Retail investors who lost over $14 million
The U.S. Securities and Exchange Commission (SEC) announced on December 24, 2025, that it has filed charges against seven entities for orchestrating a crypto asset investment scam that stole over $14 million from U.S. retail investors. The elaborate fraud leveraged modern technology, including deepfake videos and AI-generated content, to create a veneer of legitimacy. The scheme involved three fake trading platforms—Morocoin Tech Corp., Berge Blockchain Technology Co., and Cirkor Inc.—and four associated "investment clubs." Victims were lured through social media, manipulated in chat groups, and ultimately defrauded on the sham platforms.
The scam operated through a multi-stage process designed to exploit investor interest in both cryptocurrency and artificial intelligence.
h5.morocoin[.]top, www.bergev[.]org, www.cirkortrading[.]com). These platforms falsely claimed to be licensed and offered non-existent investment products, such as "Security Token Offerings" from legitimate companies.This operation was primarily a social engineering campaign enhanced by modern technology. The key TTPs include:
T1583.001 - Acquire Infrastructure: Domains: The attackers registered and set up fraudulent websites to act as their trading platforms.T1566.002 - Phishing: Spearphishing Link: Social media ads and messages contained links directing users to the malicious platforms and chat groups.T1598.003 - Phish for Information: Spearphishing via Service: The entire operation was conducted through social media and messaging services, abusing these platforms to build trust and deliver fraudulent information.The primary impact was the direct financial loss of over $14 million for retail investors across the United States. The scheme specifically targeted individuals with an interest in emerging technologies, exploiting their enthusiasm and potential lack of deep technical knowledge. Beyond the financial loss, such scams erode public trust in both the cryptocurrency market and the legitimate use of artificial intelligence in finance. The SEC's action aims to not only seek restitution but also to raise public awareness about this growing form of fraud.
| Type | Value | Description |
|---|---|---|
| domain | h5.morocoin[.]top |
Fraudulent crypto trading platform. |
| domain | www.bergev[.]org |
Fraudulent crypto trading platform. |
| domain | www.cirkortrading[.]com |
Fraudulent crypto trading platform. |
Detecting these scams requires a high degree of skepticism from potential investors. Key red flags include:
Response for victims involves immediately ceasing all contact and payments, reporting the incident to law enforcement (like the FBI's IC3) and regulatory bodies (like the SEC), and reporting the fraudulent accounts/ads to the social media platforms.
The most critical mitigation for this type of threat is public awareness and education.
M1017 - User Training: Investors should be educated on the hallmarks of investment fraud. This includes verifying the registration and licensing of any trading platform or financial professional through official channels (e.g., SEC's IAPD database), being wary of social media investment schemes, and understanding that there are no guaranteed returns in investing.Educating users and investors to recognize the signs of investment fraud, such as unsolicited offers, promises of guaranteed high returns, and pressure tactics, is the primary defense against such social engineering campaigns.
While this scam is heavily based on social engineering, technical controls can still play a role. Implementing URL analysis at the network edge via secure web gateways or DNS filtering services can help block access to known fraudulent domains like h5.morocoin[.]top and www.bergev[.]org. These systems should be backed by up-to-date threat intelligence feeds that catalog newly identified phishing and scam sites. Advanced solutions can also perform real-time analysis of unknown URLs, checking for characteristics common to fraudulent sites, such as recent domain registration, lack of reputation, and use of non-standard TLDs. While determined attackers will constantly register new domains, this automated blocking provides a critical layer of defense that can prevent many users from ever reaching the malicious content in the first place, disrupting the scam's lifecycle.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats