Skip to content
Main

Research · MiCA · Forensic Analysis

Who gets MiCA-licensed, who fails, and why.

A forensic analysis of 177 successful CASP authorisations and notifications, 20 jurisdictions, the supervisory record on incomplete and unauthorised operators, and the patterns that separate viable applicants from costly stalls.

The successful MiCA CASP population is not a homogeneous set of "crypto licences." It is a mixed population of Article 63 authorisations and Article 60 notifications by already regulated financial entities — and that distinction is central to reading the data. Volume by country is not a proxy for low standards or high standards. The pattern that separates higher-probability applicants from weak ones is whether the NCA can trust the applicant's legal entity, local decision-making, AML/CFT framework, client-asset safeguarding, ICT/DORA resilience, outsourcing governance, product perimeter and evidence quality.

Three visible routes to success

  1. Existing regulated financial entity adding narrow or equivalent crypto services. Banks, investment firms, EMIs/PIs, CSDs and AIFMs use Article 60 — but the notification still requires programme of operations, AML/CFT, ML/TF risk, BCP, ICT/security, segregation and custody-policy evidence, and the CASP cannot begin services while the notification is incomplete.[S2]
  2. Clean VASP-to-MiCA conversion with local substance and implemented controls. Moderate service scopes, recognisable domestic or EU operating history, alignment between product and service codes.
  3. Large crypto-native platform with broad scope — but enough resources, local substance and remediation capacity to satisfy scrutiny. Visible in Malta, Luxembourg, Ireland, Austria and the Netherlands; carries higher host-NCA, investor-protection and supervisory-convergence risk.

Failure, delay and withdrawal are harder to observe because there is no public EU-wide rejection register. The strongest entity-level negative signals are MEXC in the Netherlands and LWEX in Slovakia — both regulatory-concern / non-authorised-operation cases, not proven rejected applications. AFM warned MEXC was operating without the required licence in the Netherlands and actively targeting Dutch consumers, with the entity location and legal entity unclear.[S6] NBS said LWEX continued to provide crypto-asset services in Slovakia without appropriate authorisation and was entered under MiCA Article 110 into ESMA's non-compliant register.[S14]

The blunt practical answer: weak applicants fail or stall because they ask the NCA to trust assertions. Successful applicants supply evidence. A CASP application is not a policy-writing exercise; it is a test of whether the business can operate exactly as described, under an identifiable EU entity, with real people, real systems, real capital, and auditable controls.

1. Benchmark dataset analysis

1.1 Jurisdiction distribution

Germany dominates numerically, but the German cluster is not a simple crypto-native exchange cluster — it is heavily influenced by banks, brokers, asset managers and investment-firm-style service scopes. Malta has a much higher average service breadth and a concentration of broad crypto-native exchange models. The Netherlands combines early authorisations with a large crypto-native and retail/broker base. France, Ireland and Luxembourg appear more institutionally selective.

Jur.RecordsAvg breadthBroad ≥5Trading platform (b)Custody (a)Likely Art. 60
DE512.18621434
NL233.2223171
FR134.0860103
MT125.67103111
IE113.272254
CY104.904194
AT84.385070
CZ64.834261
ES63.671065
LT63.501062
SK64.834060
FI53.201042
LI52.600035
LU44.252141
DK34.331021
SI33.000020
LV24.001020
BE12.000011
BG19.001011
SE16.001010
Successful MiCA CASP records by jurisdiction
Records by jurisdiction. Germany leads numerically; Malta and Netherlands cluster broader scopes.

1.2 Service-code distribution

Custody (a) and transfer services (j) are the dominant rails — present in 117 and 107 records respectively. Trading platform (b) is rare with only 14 records, and should be treated as a high-risk service: it brings order-book integrity, market abuse, operational resilience and conflicts-management issues. Advice (h) and portfolio management (i) are also relatively uncommon, reflecting suitability, conflict, competence and investment-process burdens.

CodeServiceCountShare
aCustody and administration of crypto-assets on behalf of clients11766.1%
cExchange of crypto-assets for funds9151.4%
eExecution of orders for crypto-assets on behalf of clients9252.0%
dExchange of crypto-assets for other crypto-assets7743.5%
jTransfer services for crypto-assets on behalf of clients10760.5%
gReception and transmission of orders for crypto-assets on behalf of clients5329.9%
iPortfolio management on crypto-assets3016.9%
hAdvice on crypto-assets2111.9%
fPlacing of crypto-assets1810.2%
bOperation of a trading platform for crypto-assets147.9%
MiCA service-code frequency across the benchmark
Custody, transfer, exchange-for-funds and execution dominate. Trading platform is rare and supervisory-heavy.

1.3 Timing waves and scope breadth

The early wave starts in the Netherlands on 30 December 2024 and in Malta/Germany in January 2025. The large numerical wave is late 2025 — especially December 2025 (42 records) — coinciding with national transition pressure in several Member States. Lithuania's central bank publicly stated that its transition period ended on 31 December 2025 and that provision of crypto services without a MiCA licence after that date would be illegal financial activity.[S10]

125 of 177 records are narrow (1–2 services) or moderate (3–4 services) scope. Only 5 records are very broad (8–10 services). This strongly supports a sequencing lesson: broad "everything-at-once" applications are the exception, not the norm, and tend to be associated with larger, better-resourced or already regulated applicants.

Monthly authorisation timeline
Monthly timeline — December 2025 spike under transition pressure.
Distribution of service-scope breadth
Scope breadth — narrow + moderate is the norm; very broad is the exception.

2. What separates success from failure

Across the positive-control population, successful applicants share at least one of four credibility anchors: pre-existing regulation; a recognisable VASP operating history; a narrow or coherent scope; and entity / perimeter clarity. The negative-signal population is the inverse — unclear legal entity and location, unauthorised activity during transition, incomplete or low-quality files, weak local substance, outsourcing that blocks effective supervision, and MiCA-washing where regulated and unregulated products are mixed on the same platform.[S3][S12]

DimensionHigher-probability patternFailed / delayed pattern
Prior regulatory statusBank, investment firm, EMI/PI, CSD, AIFM, or clean VASP with supervisory historyUnregulated crypto-native shell or legacy VASP assuming registration equals MiCA approval
Jurisdiction strategyNatural home-state nexus, local substance, model fit with NCA precedentJurisdiction shopping based on perceived speed; legal entity selected after product is already live
Service scopeNarrow/moderate first, coherent with the actual productBroad all-services application, especially custody + trading platform + transfer + advice/portfolio
GovernanceIdentifiable local management; clear board accountability; independent control functionsNominee directors; decision-making at offshore/group level; no credible 3-lines-of-defence
AML/CFTImplemented blockchain analytics, sanctions, monitoring, Travel Rule, source-of-funds controlsGeneric AML policy; no tuning/testing; weak wallet attribution; unclear Travel Rule go-live
Custody/safeguardingSegregation, wallet controls, key management, reconciliations, incident response, bankruptcy analysisCommingled assets, unclear key control, unauthorised third-country custodian, no reconciliation evidence
ICT/DORADORA-aligned ICT risk, incident reporting, BCP/DR tests, access controls, vendor oversightCloud/vendor dependency without exit; no test evidence; weak privileged access; no incident playbook
Financial resourcesOwn funds, loss scenarios, wind-down funding, capital and liquidity projectionsThin capital; optimistic projections; no operational-loss or wind-down funding plan
Business-model riskProducts within MiCA perimeter; unregulated services segregated and disclosedStaking/yield/lending/derivatives/offshore services mixed with authorised CASP claims
Application qualityPolicies backed by logs, MI, screenshots, registers, board approvals and tested controlsTemplate pack; inconsistent website/ToS/application; late or contradictory NCA responses

3. Article 60 vs Article 63 as success routes

Article 60 is not a shortcut for any fintech with a licence. It is a notification regime for specified financial entities and equivalent services. Credit institutions may notify crypto services; CSDs may notify custody; investment firms may notify equivalent investment services; EMIs are limited to custody and transfer services for their own EMTs; UCITS managers / AIFMs may notify equivalent portfolio / advice / RTO services; market operators may notify trading-platform operation.[S2]

This means the positive-control register can overstate "new CASP licensing activity" where entries are actually notifications by existing regulated entities. It also means Article 60 applicants can still fail operationally if the notification is incomplete: the CASP cannot begin services while the notification is incomplete.[S2]

4. Jurisdiction patterns — without lazy conclusions

  • Germany — high activity, but much of the volume is regulated-financial-institution style and often narrow. The correct inference is not "BaFin is easy"; it is that Germany has a deep regulated banking / broker / custody ecosystem that can map crypto services onto existing governance.
  • Netherlands — active early mover with crypto-native conversion and broker / exchange concentration. AFM says even a best-case CASP licence takes at least five months, longer where products / services are complex, high-risk or organisational changes are required.[S5]
  • France — credible mix of banks, institutional players and domestic crypto firms. AMF says original MiCA files are rarely complete and clarifications / substantial changes often cause additional delay.[S9]
  • Malta — clearly active for broad crypto-native platforms, but supervisory-convergence credibility is not costless. ESMA's peer review found MFSA's process only partially met expectations in a reviewed case.[S11]
  • Ireland — not a shortcut. CBI requires VASPs to go through the full CASP application process; timelines depend on preparedness, application quality and robust engagement.[S7][S8]
  • Lithuania — strong fintech / payment context, but large legacy VASP attrition. Bank of Lithuania cited 370+ declared crypto-service providers, 120 actually operating, ~30 applications and 10 under assessment.[S10]

5. Applicant archetypes and probability

Translating the data into archetypes makes the decision sharper for any team planning an application. Probabilities below are calibrated against the positive-control population, regulator process statements, and the negative / weak-control dataset — not legal advice.

ArchetypeProfileProbabilityTimeline risk
High-probability applicantBank, investment firm, EMI/PI, AIFM adding narrow equivalent crypto services80–90%Low–medium
Established VASP conversionClean legacy VASP with local team, moderate scope, no major adverse media65–80%Medium (5–9+ months)
Custody / B2B infrastructureInstitutional custody, wallet infrastructure, transfer provider — B2B clients65–85%Medium; high if key functions outsourced
Fintech/neobank crypto moduleNeobank, broker app or payment platform adding execution/RTO/custody70–85%Medium; high if outsourcing chain is opaque
Risky but possible broad exchangeLarge crypto-native exchange with custody, trading platform, broad passporting, offshore links45–65%High (8–15+ months)
Weak applicantThin local entity, outsourced compliance, broad scope, no local executives, template policies15–35%Very high
Likely fail / stallOffshore-linked retail yield/leverage/staking platform using MiCA as marketing cover<20%Extreme

6. Hard blockers, delay factors, strategic mistakes

Hard blockers

  1. Unclear group structure, legal entity, booking model, UBO chain or EU/offshore service perimeter.
  2. Weak local substance and decision-making outside the applicant entity.
  3. Unfit or uncredible management; unresolved adverse supervisory or enforcement history.
  4. AML/CFT deficiencies — sanctions, blockchain analytics, transaction monitoring, Travel Rule, high-risk customer controls.
  5. Custody / safeguarding failure: no segregation evidence, weak key governance, no reconciliation, unauthorised third-country custody dependency.
  6. ICT/DORA resilience gaps and critical outsourcing that prevents effective supervision.
  7. Insufficient own funds, liquidity, insurance or wind-down funding.
  8. Misleading marketing or MiCA-washing — using authorisation to imply protection for unregulated products.
  9. Incomplete Article 60 notification or Article 63 application pack.
  10. Live high-risk products inconsistent with the proposed regulated perimeter.

Major delay factors

  • Applying for a broad service set from day one.
  • Combining trading platform, custody, exchange, transfer and advice / portfolio services.
  • High retail exposure and aggressive cross-border marketing.
  • Large token universe with weak listing / delisting controls.
  • Cross-border or third-country outsourcing of ICT, custody, compliance or operations.
  • Travel Rule or sanctions controls not live.
  • Policies written but not evidenced through logs, MI, tests, reconciliations or board records.

Strategic mistakes

  • Choosing jurisdiction for speed rather than substance, model fit and credibility.
  • Treating MiCA as a legal form-filling exercise instead of an operating-model audit.
  • Copying generic policy templates.
  • Leaving the website / app / ToS inconsistent with the application perimeter.
  • Keeping high-risk yield, lending, derivatives, staking or offshore services live for EU users while applying.
  • Assuming former VASP registration means MiCA authorisation will follow.
  • Assuming Article 60 notification is automatic.

7. The application playbook — what to have ready

  1. Programme of operations, service-by-service perimeter map and country / passporting plan.
  2. Legal entity, group, UBO, intra-group service and booking-model pack.
  3. Board, senior management, key function holder, time-commitment and fit-and-proper pack.
  4. AML/CFT and financial-crime evidence — risk assessment, CDD/EDD, sanctions, transaction monitoring, Travel Rule, blockchain analytics, SAR/STR, high-risk client controls.
  5. Custody / safeguarding evidence — wallet architecture, key governance, client-asset segregation, reconciliations, incident response, insolvency analysis.
  6. ICT/DORA pack — ICT risk framework, incident reporting, BCP/DR testing, access controls, cyber testing, vendor risk, outsourcing register.
  7. Conduct / consumer pack — complaints, disclosures, marketing approvals, conflicts, product governance and unregulated-product segregation.
  8. Financial resources pack — own funds, capital, liquidity, loss scenarios, insurance and wind-down funding.
  9. Control-evidence appendix — screenshots, logs, MI, test results, board minutes, reconciliations, policy approvals, outsourcing due diligence and remediation tracker.

Recommended sequencing: narrow first; add services later; separate regulated and unregulated products; clean website and marketing before contact; use the pre-application meeting to test perimeter, service codes, Article 60 eligibility and evidence expectations; bring a regulator-ready governance pack that shows who is accountable, where decisions are made, and how control functions challenge the business.

Companion data

The cleaned benchmark dataset, summary tables, weak-control dataset, red-flag checklist, readiness scorecard and applicant-archetype matrix are published alongside this analysis. The full report includes the methodology, the confidence scores attached to each row, and the unresolved data gaps.

Sources

  1. [S1] ESMA MiCA Interim Register
  2. [S2] ESMA Article 60, MiCA Single Rulebook
  3. [S3] ESMA Supervisory Briefing on Authorisation of CASPs under MiCA
  4. [S4] ESMA Statement on the End of Transitional Periods under MiCA
  5. [S5] AFM CASP Licence
  6. [S6] AFM Warning against MEXC
  7. [S7] Central Bank of Ireland MiCAR FAQs
  8. [S8] Central Bank of Ireland CASP Key Facts Document Guidance
  9. [S9] AMF Reminder on DASP Transitional Period
  10. [S10] Bank of Lithuania Wind-down Notice
  11. [S11] Reuters — ESMA criticism of Malta licensing process (10 Jul 2025)
  12. [S12] ESMA — Unregulated products offered by regulated crypto entities
  13. [S13] Reuters — ESMA warning about misleading customers (11 Jul 2025)
  14. [S14] NBS — LWEX in ESMA non-compliant register
  15. [S15] LegalBison — ESMA register study (Feb 2026)
  16. [S16] EBA / ESAs crypto warning
Search
Type to search across research, articles, and pages.

    Press Esc to close · to open the highlighted result.