News
14 Feb 2026, 15:30
Blockchain Goes Big: FedEx Joins Google And IBM On Hedera Council

Blockchain goes mainstream as FedEx joins Google, IBM, and Boeing on the Hedera Council. JPMorgan and Visa prove distributed ledger tech is now essential infrastructure.
14 Feb 2026, 13:30
Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack

BitcoinWorld Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack In a stark reminder of persistent cybersecurity threats, blockchain-based lending platform Figure confirmed a significant data breach this week, exposing sensitive customer information after hackers infiltrated its systems. The incident, reportedly involving the notorious ShinyHunters group and an insider, resulted in 2.5 GB of personal data being leaked on the dark web following a failed ransom negotiation. This breach highlights critical vulnerabilities at the intersection of traditional finance and decentralized technology, raising urgent questions about data protection protocols in the rapidly evolving digital asset sector. Figure Data Breach Timeline and Attack Vector Figure’s security incident unfolded through a multi-stage attack that cybersecurity analysts describe as sophisticated. Initially, threat actors gained unauthorized access to internal systems. Reports from cybersecurity monitoring firms indicate the breach involved credential compromise. The hacking group ShinyHunters, known for targeting financial technology companies, subsequently claimed responsibility for the attack. Investigators discovered evidence suggesting insider assistance facilitated the initial penetration. Consequently, the attackers exfiltrated approximately 2.5 gigabytes of customer data. Figure’s security team detected anomalous network activity during routine monitoring. The company then initiated its incident response protocol immediately. Forensic analysis confirmed the scope of compromised information included: Full names of registered users Physical addresses associated with accounts Dates of birth for identity verification Phone numbers used for authentication Following the data theft, ShinyHunters reportedly demanded a substantial ransom payment in cryptocurrency. Figure’s leadership refused to negotiate with the threat actors. The hacking group then published the stolen dataset on multiple dark web forums. This escalation transformed a contained security incident into a public data exposure crisis. ShinyHunters Hacking Group and Ransomware Tactics The ShinyHunters collective has established itself as a persistent threat to financial technology platforms. Active since 2020, the group typically targets companies handling valuable personal or financial data. Their operational methodology often combines technical exploitation with social engineering techniques. Security researchers have documented their previous attacks against educational institutions, e-commerce platforms, and technology firms. In the Figure breach, ShinyHunters employed what appears to be a double-extortion strategy. First, they stole sensitive customer information. Then, they threatened public release unless Figure paid a ransom. This approach maximizes pressure on victim organizations. Companies face not only regulatory penalties for data exposure but also reputational damage from public disclosure. Recent Major Fintech Data Breaches (2023-2025) Company Year Attack Method Data Exposed Figure 2025 Insider-assisted hack 2.5 GB PII BlockFi 2023 Third-party vendor compromise Client contact info Celsius Network 2024 Phishing campaign Partial user database CoinLoan 2023 API vulnerability Encrypted user data Cybersecurity experts note that blockchain companies present unique attack surfaces. While distributed ledger technology provides transaction immutability, supporting infrastructure remains vulnerable. Customer databases, web servers, and employee access systems represent potential entry points. The Figure breach demonstrates that blockchain-based applications inherit traditional cybersecurity risks alongside novel technological challenges. Insider Threat Implications for Financial Technology The alleged insider involvement in Figure’s breach warrants particular attention from security professionals. Insider threats represent one of the most difficult attack vectors to detect and prevent. Malicious insiders possess legitimate access credentials and understand internal security protocols. They can bypass perimeter defenses that might stop external attackers. Financial technology companies like Figure manage particularly sensitive data. They must balance operational efficiency with stringent access controls. The principle of least privilege becomes essential in this environment. Employees should only access data necessary for their specific job functions. Additionally, robust monitoring systems must track unusual data access patterns. Blockchain lending platforms face additional complexities. They often integrate traditional banking compliance requirements with cryptocurrency innovations. This hybrid operational model creates overlapping security jurisdictions. Consequently, comprehensive security frameworks must address both conventional and novel threat vectors. Regular security audits, employee training, and incident response drills become non-negotiable components of operational resilience. Regulatory and Compliance Consequences Data breaches trigger significant regulatory obligations for financial services providers. Figure operates within multiple jurisdictional frameworks governing data protection. The company must comply with state-level regulations like the California Consumer Privacy Act. Additionally, financial regulators oversee aspects of their lending operations. Breach notification laws typically require disclosure within specific timeframes. Figure acknowledged the security incident promptly. The company stated it notified affected individuals according to legal requirements. However, the dark web publication of stolen data complicates remediation efforts. Exposed individuals now face elevated risks of identity theft and phishing attacks. Therefore, Figure likely will provide credit monitoring services to impacted customers. The blockchain lending sector operates under increasing regulatory scrutiny. Recent guidance from financial authorities emphasizes cybersecurity preparedness. Companies must demonstrate robust incident response capabilities. They should implement encryption for sensitive data both in transit and at rest. Furthermore, regular penetration testing and vulnerability assessments have become industry standards. The Figure breach may accelerate regulatory examinations of cybersecurity practices across the digital asset lending industry. Customer Impact and Response Measures Individuals affected by the Figure data breach should take immediate protective actions. Exposed personal information enables various forms of fraud. Cybercriminals may attempt account takeover attacks using stolen credentials. They might also conduct targeted phishing campaigns referencing the breach. Therefore, vigilance becomes essential for potentially impacted customers. Security experts recommend several response measures for breach victims: Monitor financial accounts for unauthorized activity Enable two-factor authentication on all financial accounts Review credit reports for suspicious inquiries or accounts Consider credit freezes with major bureaus to prevent new account fraud Use unique passwords for each online account Figure has established a dedicated response channel for affected customers. The company likely will provide specific guidance based on individual exposure levels. However, customers should independently verify any communications claiming association with Figure’s response. Attackers often exploit breach notifications to launch secondary phishing campaigns. Blockchain Security Paradox and Industry Implications The Figure breach reveals a fundamental security paradox in blockchain finance. Distributed ledger technology provides unprecedented transaction transparency and integrity. Yet, the applications built atop blockchain infrastructure remain susceptible to conventional attacks. This disconnect between protocol security and application vulnerability requires urgent industry attention. Blockchain lending platforms like Figure promise decentralized financial services. They aim to eliminate traditional intermediaries through smart contracts. However, customer onboarding, identity verification, and data storage often involve centralized components. These centralized elements become attractive targets for attackers. Therefore, the industry must develop more resilient architectural approaches. Several emerging technologies offer potential solutions. Zero-knowledge proofs could enable identity verification without exposing raw personal data. Decentralized identity systems might allow users to control their personal information. Homomorphic encryption could permit data processing without decryption. However, widespread implementation of these technologies remains years away. Meanwhile, companies must strengthen conventional cybersecurity measures while pursuing innovative approaches. Conclusion The Figure data breach represents a significant cybersecurity event with implications beyond a single company. This incident demonstrates that blockchain-based financial services face persistent threats from determined adversaries. The involvement of ShinyHunters highlights the professionalization of cybercrime targeting fintech platforms. Furthermore, the alleged insider component underscores the importance of comprehensive security frameworks addressing both external and internal threats. As the digital asset industry matures, security must become a foundational priority rather than a secondary consideration. The Figure data breach should catalyze industry-wide security enhancements. Companies must implement defense-in-depth strategies combining technological controls with human factors management. Regulatory bodies will likely increase scrutiny of cybersecurity practices across the sector. Ultimately, building trust through demonstrable security resilience will determine which blockchain financial platforms succeed in the coming years. FAQs Q1: What specific data was exposed in the Figure breach? The compromised information includes customer names, physical addresses, dates of birth, and phone numbers. The 2.5 GB dataset contained personally identifiable information but reportedly did not include financial account details or Social Security numbers according to initial assessments. Q2: How did ShinyHunters gain access to Figure’s systems? Cybersecurity investigators believe the breach involved insider assistance combined with external hacking techniques. The exact method remains under investigation, but evidence suggests credential compromise facilitated initial access before data exfiltration occurred. Q3: What should affected Figure customers do immediately? Impacted individuals should monitor their financial accounts for unusual activity, enable two-factor authentication where available, review credit reports for suspicious inquiries, and consider placing credit freezes with major bureaus to prevent identity theft. Q4: How does this breach affect Figure’s blockchain lending operations? The company continues operating its lending platform while investigating the breach. However, the incident may trigger regulatory examinations and could impact customer trust. Figure has implemented additional security measures and enhanced monitoring following the attack. Q5: Are other blockchain lending platforms at similar risk? All financial technology companies face cybersecurity threats, but specific risk profiles vary. The Figure breach highlights vulnerabilities in centralized data storage components common across many blockchain applications. The industry is likely to increase security investments following this incident. This post Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack first appeared on BitcoinWorld .
14 Feb 2026, 13:13
Cardano Eyes XRP Integration: Charles Hoskinson Talks DeFi Game-Changer

Cardano Eyes Potential XRP Integration to Boost DeFi Interoperability Cardano founder Charles Hoskinson has intrigued the crypto community by hinting at potential XRP integration into Cardano’s DeFi ecosystem, according to on-chain data from XRP Update. Well, this move could go beyond a simple token listing, marking a significant stride toward cross-chain interoperability and deeper blockchain collaboration. Hoskinson, recognized for championing scalable and sustainable blockchain design, explored ways to integrate XRP into Cardano’s DeFi ecosystem. While still preliminary, this could let developers and users combine XRP’s fast transactions with Cardano’s smart contracts, enabling cross-chain liquidity, decentralized trading, and novel financial products. The announcement comes as XRP is cited in the Federal Reserve’s new crypto risk calibration proposal. Why does this matter? Well, interoperability is emerging as a cornerstone of crypto adoption. Cardano’s proof-of-stake platform and expanding dApp ecosystem make it ideal for bridging solutions, while XRP’s fast, reliable network excels in cross-border payments. Connecting these ecosystems could enable seamless asset transfers, token staking, and DeFi participation—reducing reliance on centralized exchanges. Cardano and XRP Hint at Game-Changing Cross-Chain Collaboration in DeFi Hoskinson’s remarks signal growing collaboration in blockchain. Integrating XRP could boost Cardano’s DeFi adoption and liquidity, while giving XRP holders access to Cardano’s smart contracts, strengthening both ecosystems and driving cross-protocol innovation. While no formal partnership or timeline has been confirmed, discussions highlight the crypto sector’s rapid evolution. As developers advance cross-chain bridges and interoperable DeFi solutions, projects like Cardano and XRP could drive a more connected blockchain ecosystem. Hoskinson’s remarks hint at a future where digital assets move seamlessly across networks, boosting liquidity, innovation, and global financial connectivity. The potential XRP-Cardano collaboration signals a key step toward unlocking multi-chain DeFi and transcending isolated blockchain networks. Conclusion XRP’s potential integration into Cardano’s DeFi ecosystem marks a key step toward blockchain interoperability. By bridging these networks, it could boost liquidity, expand DeFi opportunities, and showcase the rising significance of cross-chain solutions. Though still exploratory, Hoskinson’s vision points to a future where cryptocurrencies and decentralized platforms operate seamlessly, unlocking new possibilities for developers, investors, and users.
14 Feb 2026, 13:00
Binance Confirms 3 Arrested In France Executive’s Home Invasion — Details

According to local reports, the head of Binance France was the victim of a home invasion on Thursday, February 12. In the latest development, three individuals connected to the break-in have been arrested by the French police. Binance Co-Founder Confirms Break-In And Police Arrests In a Friday report, local media outlet RTL revealed that three hooded individuals carrying weapons tried to enter an apartment in Val-de-Marne, a department bordering Paris, the French capital city. The suspects initially broke into another resident’s apartment, demanding directions to the home of the head of Binance France. According to RTL, the suspects searched the Binance France executive’s apartment and made off with two mobile phones. However, the three individuals were reportedly apprehended during a second home break-in attempt in Hauts-de-Seine, another department bordering Paris. RTL reported that local law enforcement recovered the stolen mobile phones and a vehicle linking the suspects to the home invasion of the Binance France executive. While no identity was explicitly revealed in the report, it is worth mentioning that David Princay is the president of Binance’s French unit. Now, this report has been confirmed by Yi He, the co-founder and chief customer service officer at Binance, who shared on the social media platform X that the executive and his family are safe and actively cooperating with law enforcement. He said on X: We understand that three individuals connected to this matter have been arrested by authorities. The investigation remains ongoing, and we are continuing to cooperate fully. We would also like to sincerely thank the BRB (Brigade de Répression du Banditisme) for their swift and professional action in responding to this situation. Crypto Wrench Attacks Jump 75% In 2025: CertiK Wrench attacks refer to physical (often violent) attempts to force cryptocurrency investors to hand over their digital assets. According to blockchain security firm CertiK, this form of attack has seen a significant rise over the past year, seeing a 75% climb to reach 72 confirmed worldwide cases. In 2025, crypto-wrench attacks accounted for about $40.9 million in confirmed cases, with Europe bearing 40% of all the attacks. France led last year’s numbers, with 19 confirmed cases of wrench attacks in the country This wrench attack number seems certain to increase for France this year, as the breach of the Binance executive’s home happened only a few days after local police arrested six people over the abduction of a crypto entrepreneur’s partner and her mother in a crypto-linked ransom attack.
14 Feb 2026, 12:30
Sui Developers Gain New Seedless Wallet Tool via Human.tech Integration

Human.tech has integrated Wallet-as-a-Protocol (WaaP) onto the Sui blockchain, introducing a fully decentralized wallet execution layer that enables seedless, self-custodial wallets with familiar logins. Seamless Onboarding and Decentralized Infrastructure Privacy-first infrastructure provider Human.tech has announced the integration of Wallet-as-a-Protocol (WaaP) on the Sui blockchain. The rollout introduces a fully decentralized wallet execution layer on Sui,
14 Feb 2026, 12:15
Southeast Asian gangs pivot to crypto to move illegal funds and conceal profits

Southeast Asian gangs involved in human trafficking have now kicked up their money laundering activities, relying on cryptocurrencies to move illegal funds and conceal profits. The move signals a shift in how these groups operate across borders, with a new report showing that digital assets have become the most preferred channel. According to the report, these illicit funds are tied to forced labor, operations carried out in scam compounds , and other criminal activities. The trend shows how easy criminal networks adapt to technology while expanding their global reach. In a report released by Chainalysis, crypto transactions linked to suspected trafficking operations jumped by 85% to hit $260 million. The metric was released in its 2026 crypto crime report, which tracks illicit activities across public blockchains. Why are Southeast Asian gangs adopting crypto? In the report released by investigators, Southeast Asian gangs are now favoring crypto. Tom McLouth, an intelligence analyst at Chainalysis, explained that the adoption of digital assets by these gang networks is because using digital assets provides them with faster remittance. He noted that transactions are carried out within seconds, and funds are moved into exchanges that are abroad at the same time. He tied most of these transactions to forced labor in scam centers. In addition, some funds were also linked to international escort services and child sexual abuse material networks. The growth is in line with the expansion of scam compounds and digital gambling platforms across the region. Aside from using digital assets for its speed, it helps them reduce their dependence on traditional banking systems. Criminals tend to avoid the delays and regulatory oversight that come with using traditional cross-border transfer systems, and scaling their operations faster. Over the past few years, Southeast Asia has seen a rise in online scam hubs and digital casinos. These operations rely on trafficked workers who have been forced to leave their countries to seek greener pastures. These networks usually advertise several fake roles to entice workers and end up holding them against their will in these compounds. The workers help the masterminds behind the operation run their scams, where they target victims worldwide and take payments using crypto wallets. Investigators report scam growth tied to crypto In the report, investigators mentioned that the criminals have been able to grow their operations using crypto. As scam centers in Southeast Asia continue to rise, crypto transactions associated with them are also increasing. In addition, these trafficking groups use multiple wallets for transactions. However, blockchain technology creates a record of every transaction. Unlike cash exchanges, digital transactions leave a trail on the blockchain. In addition, investigators are now using blockchain analytics and traditional intelligence to investigate these transactions. As a result of this, authorities can disrupt networks faster than in previous years. While trafficking networks take advantage of the speed and global reach of crypto, transparency provides an edge to investigators. Cooperation between regulations and analytics firms has also been helping enforcement efforts. In a recent update released by Interpol last November, it announced that it has designated the criminal scam compounds built in the region as a transnational criminal threat. The resolution was approved at a General Assembly meeting in Marrakech, where authorities claimed that the scam compounds have targeted victims from more than 60 countries. They claimed that these criminals target victims using voice phishing, romance scams, investment fraud, and other forms of crypto scams. Get 8% CASHBACK when you spend crypto with COCA Visa card. Order your FREE card.
















































