Search company, investor...
Enigma company logo


Founded Year



Series A | Alive

About Enigma

Enigma creates a scalable, decentralized, algorithmic trading platform for crypto-assets. The platform allows for the exchange of crypto-assets between any number of off-chain payment networks; algorithmic trading without giving up control of assets; and off-chain payments, allowing for instant settlements. It was founded in 2011 and is based in New York, New York.

Headquarters Location

245 5th Avenue 17th & 18th Floors

New York, New York, 10016,

United States

Missing: Enigma's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

Missing: Enigma's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Research containing Enigma

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Enigma in 1 CB Insights research brief, most recently on Mar 9, 2022.

Expert Collections containing Enigma

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Enigma is included in 2 Expert Collections, including Blockchain.



8,854 items

Companies in this collection build, apply, and analyze blockchain and cryptocurrency technologies for business or consumer use cases. Various industries include financial services, trade finance, supply chain, enterprise tech, consumer and retail, and healthcare.



7,985 items

US-based companies

Latest Enigma News

Enigma InfoStealer Steals Sensitive Data From Crypto Firms

Feb 13, 2023

Suspected Russian hackers are using an information stealer named Enigma to target Eastern Europeans with fake cryptocurrency job offers. Additionally, the attackers are using a set of heavily obfuscated loaders that exploit an Intel driver vulnerability to load a malicious driver. This reduces the token integrity of Microsoft Defender to bypass protections. Infection chain According to Trend Micro , the infection chain initiates with a phishing message or mail that is usually sent through social media. The message or mail comes with a malicious RAR archive attachment that contains a text file and an executable. The text contains sample interview questions written in Cyrillic. It convinces the target about a fake cryptocurrency role or job opening interview and pretends to be helpful with the preparation for this interview. The executable file that masquerades as a legitimate Word document, contains the first stage Enigma loader. It is designed to lure unsuspecting victims into executing the loader, subsequently beginning the registration and downloading the second-stage payload. Malware functionality Enigma is a modified version of Stealerium. It is written in C++ and uses API hashing, string encryption, and irrelevant code to avoid being detected. The malware has multi-stage payloads (obfuscated loaders) such as EngimaDownloader_s001, EngimaDownloader_s002, and EngimaDownloader_s003. The first, second, and third-stage payloads exploit an Intel driver vulnerability ( CVE-2015-2291 ) to load a malicious driver that patches the integrity level of the Microsoft defender and forcibly reduces it from system to untrusted integrity. The final stage deploys the Enigma Stealer, which initializes configuration on execution and sets up its working directory. Malware infrastructure Enigma uses two servers in its operation. The first server utilizes Telegram for delivering payloads, sending commands, and receiving payload updates. The second server is used for DevOps and logging purposes. The payload sends its execution log at each stage to the logging server to improve malware performance. The payload was observed utilizing the Amadey C2 panel for polling and reconnaissance services. Malware capabilities Enigma collects system information and steals user information, tokens, and passwords from various web browsers and apps such as Google Chrome, Microsoft Edge, Microsoft OpenVPN, Outlook, Signal, and Telegram. It captures screenshots and extracts clipboard content and VPN configurations from the infected device. It compresses the collected information and exfiltrates it to the attacker via Telegram. Conclusion Experts discovered that Enigma is under continuous development and the attackers are using highly obfuscated and evasive techniques and CI/CD principles. Individuals are suggested to continuously update their security solutions and remain cautious of social media posts or phishing attempts that offer job opportunities or salary increase-related lures.

Enigma Frequently Asked Questions (FAQ)

  • When was Enigma founded?

    Enigma was founded in 2011.

  • Where is Enigma's headquarters?

    Enigma's headquarters is located at 245 5th Avenue, New York.

  • What is Enigma's latest funding round?

    Enigma's latest funding round is Series A.

  • Who are the investors of Enigma?

    Investors of Enigma include Outlier Ventures, Flybridge Capital Partners, Floodgate, Pantera Capital, Digital Currency Group and 3 more.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.