News
26 Jan 2026, 09:10
20th Tezos Protocol Upgrade, Tallinn, Slashes Block Time to 6 Seconds, Cuts App Storage Costs by up to 100x

Paris, France, January 26th, 2026, Chainwire The Tezos protocol has been successfully upgraded, following an on-chain governance process with broad participation from bakers (validators) and community members. Developed by Nomadic Labs, Trilitech, and Functori, Tallinn is the 20th protocol upgrade, marking 20 evolutions of the Tezos blockchain, proposed, adopted, and seamlessly activated by the protocol itself. “Adapting to market demand 20 times over 7 years without network disruptions, and in a fully decentralized way, is undeniable proof of Tezos’ reliability and future-proof design,” said Yann Régis-Gianas, Head of Engineering at Nomadic Labs. ” The Tallinn upgrade shortens Tezos Layer-1 block time to 6 seconds, reducing latency and speeding up finality on the network’s censorship-resistant settlement layer. This pairs naturally with Etherlink, Tezos’ EVM-compatible Layer-2, which already confirms transactions in under 50 milliseconds, now backed by Layer-1 finality in two blocks, or 12 seconds. Tallinn also enables all bakers (network validators) to attest to every block, instead of a subset of bakers, which brings stronger security and more predictable staking rewards. This is achieved through the use of BLS cryptographic signatures, which aggregate hundreds of signatures into just one per block. By lightening the load on nodes, it also opens the door to further block time reductions. Finally, Tallinn introduces an ‘Address Indexing Registry’ that can improve storage efficiency by up to 100x for apps using the Michelson runtime. It is done by eliminating redundant address data, and apps adopting this feature will benefit from lower costs and higher potential throughput. “Based on inputs from Tezos builders, our development team is excited to be able to offer such drastic improvements for enterprise-scale apps, large NFT ledgers, and other setups storing many addresses,” said Yann Régis-Gianas, Head of Engineering at Nomadic Labs. Since launching in 2018, the Tezos blockchain has continued to evolve seamlessly through protocol upgrades, with each activation introducing a series of features designed to improve the overall experience of using and building on the network. Tallinn is another forkless step forward in making Tezos faster, more secure, and optimized for enterprise use, with no compromise on decentralization, and further proof of the network’s ability to quickly adapt to user needs and ensure longevity through continuous innovation and optimization. About Tezos Tezos is an open-source and energy-efficient blockchain designed to empower institutions, developers, and businesses and facilitate value transfer in a digital environment. It is designed for the scalable deployment of decentralized applications. As one of the first Proof of Stake blockchains, Tezos is globally supported and valued for its strong governance, long-term upgradability, and smart contract capabilities. For more information about Tezos, visit http://www.tezos.com . Contact Head of PR Eoin McGinley Trilitech [email protected]
26 Jan 2026, 08:10
Ethereum Address Inactive Since 2017 Moves 50,000 ETH

A long-inactive Ethereum whale has resurfaced after nearly a decade, moving a substantial amount of ETH. The renewed activity, uncovered through blockchain tracking, comes as cryptocurrency prices decline and liquidations accelerate. Visit Website
26 Jan 2026, 08:10
Matcha Meta Exploit: Devastating $16.8M DEX Aggregator Hack Exposes SwapNet Flaw

BitcoinWorld Matcha Meta Exploit: Devastating $16.8M DEX Aggregator Hack Exposes SwapNet Flaw In a significant blow to decentralized finance security, the prominent DEX aggregator Matcha Meta has suffered a major exploit resulting in the loss of $16.8 million. The incident, which occurred on March 21, 2025, underscores the persistent vulnerabilities within complex DeFi integrations. According to an initial report by The Block, the attacker leveraged a critical flaw in a SwapNet smart contract to drain pre-approved user funds. Consequently, this event has sent shockwaves through the cryptocurrency community, raising urgent questions about audit processes and the security of cross-chain asset bridges. Anatomy of the Matcha Meta Exploit The Matcha Meta exploit unfolded through a sophisticated attack vector targeting its integration with SwapNet. Initially, the attacker identified a vulnerability in a specific SwapNet smart contract. This flaw allowed unauthorized access to funds that users had pre-approved for trading operations. Subsequently, the hacker executed a series of rapid transactions to capitalize on this weakness. The attacker first swapped approximately $10.5 million in USDC for 3,655 ETH on the Base layer-2 network. Following this conversion, they immediately bridged the stolen Ethereum to the main Ethereum blockchain. This swift movement of assets across chains complicated initial tracking efforts. Forensic analysis by blockchain security firms suggests the exploit was a logical flaw rather than a simple coding error, allowing the bypass of standard authorization checks. Attack Vector: Smart contract vulnerability in SwapNet integration. Primary Action: Drainage of pre-approved user funds. Asset Movement: USDC to ETH swap on Base, followed by bridging to Ethereum mainnet. Total Loss: $16.8 million in digital assets. Context and Impact of the DEX Aggregator Hack The Matcha Meta breach represents one of the larger DeFi exploits of early 2025. DEX aggregators like Matcha Meta serve a crucial function by sourcing liquidity from multiple decentralized exchanges to offer users the best possible trading rates. However, their complex architecture, which involves interacting with numerous external protocols and smart contracts, inherently expands the attack surface . This incident follows a concerning trend of exploits targeting the connective tissue between DeFi protocols rather than the core protocols themselves. Immediate impacts were felt across the ecosystem. Firstly, user confidence in similar aggregator platforms temporarily wavered. Secondly, the native token of the affected platform experienced notable volatility. Furthermore, the exploit has triggered renewed calls from regulators and industry bodies for enhanced security standards, particularly for protocols handling cross-chain transactions. The event highlights a critical challenge: as DeFi composability increases, so does the potential for cascading failures through integrated smart contracts. Expert Analysis on Smart Contract Security Security experts emphasize that exploits of this nature often stem from integration risks . A protocol may be secure in isolation, but its connection to another protocol can introduce unforeseen vulnerabilities. According to common practices cited by auditing firms, the flaw likely involved an assumption about how the SwapNet contract would handle approval calls. The hacker manipulated this assumption to withdraw funds without proper user consent. The response timeline is also critical. Matcha Meta’s team, upon detecting anomalous outflows, reportedly initiated emergency procedures. These procedures included pausing certain contract functions and collaborating with blockchain analytics firms to trace the stolen funds. Historically, the success of fund recovery in such cases remains low, often depending on the hacker’s willingness to negotiate a bounty. This exploit serves as a stark reminder that comprehensive security audits must extend beyond a protocol’s own code to include all integrated third-party components and their interaction patterns. Broader Implications for DeFi Security The $16.8 million loss from the Matcha Meta platform carries significant implications for the entire decentralized finance sector. Primarily, it reinforces the need for continuous, proactive security measures rather than one-time audits. Protocols are now encouraged to implement real-time monitoring and anomaly detection systems that can flag suspicious transaction patterns as they occur. Additionally, the industry may see accelerated adoption of decentralized insurance products to mitigate user losses from such events. Moreover, the exploit places a spotlight on the security of cross-chain bridges. The attacker’s ability to quickly move 3,655 ETH from Base to Ethereum demonstrates both the utility and the risk of these bridging solutions. While they enable liquidity flow, they can also be used to obfuscate the trail of stolen funds. Consequently, future security frameworks will likely require stricter delay mechanisms or multi-signature controls for large bridge transactions originating from aggregators. Recent Major DEX & Aggregator Exploits (2024-2025) Platform Date Approx. Loss Attack Method Matcha Meta March 2025 $16.8M SwapNet Contract Vulnerability AggregatorX Nov 2024 $11.2M Price Oracle Manipulation SwapStream Aug 2024 $7.5M Flash Loan Attack Conclusion The devastating Matcha Meta exploit, resulting in a $16.8 million loss, is a pivotal event for DeFi security in 2025. It clearly illustrates how vulnerabilities in ancillary services like SwapNet can jeopardize even established platforms. The incident underscores the non-negotiable requirement for rigorous, holistic smart contract auditing that covers all integrated systems. Furthermore, it highlights the critical need for robust incident response plans and the potential value of decentralized insurance. As the DeFi ecosystem evolves, the industry’s collective response to breaches like the Matcha Meta hack will fundamentally shape its resilience, trustworthiness, and long-term adoption. FAQs Q1: What is a DEX aggregator like Matcha Meta? A DEX aggregator is a platform that scans multiple decentralized exchanges (DEXs) to find the best possible exchange rate and lowest fees for a user’s trade. Matcha Meta executes the trade across these liquidity sources in a single transaction. Q2: How did the hacker steal funds in the Matcha Meta exploit? The attacker exploited a vulnerability in a smart contract from SwapNet, a service integrated with Matcha Meta. This flaw allowed them to withdraw user funds that had been pre-approved for trading without proper authorization. Q3: Were user wallets directly compromised in this hack? No, individual user wallets were not directly breached. The exploit targeted funds that users had already approved the Matcha Meta platform to access for trading purposes, which were held within the protocol’s smart contracts. Q4: What has been done since the exploit was discovered? The Matcha Meta team likely initiated emergency measures, which can include pausing vulnerable contracts, launching an investigation with security firms, and tracing the stolen funds. They would also be communicating with users and relevant authorities. Q5: What does this mean for the future of DeFi security? This exploit emphasizes that security must extend beyond a single protocol’s code to include all integrated partners and bridges. It will likely accelerate the adoption of more sophisticated monitoring tools, insurance products, and stricter audit standards for cross-protocol interactions. This post Matcha Meta Exploit: Devastating $16.8M DEX Aggregator Hack Exposes SwapNet Flaw first appeared on BitcoinWorld .
26 Jan 2026, 07:38
ZachXBT Alleges Son of US Government Crypto Custodian CEO Behind Wallet Theft

Blockchain investigator ZachXBT has alleged that the person responsible for a multimillion-dollar theft of cryptocurrency from US government-controlled wallets is the son of the chief executive of a firm contracted to safeguard seized digital assets. Key Takeaways: ZachXBT alleges a multimillion-dollar crypto theft from US government wallets is linked to the son of a federal crypto custody contractor’s CEO. The funds were traced to wallets connected to assets seized in the 2016 Bitfinex hack. The claims remain unproven in court, and no charges have been filed as of publication. In a series of posts detailing his findings , ZachXBT claimed that an individual known online as “Lick,” whose real name he identified as John Daghita, siphoned tens of millions of dollars in crypto from wallets linked to the US government. He further alleged that Daghita is the son of Dean Daghita, president and chief executive of Command Services & Support (CMDSS), a company contracted by the US Marshals Service to handle certain seized cryptocurrencies. CMDSS Awarded US Marshals Contract to Handle Non-Mainstream Seized Crypto Public records show that CMDSS, based in Haymarket, Virginia, was awarded a contract in October 2024 to assist the Marshals Service with the custody and disposal of so-called “Class 2–4” digital assets. These include tokens that are not supported by major centralized exchanges and often require bespoke handling. The allegations have not been tested in court, and no criminal charges have been announced. CMDSS did not respond to requests for comment at the time of publication. ZachXBT’s claims expand on an investigation he published on Jan. 23, which linked the same online persona to more than $90 million in suspected illicit crypto activity. That probe traced funds back to a U.S. government wallet associated with assets seized from the 2016 Bitfinex hack. The investigation gained traction after a recorded dispute in a Telegram group chat between “Lick” and another individual. Update: The CMDSS company X account, website, & LinkedIn were all just deactivated pic.twitter.com/nvN6u5XMPq — ZachXBT (@zachxbt) January 25, 2026 The exchange, described as a “band-for-band” argument, involved both parties attempting to demonstrate control over large crypto balances. During the exchange, “Lick” screen-shared an Exodus wallet displaying a Tron address holding roughly $2.3 million, followed by a live transfer of about $6.7 million in ether. By the end of the session, approximately $23 million had been consolidated into a single wallet. By tracing transactions backward, ZachXBT linked that wallet to an address that received $24.9 million from a US government-controlled wallet in March 2024. The government address was tied to funds seized in the Bitfinex case. ZachXBT had previously flagged unusual activity in October 2024, when around $20 million was drained from similar government wallets. Most of those funds were returned within 24 hours , though roughly $700,000 routed through instant exchanges was not recovered. CMDSS Contract Faced Prior Scrutiny as GAO Rejected Protest CMDSS’s role as a government contractor has drawn scrutiny before. After losing the Marshals Service contract, Wave Digital Assets filed a protest with the Government Accountability Office, arguing that CMDSS lacked proper regulatory registrations and raising concerns over potential conflicts of interest involving a former Marshals Service official. The GAO ultimately denied the protest . Questions around crypto custody have also been raised more broadly. A February 2025 CoinDesk report said the Marshals Service struggled to account for its digital asset holdings, citing weak inventory controls and an inability to estimate its bitcoin reserves. As reported, illicit cryptocurrency addresses received a record $154 billion in 2025 , a sharp increase from the year before. The post ZachXBT Alleges Son of US Government Crypto Custodian CEO Behind Wallet Theft appeared first on Cryptonews .











































