News
20 Feb 2026, 03:05
Pound Sterling Vulnerable: GBP/USD Nears One-Month Low as Traders Anxiously Await US Data

BitcoinWorld Pound Sterling Vulnerable: GBP/USD Nears One-Month Low as Traders Anxiously Await US Data LONDON, April 2025 – The Pound Sterling (GBP) finds itself in a precarious position against the US Dollar (USD), trading perilously close to a one-month low as global forex markets enter a state of heightened anticipation. Consequently, traders and institutions are now squarely focused on a slate of upcoming US economic data releases, which hold the potential to dictate near-term directional momentum for the pivotal GBP/USD currency pair. This period of vulnerability underscores the complex interplay of transatlantic monetary policy and economic resilience. Pound Sterling Vulnerability: Analyzing the GBP/USD Downtrend The GBP/USD pair, a key benchmark for global forex health, has demonstrated notable weakness throughout recent trading sessions. Market analysis from major financial institutions, including Barclays and J.P. Morgan, points to a confluence of factors driving this trend. Primarily, a sustained shift in market sentiment has bolstered the US Dollar’s appeal as a safe-haven asset. Meanwhile, relative economic data from the United Kingdom has failed to provide the Pound with sufficient bullish momentum to counteract this dollar strength. Technical charts reveal critical support levels are now under threat. For instance, the pair recently breached the 50-day moving average, a key technical indicator watched by algorithmic and discretionary traders alike. Furthermore, trading volume data from the Chicago Mercantile Exchange (CME) shows increased activity in short-GBP futures contracts, signaling a build-up of bearish bets. This technical deterioration, therefore, aligns with the fundamental narrative of Sterling’s vulnerability. Key Level GBP/USD Value Significance One-Month Low ~1.2350 Critical psychological and technical support 50-Day Moving Average ~1.2450 Recently breached; now acts as resistance 2025 Year-to-Date High ~1.2850 High-water mark showing the extent of the retreat The US Data Catalyst: What Traders Are Watching All eyes are now fixed on the United States, where a series of high-impact economic reports are scheduled for release. These data points are crucial because they directly influence expectations for the Federal Reserve’s monetary policy path. Specifically, traders are scrutinizing indicators that measure inflation, labor market strength, and consumer spending. The market’s reaction to this data will likely determine whether the Pound Sterling’s vulnerability translates into a deeper correction or finds a stabilizing floor. Key upcoming releases include: Consumer Price Index (CPI): The primary gauge of inflation. A higher-than-expected print could reinforce expectations for a more hawkish Fed, boosting the USD. Non-Farm Payrolls (NFP): A critical measure of US job growth. Strong employment data supports economic resilience and potential for sustained higher interest rates. Retail Sales Data: Provides insight into consumer health and spending momentum, a major driver of the US economy. According to analysis from Bloomberg Economics, the market has currently priced in a certain trajectory for Federal Reserve rate cuts. However, any significant deviation from forecasts in these data sets can cause rapid repricing, leading to sharp volatility in the GBP/USD pair. This environment creates both risk and opportunity for currency traders. Expert Insight: Central Bank Policy Divergence The core narrative, as explained by senior analysts at Reuters and the Financial Times, revolves around central bank policy divergence. The Bank of England (BoE) faces a different set of economic challenges compared to the Federal Reserve. While both are monitoring inflation, the UK’s growth outlook and underlying price pressures have led markets to anticipate a potentially earlier or more aggressive easing cycle from the BoE. This perceived divergence—where the Fed might hold rates higher for longer—creates a fundamental headwind for the Pound Sterling against the Dollar. Historical data from the last decade shows that periods of clear Fed-BoE policy divergence have consistently led to sustained USD strength against GBP. Broader Market Context and Global Impacts The Pound Sterling’s movement does not occur in a vacuum. Its performance against the US Dollar has ripple effects across multiple asset classes and geographies. For UK importers, a weaker Pound increases the cost of dollar-denominated goods, potentially feeding into domestic inflation. Conversely, UK exporters may benefit from more competitive pricing in international markets. Moreover, the FTSE 100 index, which contains many multinational companies that earn revenue in USD, often sees a boost from a weaker GBP, as those foreign earnings are worth more when converted back to Sterling. Globally, the strength of the US Dollar, of which the GBP/USD pair is a component, affects emerging market debt, commodity prices (which are mostly dollar-priced), and capital flows. A persistently strong dollar, signaled partly by weakness in majors like the Pound, can tighten financial conditions worldwide. This interconnectedness highlights why the vulnerability of the Pound Sterling is a significant marker for broader global financial stability and investor risk appetite. Conclusion In summary, the Pound Sterling remains vulnerable near a one-month low against the US Dollar as the market enters a data-dependent holding pattern. The immediate fate of the GBP/USD pair hinges on incoming US economic indicators, which will refine expectations for Federal Reserve policy. This period of uncertainty underscores the enduring influence of transatlantic central bank dynamics on global forex markets. While technical levels suggest further downside risk, the upcoming data releases will provide the fundamental catalyst needed for the next significant move, determining whether the Pound Sterling stabilizes or extends its recent decline. FAQs Q1: Why is the Pound Sterling weak against the US Dollar? The primary drivers are a stronger US Dollar fueled by its safe-haven status and expectations of a more hawkish Federal Reserve relative to the Bank of England, a concept known as policy divergence. Q2: What US data is most important for the GBP/USD pair? The Consumer Price Index (CPI) for inflation and the Non-Farm Payrolls (NFP) for employment are the two highest-impact releases, as they directly shape Federal Reserve interest rate expectations. Q3: How does a weaker Pound affect the UK economy? It increases costs for importers and can contribute to inflation but makes UK exports cheaper and more competitive abroad, potentially boosting the FTSE 100. Q4: What is a key technical level to watch for GBP/USD? Traders are closely monitoring the one-month low near 1.2350. A sustained break below this level could signal a deeper correction toward the next major support zone. Q5: Could the Pound Sterling recover quickly? Yes, a recovery is possible if US economic data comes in significantly weaker than expected, prompting a dovish shift in Fed expectations, or if UK data surprises strongly to the upside, altering the BoE’s policy outlook. This post Pound Sterling Vulnerable: GBP/USD Nears One-Month Low as Traders Anxiously Await US Data first appeared on BitcoinWorld .
19 Feb 2026, 14:19
South Korean Prosecutors Regain Control of $21 Million in Stolen Bitcoin After Security Breach

Prosecutors in South Korea have reclaimed most of the Bitcoin stolen in a prior cyberattack. The breach exposed significant flaws in secure cryptocurrency storage procedures at public institutions. Continue Reading: South Korean Prosecutors Regain Control of $21 Million in Stolen Bitcoin After Security Breach The post South Korean Prosecutors Regain Control of $21 Million in Stolen Bitcoin After Security Breach appeared first on COINTURK NEWS .
19 Feb 2026, 11:29
Hackers turn to mixers and DeFi as speed of laundering stolen funds doubles

Hackers have modified their operations in 2025, laundering crypto much faster after an exploit. The recent Global Ledger report revealed the evolving techniques of hackers and the biggest threats in the crypto space. Hackers changed their targets and laundering techniques in 2025, as revealed by the latest Global Ledger report on exploits. The Global Ledger report is based on 255 reported incidents with a total of $4.4B in losses. The exact estimation of hacks is traced by different methods, as Cryptopolitan reported a lower total of $3.4B. However, a common picture has emerged, where hackers target Web3 features and discover ways to exploit the AI agent environment . The Swiss blockchain analytics company Global Ledger examined the details of multiple hacks, discovering the speed of moving and disguising funds. Hackers moved funds immediately after the exploits The fastest movement of funds took around two seconds, according to Global Ledger. Despite this, around 50% of the funds remain unspent after the hack or wait for months to be moved. In 42% of exploits, hackers resorted to Tornado Cash for laundering. Overall, hackers moved funds twice as fast in the second half of 2025. In 76% of cases, they succeeded in moving, splitting or partially laundering funds even before the exploit was intercepted and reported. The victims also began reacting faster, compressing their reaction time by more than half in H2. The new reactions on freezing funds where possible and cooperating with exchanges led to a slowdown of exploits in the second half of 2025. Despite the fast movement of funds, hackers still took 10.6 days on average to launder funds in H2, up from around eight days in the first half of the year. The bad actors fragmented their haul, taking it into smaller chunks through more intermediaries and over a slightly longer time span. The laundering techniques were well-known, but hackers used them more intensively in 2025. Which protocols were the most targeted by hackers? The past year saw a shift from using centralized exchanges for laundering to tapping the DeFi ecosystem. Over $732M was laundered through DeFi in the second half of 2025, up from $170M in the first half of the year. The volumes rose more than 4.3 times, making DeFi the second most-used laundering route after mixers. This also meant DeFi protocols were under siege, as they directly connect to a powerful laundering infrastructure. “ Ethereum remains the top target for attackers, accounting for $2.44 billion in losses (~60% of the global total) in 2025. If you are building on Ethereum with high liquidity, you are the default target for hackers. The data shows that while other chains like Solana or Bitcoin are growing in incident counts, the massive financial damage is still concentrated where the most liquidity lives,” Lex Fisun, CEO and co-founder of Global Ledger, told Cryptopolitan. To prevent some of the losses, Fisun believes manual tracking of funds is not efficient. The fix may lie in instant labeling of the source of funds and the automated tracing of transactions. “ To close the gap between a hack and response, DeFi protocols need real-time action. Here, implementing real-time on-chain monitoring that detects anomalies the moment they happen. Without internal detection and alerting, no ecosystem response can be fast enough,” commented Fisun. Bridges were also key infrastructure for hacks, which could be monitored. In 2025, bridges were more rarely attacked, but were widely used for chain-hopping to trade and disguise the origin of funds. | Source: Global Ledger In 2025, nearly half of stolen funds, or $2.01B was laundered or routed through bridges, over three times the amount that went through mixers. One of the reasons was to move funds to the Ethereum L1 chain, which is more liquid and accessible. Bridges still attract hackers for their liquidity, as well as for chain-hopping and disguising origins, added Fisun. If you're reading this, you’re already ahead. Stay there with our newsletter .
19 Feb 2026, 10:37
Uxlink Hacker Returns, Snaps Up $10.87M in Ethereum After Months of Silence

The Uxlink hacker returned after three months, purchasing a total of 5,493.26 ETH. The hacker may be utilizing the buy-the-dip opportunity amid the ETH price crash. In 2025, the hacker exploited the Uxlink protocol’s vulnerability, resulting in the loss of millions of funds. After months of silence, the infamous Uxlink hacker has resurfaced, making headlines with a fresh move. The hacker has been reportedly purchasing Ethereum using DAI, signaling a return to active trading after a three-month break. The Uxlink hacker previously exploited the vulnerabilities in the protocol, leading to a multi-million-dollar breach. Since the hack, the attacker has executed a series of high-value transactions while largely avoiding detection. This makes the latest movement a closely watched event in the crypto industry. Uxlink Hacker Back in Action with ETH Move According to the findings of an X account called “@ai_9684xtpa,” the notorious Uxlink hacker has returned with a massive Ethereum transaction. The hacker has started buying Ethereum again, this time using DAI. The analyst stated that four addresses linked to the hacker purchased a total of 5,493.26 ETH, worth about $10.87 million. These tokens were bought at an average price of$1,979 per Ether. While these ETH tokens were purchased using DAI, which were acquired by the hacker by swapping the stolen funds. Still, after multiple batches of Ether purchases, the Uxlink hacker holds about 21.42 DAI. How the Uxlink Hack Happened? The Uxlink hack, which took place on September 22, 2025, resulted in a financial loss of $11 million. The attack was reportedly carried out by an unknown hacker via a carefully planned external attack. The hacker used advanced social engineering methods to access the system while maintaining system security. The attacker also used deepfake videos to impersonate a business partner and established trust with the team member. This gave them access to the team member’s Telegram account and personal device. With this access, the hacker quickly took control of a smart contract and minted billions of fake UNLINK tokens. In addition to unauthorized UXLINK minting, the attacker transferred about $4 million in USDT, $500,000 in USDC, 3.7 WBTC, and 25 ETH. To cover their tracks and cash out, the hacker moved the stolen funds across at least six different wallets, converting most of them into Ethereum. In total, they made off with about 6,732 ETH, worth $28.1 million at the price then. They also swapped tokens to DAI and used the Arbitrum network to move the funds back to Ethereum. What the Latest ETH Purchase Suggests? The latest Ethereum purchase by the Uxlink hacker suggests that they are actively managing and possibly expanding their holdings. Buying a large number of ETH after three months of inactivity shows a deliberate strategy rather than a random move. Analysts see this as a sign that the hacker is carefully consolidating stolen or accumulated assets, potentially preparing for future transactions. The transaction is particularly noteworthy because of its timing. The hacker has purchased Ether amid the ongoing ETH downtrend. The altcoin is currently trading in the red zone, sparking widespread caution about its future. However, expert traders see this as a buy-the-dip opportunity. Considering this approach, analysts believe that the Uxlink hacker might also have accumulated the tokens utilizing the bearish price trend.
19 Feb 2026, 09:45
UXLINK Hackers Stunning $10.8 Million ETH Purchase Signals Potential Market Disruption

BitcoinWorld UXLINK Hackers Stunning $10.8 Million ETH Purchase Signals Potential Market Disruption In a dramatic on-chain development that has captured the cryptocurrency community’s attention, an address linked to the historic UXLINK exploit executed a massive $10.8 million Ethereum purchase on March 15, 2025, ending three months of complete dormancy. This substantial transaction, first identified by prominent on-chain analyst ai_9684xtpa, involved the acquisition of 5,493.26 ETH and suggests the hacker may be preparing for further significant market moves, given their remaining 21.42 million DAI stablecoin holdings. The event immediately triggered widespread analysis across trading desks and security firms, highlighting the persistent interplay between blockchain exploits and market dynamics. UXLINK Hackers Major ETH Purchase Analysis Blockchain analytics firm Arkham Intelligence subsequently verified the transaction details, confirming the movement from a decentralized exchange aggregator. The purchase occurred in a single block, indicating a deliberate, large-scale acquisition rather than gradual accumulation. Consequently, market observers immediately began scrutinizing the timing and potential impact. Furthermore, the hacker’s wallet history shows a clear pattern of asset consolidation following the original exploit. Notably, the UXLINK incident itself was a sophisticated smart contract exploit that occurred in late 2024. It resulted in the loss of approximately $45 million in various assets at the time. The protocol, a cross-chain interoperability solution, suffered a critical vulnerability in its bridge mechanism. Security firm CertiK published a detailed post-mortem, attributing the flaw to a logic error in the contract’s verification process. Transaction Volume: 5,493.26 ETH purchased in one hour. Total Value: $10.87 million at time of purchase. Remaining Funds: 21.42 million DAI in the same address. Source of Funds: DAI acquired from the original hack proceeds. This activity represents the first major movement from the address since December 2024. On-chain data reveals the funds initially moved through multiple privacy mixers before being converted to stablecoins. The recent decision to convert a portion back into a volatile asset like Ethereum is therefore a significant strategic shift. Market analysts are now closely monitoring for any subsequent sell pressure or further large purchases. On-Chain Patterns and Historical Context of Exploiters Historically, hackers and exploiters follow distinct capital management patterns. Some immediately cash out through illicit channels, while others attempt to leverage their holdings for further gain. The UXLINK hacker’s current strategy appears to align with the latter group. For instance, the infamous Poly Network exploiter eventually returned most funds after negotiations. Conversely, the Euler Finance attacker engaged in complex on-chain negotiations before returning assets. The three-month dormancy period is itself a notable tactical detail. It suggests either a deliberate cooling-off period to avoid scrutiny or time spent planning the next move. Chainalysis reports indicate that exploiters often wait for public attention to fade before liquidating large positions. The sudden re-emergence with a clear market order, rather than an over-the-counter (OTC) deal, is therefore particularly bold. Recent Major Exploiter Asset Movements (2024-2025) Protocol Exploit Date Initial Loss Hacker’s Notable Subsequent Move Time Until Move UXLINK Nov 2024 $45M $10.8M ETH Purchase ~4 months Orion Protocol Feb 2023 $3M Funds Sent to Tornado Cash 2 weeks Cream Finance Oct 2021 $130M Partial Return via Governance 6 months Moreover, the choice of Ethereum is analytically significant. Converting stablecoins into ETH could indicate a bullish stance on the asset’s price or a need for the gas token to facilitate further transactions across various networks. The sheer size of the purchase, however, would inevitably move the market if sold quickly on open venues. This creates a delicate situation for other market participants. Expert Insights from Security Analysts ai_9684xtpa, the analyst who first flagged the transaction, provided additional context in a follow-up post. “The wallet’s behavior shows planning,” they noted. “Holding 21 million DAI provides immense optionality. They could be waiting for a specific market condition or preparing to provide liquidity somewhere.” The analyst emphasized that the address is now being tracked by dozens of blockchain surveillance tools. Maria Lopez, Head of Research at CryptoForensics, offered a institutional perspective. “This isn’t just a trade; it’s a signal. Large, identifiable exploiters moving funds influences market psychology. Other traders see this and may adjust their strategies, fearing a potential dump or anticipating the hacker’s next move.” She pointed to similar past events where whale movements created short-term volatility. Furthermore, the technical execution of the trade avoided common pitfalls. The purchase was split across several decentralized exchanges to minimize slippage, indicating a degree of trading sophistication. This contrasts with the panicked, rapid sells often seen after exploits. It implies the actor is comfortable operating in the current regulatory and surveillance environment, or believes they can avoid consequences. Potential Market Impact and Security Implications The immediate market reaction was a slight increase in ETH volatility, as tracked by derivatives data from Deribit. While the $10.8 million purchase is large, it represents a fraction of Ethereum’s daily volume. The greater concern lies in the remaining $21.42 million DAI war chest. A subsequent purchase of similar size could have a more pronounced effect, especially if timed during periods of low liquidity. Security implications extend beyond market impact. The ability for a known exploiter to retain and actively manage tens of millions in stolen funds for months raises questions about asset recovery and enforcement. International efforts, such as those coordinated by the DOJ’s National Cryptocurrency Enforcement Team, have had mixed success in seizing such assets. The transparency of the blockchain, however, ensures constant surveillance. Market Risk: Potential for sudden sell pressure if the hacker liquidates. Surveillance Value: Provides a live case study in exploiter behavior. Regulatory Focus: Highlights challenges in cross-jurisdictional asset seizure. Protocol Security: Reinforces the need for rigorous audits and insurance. For the broader DeFi ecosystem, incidents like this underscore the importance of robust security practices and protocol-owned insurance funds. The UXLINK team has since relaunched with enhanced security audits and a bug bounty program. However, the movement of these stolen funds remains a visible scar and a reminder of the sector’s persistent vulnerabilities. Conclusion The UXLINK hacker’s $10.8 million Ethereum purchase is a significant on-chain event with layered implications. It demonstrates how exploiters can evolve into strategic market participants, using stolen capital to execute large trades. The transaction provides valuable, real-time data for security analysts and market strategists alike. While the immediate market disruption was contained, the hacker’s substantial remaining DAI holdings present a clear future risk. Ultimately, this incident reinforces the critical need for continuous blockchain surveillance, advanced security protocols, and international cooperation to mitigate the long-term impact of such exploits on the cryptocurrency landscape. FAQs Q1: What was the UXLINK hack? The UXLINK hack was a smart contract exploit in late 2024 that resulted in the loss of approximately $45 million from the cross-chain interoperability protocol due to a vulnerability in its bridge mechanism. Q2: Why did the hacker buy ETH after three months? Analysts suggest several possibilities: a strategic move to bet on ETH’s price appreciation, a need for Ethereum to pay gas fees for future transactions, or an attempt to diversify stolen stablecoins into a major cryptocurrency ahead of potential market movements. Q3: Can the stolen funds be recovered or frozen? While blockchain addresses are identifiable, freezing or recovering funds is legally and technically complex, requiring cross-jurisdictional law enforcement action. Centralized exchanges can freeze deposits from blacklisted addresses, but decentralized assets are harder to seize. Q4: What does holding 21 million DAI allow the hacker to do? It provides significant financial optionality. The hacker could make another large purchase, provide liquidity in a DeFi protocol for yield, attempt to manipulate a smaller market, or continue holding the stablecoin with minimal price risk. Q5: How do analysts track these kinds of transactions? They use blockchain explorers and specialized analytics platforms (like Arkham, Nansen, Chainalysis) that tag addresses associated with known exploits. These tools track fund flows, exchange interactions, and can often cluster addresses to identify the entity behind them. This post UXLINK Hackers Stunning $10.8 Million ETH Purchase Signals Potential Market Disruption first appeared on BitcoinWorld .
19 Feb 2026, 08:30
OpenAI and Paradigm Launch EVMbench to Measure AI Smart Contract Security

OpenAI and Paradigm have introduced EVMbench, a new benchmarking framework designed to evaluate the ability of AI agents to detect, patch, and exploit blockchain vulnerabilities. OpenAI and Paradigm officially launched EVMbench to address security risks in smart contracts that secure over $100 billion in crypto assets. The benchmark utilizes 120 curated vulnerabilities from 40 professional





































