Connect with us
DAPA Banner

Crypto World

Betterment Confirms Data Breach After Crypto Phishing Attack

Published

on

Crypto Breaking News

Betterment has confirmed a security incident in which attackers exploited social engineering to access third-party tools used by the company, exposing customer contact data and enabling a targeted crypto-themed phishing attempt. The breach, detected on January 9, did not involve compromised passwords or customer accounts, according to the firm. Still, the episode highlights how marketing and operations platforms can become a weak link, especially when attackers leverage trusted communication channels to deceive users.

Key takeaways

  • Unauthorized access occurred on January 9 through social engineering targeting third-party platforms used for marketing and operations.
  • Exposed data included names and email addresses, and in some cases postal addresses, phone numbers, and dates of birth.
  • Attackers sent a fraudulent crypto-related message to a subset of customers, attempting to solicit funds.
  • No customer accounts, passwords, or login credentials were accessed, according to the company’s investigation.
  • Betterment engaged CrowdStrike for forensics and plans a post-incident review within 60 days.

Market context: Social engineering and phishing remain among the most common attack vectors in fintech, with third-party SaaS tools increasingly targeted as firms expand digital communications and customer outreach.

Why it matters

The incident underscores the risks associated with outsourced platforms that handle customer communications. Even when core infrastructure remains secure, attackers can exploit peripheral systems to reach users at scale.

For customers, the breach serves as a reminder that legitimate-looking messages can be deceptive, particularly when they reference popular investment themes like crypto. For fintech firms, it reinforces the need to secure not only internal systems but also the broader vendor ecosystem.

What to watch next

  • Publication of Betterment’s post-incident review within the next 60 days.
  • Results from the independent data analytics review assessing potential privacy risks.
  • Any regulatory or customer notifications that follow the final investigation.
  • Changes to Betterment’s controls and training aimed at preventing social engineering.

Sources & verification

  • Betterment customer updates published between January 9 and February 3, 2026.
  • Company statements confirming forensic findings and remediation steps.
  • Details of the phishing message and affected data categories described in official updates.

How the breach unfolded and what it revealed

Betterment disclosed that an unauthorized individual gained access to certain company systems on January 9 by impersonating legitimate users and exploiting trust-based workflows. Rather than breaching core technical infrastructure, the attacker leveraged social engineering tactics against third-party software platforms that support marketing and operational functions.

This access allowed the attacker to view and extract customer contact information. According to the company, the data exposure primarily involved names and email addresses, though in a subset of cases it also included physical addresses, phone numbers, and birthdates. The total number of affected customers has not been disclosed.

Advertisement

Using the compromised access, the attacker distributed a fraudulent message that appeared to originate from Betterment. The notification promoted a fake crypto-related opportunity, claiming that users could triple the value of their holdings by sending $10,000 to a wallet controlled by the attacker. The message was sent to a limited group of customers whose contact details were accessible through the breached systems.

Betterment said it identified the unauthorized activity on the same day and immediately revoked access to the affected platforms. An internal investigation was launched, supported by the cybersecurity firm CrowdStrike, to determine the scope of the intrusion and verify whether customer accounts or credentials were at risk.

Subsequent forensic analysis found no evidence that the attacker accessed Betterment customer accounts, passwords, or login credentials. The company emphasized that multiple layers of security protected account-level systems and that the breach was confined to contact data and communications tooling.

In the days following the incident, Betterment contacted customers who received the fraudulent message and advised them to disregard it. The firm reiterated that it would never request passwords or sensitive personal information via email, text, or phone calls.

Advertisement

The security incident coincided with additional disruptions in mid-January. On January 13, Betterment experienced intermittent outages to its website and mobile app caused by a distributed denial-of-service attack. The company restored partial service within about an hour and full access later that afternoon, stating that the DDoS event did not compromise account security.

By early February, Betterment provided further updates on its investigation. The company confirmed that while some customer data had been accessed, the privacy impact appeared limited to contact information. An independent data analytics firm was engaged to review all accessed data, including information that a group claiming responsibility for the breach alleged it had posted online.

Betterment also noted that it plans to publish a comprehensive post-incident review within 60 days. In parallel, the company said it is strengthening controls and training programs to better defend against social engineering attempts, which rely on deception rather than technical exploits.

One aspect of the disclosure drew scrutiny from security observers. As of publication, Betterment’s security incident webpage included a “noindex” directive in its source code, instructing search engines not to index the page. While such tags are sometimes used during active investigations, they can make it harder for customers and the public to discover information about breaches through web searches.

Advertisement

The incident reflects a broader pattern across the fintech and crypto-adjacent sectors, where attackers increasingly target trusted communication channels instead of core systems. As companies integrate more third-party tools to manage customer relationships, marketing campaigns, and operational workflows, the attack surface expands beyond traditional network defenses.

For Betterment, the episode has so far not resulted in confirmed financial losses or account takeovers. Still, it highlights how quickly trust can be tested when attackers successfully impersonate a well-known financial platform. The company’s forthcoming post-incident review will likely provide further insight into how the breach occurred and what safeguards will be implemented to reduce the risk of similar attacks in the future.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Crypto giant debuts WTI trading, but it’s a different model to Hyperliquid’s perps

Published

on

Crypto giant debuts WTI trading, but it's a different model to Hyperliquid's perps

The Iran war has set oil on fire and crypto exchanges are racing to offer 24/7 trading to fill tradfi gaps, with most copying decentralized giant Hyperliquid’s perpetual-futures play.

Crypto market-making giant Wintermute is taking a different approach. On Tuesday, its derivatives unit, Wintermute Asia, launched over-the-counter (OTC) trading in WTI crude oil contracts for difference (CFDs).

CFD is type of derivative that allows traders to speculate on the price movement of an asset without owning it. Similar to futures, CFDs track the asset’s price, but the key difference is that only the difference between the opening and closing prices is exchanged between the trader and the broker when the contract is closed.

These are typically traded over-the-counter and can be tailored in term sof size, duration and margin requirements. This bespoke flexibility allows professional traders and institutions to design strategies that match specific risk-return objectives, rather than conforming to one-size-fits-all derivatives such as Hyperliquid’s oil perpetual futures.

Advertisement

Wintermute’s CFD launch comes amid weeks of intense geopolitical volatility in the Middle East. Escalating tensions between Iran and the U.S.–Israel coalition have left traders in a bind over weekends when traditional finance markets are closed, limiting their ability to adjust positions or manage risk effectively. This led to outsized trading activity on Hyperliquid’s energy market perpetuals and prompted WIntermute to offer CFDs.

“We are seeing strong demand from counterparties looking to use digital asset infrastructure to trade traditional products like oil. The recent price action made that need much more immediate, as many investors were unable to act until traditional venues reopened,” said Evgeny Gaevoy, CEO of Wintermute.

“A Wintermute counterparty could have traded the weekend move before the Monday gap or responded immediately to the reversal,” Gaevoy added.

Note that Wintermute is a counterparty in the CFD. Traders aren’t matched with each other; they are trading directly against Wintermute, which is taking on the market risk. The firm is, therefore, leveraging its risk management systems and deep liquidity to monetize demand for 24/7 crude than simply supplying liquidity to perpetual futures.

Advertisement

Traders can access WTI CFDs with zero trading fees, using a variety of fiat and crypto assets as margin, the official announcement said. Contracts can be executed via chat, Wintermute’s electronic OTC platform, or API. The rollout builds on the recent introduction of tokenized gold, further broadening Wintermute Asia’s suite of offerings beyond purely digital assets.

Source link

Continue Reading

Crypto World

Enlivex Raises Funds for Rain Prediction Market Token Buys

Published

on

Enlivex Raises Funds for Rain Prediction Market Token Buys

Immunotherapy company Enlivex has raised $21 million via a debt financing agreement to purchase another 3 billion tokens tied to the prediction market platform Rain.

Enlivex said on Tuesday it exercised an option to acquire another 3 billion Rain (RAIN) tokens at a 62% discount for $10 million on Sunday while extending its option to purchase another 272.1 billion RAIN tokens at the same price to December 2027. The debt financing came from The Lind Partners, a New York-based asset manager.

“We are continuing to execute our prediction markets treasury strategy, and we are pleased that Lind provided us with substantial capital, allowing us to continue the execution of our operating plan, as well as to acquire approximately three billion additional RAIN tokens,” said Enlivex executive chair Shai Novik.

Enlivex develops cell therapy solutions for knee osteoarthritis, but is one of several non-crypto companies that have purchased cryptocurrencies in the hopes that it will strengthen their balance sheets and attract a wider base of investors.

Advertisement

The company also said it approved a $20 million share buyback program, aimed at enhancing shareholder value.

Details of Enlivex’s debt financing announcement. Source: Enlivex

The value of Enlivex’s RAIN treasury is directly tied to Rain’s decentralized prediction market platform, which has a built-in 2.5% fee that automatically buys back and burns RAIN tokens in a bid to boost the token’s supply-demand dynamics.

RAIN token, Envilex shares trade mostly flat

The Rain token rose 7% to $0.009 after Enlivex’s announcement before falling slightly to $0.0088, trading flat over the last 24 hours with a 0.3% gain, according to CoinGecko. 

Shares in Enlivex (ENVL) also traded mostly flat on Tuesday and closed the trading day down 0.9% to $1.10, but gained 4.5% in after-hours trading, rising to $1.15.

Related: Kalshi, Polymarket eye $20B valuations in potential fundraising: WSJ

Advertisement

Rain runs on the Ethereum Layer-2 Arbitrum network and ranks among the top 10 prediction market platforms by total value locked and fees over the past seven days, DeFiLlama data shows.