Cryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)
Introduction
AI Analysis
Technical Summary
This ongoing cryptocurrency scam campaign, documented by the SANS Internet Storm Center, uses phishing emails containing minimal messaging and links to free publishing platforms such as telegra.ph and Google Forms. The campaign began in October 2025 and persists into 2026, targeting potential victims with promises of substantial Bitcoin payouts allegedly owed to them from an automated Bitcoin mining cloud platform. The emails often contain links to Google Forms that funnel victims to telegra.ph pages hosting the scam content. These pages feature fake chatbots and interfaces designed to convince victims they have over $100,000 worth of Bitcoin. To access or convert these funds, victims are instructed to pay a fee, which is sent to wallets controlled by the scammers. The campaign leverages the ease of creating and hosting content on free platforms, making it cost-effective and scalable for attackers. The scam relies heavily on social engineering, exploiting victims' interest in cryptocurrency gains without deploying malware or exploiting software vulnerabilities. The campaign's persistence and use of trusted platforms like Google Forms increase its credibility to unsuspecting users. No technical exploits or vulnerabilities are involved, but the financial impact on victims can be significant. The campaign does not require victims to authenticate or perform complex actions beyond interacting with phishing content and sending payments.
Potential Impact
European organizations and individuals face financial risks from this scam, particularly those involved or interested in cryptocurrency investments. While the campaign targets individuals rather than enterprise systems, employees falling victim could lead to indirect impacts such as financial loss, decreased trust in corporate communications, and potential exposure of corporate email addresses to further phishing attempts. The use of legitimate platforms like Google Forms and telegra.ph complicates detection and blocking efforts, increasing the likelihood of successful phishing attempts. The campaign's persistence suggests ongoing risk, especially as cryptocurrency remains popular in Europe. Financial institutions and cryptocurrency exchanges in Europe might see increased phishing attempts targeting their customers, potentially undermining trust in digital financial services. The campaign does not threaten system availability or integrity but poses a significant confidentiality and financial risk to individuals. Organizations may also face reputational damage if employees are compromised or if phishing emails spoof corporate domains.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing cryptocurrency-related scams and the risks of interacting with unsolicited emails containing links to free publishing platforms. Email filtering solutions should be tuned to detect and quarantine messages containing links to known abused platforms like telegra.ph and suspicious Google Forms, using threat intelligence feeds and URL reputation services. Deploy advanced anti-phishing technologies that analyze email content and URLs dynamically to identify and block emerging scam campaigns. Encourage employees to verify unsolicited cryptocurrency-related communications through official channels before taking any action. Implement DMARC, DKIM, and SPF email authentication protocols to reduce the risk of domain spoofing in phishing emails. Monitor corporate email accounts for signs of compromise and unusual outgoing payments that could indicate successful scams. Collaborate with local law enforcement and cybersecurity agencies to report and track phishing campaigns. Finally, maintain updated threat intelligence on cryptocurrency scams to adapt defenses promptly as tactics evolve.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Switzerland
Cryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)
Description
Introduction
AI-Powered Analysis
Technical Analysis
This ongoing cryptocurrency scam campaign, documented by the SANS Internet Storm Center, uses phishing emails containing minimal messaging and links to free publishing platforms such as telegra.ph and Google Forms. The campaign began in October 2025 and persists into 2026, targeting potential victims with promises of substantial Bitcoin payouts allegedly owed to them from an automated Bitcoin mining cloud platform. The emails often contain links to Google Forms that funnel victims to telegra.ph pages hosting the scam content. These pages feature fake chatbots and interfaces designed to convince victims they have over $100,000 worth of Bitcoin. To access or convert these funds, victims are instructed to pay a fee, which is sent to wallets controlled by the scammers. The campaign leverages the ease of creating and hosting content on free platforms, making it cost-effective and scalable for attackers. The scam relies heavily on social engineering, exploiting victims' interest in cryptocurrency gains without deploying malware or exploiting software vulnerabilities. The campaign's persistence and use of trusted platforms like Google Forms increase its credibility to unsuspecting users. No technical exploits or vulnerabilities are involved, but the financial impact on victims can be significant. The campaign does not require victims to authenticate or perform complex actions beyond interacting with phishing content and sending payments.
Potential Impact
European organizations and individuals face financial risks from this scam, particularly those involved or interested in cryptocurrency investments. While the campaign targets individuals rather than enterprise systems, employees falling victim could lead to indirect impacts such as financial loss, decreased trust in corporate communications, and potential exposure of corporate email addresses to further phishing attempts. The use of legitimate platforms like Google Forms and telegra.ph complicates detection and blocking efforts, increasing the likelihood of successful phishing attempts. The campaign's persistence suggests ongoing risk, especially as cryptocurrency remains popular in Europe. Financial institutions and cryptocurrency exchanges in Europe might see increased phishing attempts targeting their customers, potentially undermining trust in digital financial services. The campaign does not threaten system availability or integrity but poses a significant confidentiality and financial risk to individuals. Organizations may also face reputational damage if employees are compromised or if phishing emails spoof corporate domains.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing cryptocurrency-related scams and the risks of interacting with unsolicited emails containing links to free publishing platforms. Email filtering solutions should be tuned to detect and quarantine messages containing links to known abused platforms like telegra.ph and suspicious Google Forms, using threat intelligence feeds and URL reputation services. Deploy advanced anti-phishing technologies that analyze email content and URLs dynamically to identify and block emerging scam campaigns. Encourage employees to verify unsolicited cryptocurrency-related communications through official channels before taking any action. Implement DMARC, DKIM, and SPF email authentication protocols to reduce the risk of domain spoofing in phishing emails. Monitor corporate email accounts for signs of compromise and unusual outgoing payments that could indicate successful scams. Collaborate with local law enforcement and cybersecurity agencies to report and track phishing campaigns. Finally, maintain updated threat intelligence on cryptocurrency scams to adapt defenses promptly as tactics evolve.
Affected Countries
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32594","fetched":true,"fetchedAt":"2026-01-04T04:43:40.724Z","wordCount":467}
Threat ID: 6959effcdb813ff03eac9305
Added to database: 1/4/2026, 4:43:40 AM
Last enriched: 1/4/2026, 4:43:50 AM
Last updated: 1/8/2026, 5:49:17 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
MediumMicrosoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
MediumWebinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
LowComplex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
MediumA phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.