messages.

Magazine: 12 minutes of nail-biting tension when Ethereum’s Pectra fork goes live

Continue Reading

Trending