Connect with us
DAPA Banner

Crypto World

XRP-linked firms secures full e-money License for EU

Published

on

XRP-linked firms secures full e-money License for EU

Ripple said Monday it had received full approval of an Electronic Money Institution (EMI) license from Luxembourg’s financial regulator, the Commission de Surveillance du Secteur Financier (CSSF), a step that would let the company scale regulated payments services across the European Union.

Ripple announced “preliminary” approval last month and has since met all conditions required by the CSSF, which has now granted final authorization.

“Europe has always been a strategic priority for us, and this authorization allows us to scale our mission of providing robust, compliant blockchain infrastructure to clients across the EU,” Cassie Craddock, Managing Director, UK & Europe at Ripple, said.

“We are now better positioned than ever to help European businesses transition into a more efficient, digital-first financial era,” he added.

Advertisement

The move builds on Ripple’s recent regulatory push in Europe. The company said it received an EMI license and cryptoasset registration from the U.K.’s Financial Conduct Authority (FCA) last month, adding to a growing set of permissions for operating payments and crypto-related services in key jurisdictions.

Ripple framed the Luxembourg license as a lever to accelerate “Ripple Payments” across the EU — its cross-border payments product aimed at banks, fintechs and enterprise clients.

Luxembourg is commonly used as a base for regulated financial services across the EU, though Ripple did not detail how quickly it expects to roll out services or which member states are first in line.

Ripple also said its global license count has grown to more than 75, positioning it as one of the more heavily licensed companies in crypto as the industry shifts toward regulated, institution-facing use cases.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

New AI Cybercrime Tool Targets Crypto, Bank KYC Systems via Deepfakes

Published

on

New AI Cybercrime Tool Targets Crypto, Bank KYC Systems via Deepfakes

A threat actor known as “Jinkusu” is allegedly selling cybercrime tools designed to bypass Know Your Customer (KYC) checks at banks and crypto platforms.

The tool uses deepfakes and voice manipulation to trick KYC verification systems on finance platforms, cybercrime tracker Dark Web Informer wrote in a Sunday X post.

Cybersecurity company Vecert Analyzer added that Jinkusu uses AI for real-time face swaps via InsightFace for “fluid gesture transfers,” along with voice modulation to evade biometrics.

Source: Dark Web Informer

The emergence of deepfake tools is a “wake-up call” for the industry, as it highlights the shortcomings of KYC verification systems, according to Deddy Lavid, CEO of blockchain security platform Cyvers.

“As AI lowers the barriers to synthetic identity fraud, the front door will always remain vulnerable,” Lavid told Cointelegraph, urging platforms to adopt a layered security approach combining identity verification with real-time AI monitoring.

Advertisement

AI can crack KYC systems with a single picture

Binance chief security officer Jimmy Su highlighted the growing threat of deepfake technology back in May 2023.

He warned that improving AI algorithms will be able to crack KYC identity systems by using a single picture of the victim.

Related: Revolut confirms ex-employee threatened to leak KYC data for crypto ransom

The new fraud kit also enables scammers to run romance scams, such as “pig butchering,” with no technical knowledge.

Advertisement

Crypto investors lost $5.5 billion to 200,000 flagged pig butchering cases in 2024.

Scam-as-a-service threatens crypto investors

The author of the new fraud package, Jinkusu, is suspected to be the same threat actor who released the phishing kit Starkiller in February 2026.

Unlike traditional, HTML-based phishing kits, Starkiller creates a real-time reverse proxy by creating a headless Chrome browser inside a Docker container, loading the genuine login page of the target brand and relaying all user input, including login and passwords, to the threat actor, explained cybersecurity platform Abnormal, in a Feb. 19 report.

Starkiller phishing-as-a-service malware. Source: Abnormal.ai

While losses to crypto phishing attacks fell 83% in 2025, malicious crypto wallet drainer scripts remained active and new malware continued to emerge, Scam Sniffer said in a January report.

Advertisement

Magazine: Everybody hates GPT-5, AI shows social media can’t be fixed