News
10 Feb 2026, 17:30
Shiba Inu Price Prediction: SHIB Could Drop to $0.0000055 as Bearish Pattern Holds

Shiba Inu remains under pressure amid renewed selling in the broader crypto market. Analysts highlight the token’s vulnerability, noting that sellers control short-term price movements. Technical charts indicate SHIB continues to trade within a bearish structure, reinforcing downside risks. Shiba Inu Bearish Structure Persists Analyst HolderStat examined the 30-minute SHIB/USDT chart, noting that Shiba Inu remains within a descending trendline structure. The pattern, marked by lower highs and lower lows, confirms ongoing selling pressure. SHIB recently fell to approximately $0.0000055 before bouncing from the local low. However, the rebound lost momentum, failing to break above the descending resistance near $0.0000065. HolderStat observed that price consolidation continues below the main descending trendline, while a weak rising support line forms beneath the price. This creates a tightening compression zone, reflecting weakening bullish strength. The analyst stated that the sloping trendline remains dynamic resistance, reinforced by multiple prior rejection points. “If this level holds, SHIB is likely to resume its downward move,” HolderStat said, adding that the price could revisit the $0.0000055 area. Immediate Levels and Market Context HolderStat’s report comes amid a broader market pullback, with SHIB losing momentum after trading near $0.0000062. The token slipped to around $0.0000060, reinforcing a short-term bearish trend. At the time of writing, SHIB is trading at $0.000006016, down 1.59% over 24 hours and has declined 12% over the past week. Over the past month, the token fell 30.24%, bringing year-to-date losses to 13.2%. The analyst identified immediate resistance at $0.0000065, with higher barriers at $0.00000705 and $0.00000847. Nearest support lies at $0.00000562, forming a critical zone for potential stabilization. HolderStat emphasized that a decisive breakout and close above resistance would invalidate the bearish bias, signaling a possible short-term trend shift. Until then, sellers maintain structural control, keeping downside pressure favored.
10 Feb 2026, 16:26
Phantom Chat Feature Targeted in Fresh Bitcoin Phishing Wave: $BMIC Offers Security

What to Know: Phantom’s in-app Chats expand social attack surface; scammers exploit hype and speed to route users into phishing links and fake prompts. Bitcoin and Ethereum remain choppy, with mixed spot ETF flow signals, conditions that tend to increase user error and rushed approvals. Strong wallet hygiene still matters most: never share seed phrases, avoid chat links, and isolate funds using separate accounts or hardware wallets. BMIC leans into a post-quantum + AI security narrative, aiming to reduce key-exposure risk as social-engineering attacks evolve. Crypto’s biggest losses rarely start with a ‘hack.’ They start with a message. Phantom’s in-app Chats, designed to let traders talk directly from token, perps, and prediction market pages, have expanded the wallet’s social surface area at exactly the moment phishing crews are getting more clinical. Phantom itself warns that Chats are not a support channel and users should be cautious with links, scams, and ‘financial advice from strangers.’ That caution is well-placed: social engineering thrives wherever speed, hype, and clickable URLs overlap. And yes, attackers read the same docs users do, then exploit the gray areas. Recent scam reporting around the Phantom ecosystem has highlighted how lookalike popups and phishing pages attempt to trick users into entering seed phrases, sometimes by closely copying Phantom’s interface. Even without a single wallet exploit, an in-chat link can move a user from ‘conversation’ to ‘compromise’ in seconds. That’s fast. What most coverage misses is why chat-based delivery converts: it adds social proof. A link posted in a fast-moving token chat can feel like part of the product experience (almost like a built-in feature), lowering the friction that normally protects users from random DMs. Familiarity lowers guardrails. Volatile price action, crowded trade chats, and familiarity create perfect phishing conditions. The second-order effect is ugly, once a seed phrase is exposed or a malicious transaction is signed, losses settle faster than any customer support ticket. No pause button. This is where security narratives start to outperform meme narratives. And it’s also the bridge into BMIC ($BMIC): a presale-stage project pitching an AI-assisted, post-quantum security stack for wallets, staking, and payments, built for the uncomfortable reality that today’s attacks are human-first, and tomorrow’s risks may be cryptographic. BMIC Pitches Post-Quantum Wallet Security with AI Threat Detection BMIC (ERC-20 on Ethereum) is positioning itself as a ‘Quantum-Secure Wallet’ project with a full-stack approach: wallet + staking + payments, protected by post-quantum cryptography and paired with AI-enhanced threat detection. The narrative target is specific and timely: ‘harvest now, decrypt later.’ That’s the idea that adversaries can capture encrypted data today and crack it later when cryptographic capabilities improve. BMIC also claims Zero Public-Key Exposure and a ‘Quantum Meta-Cloud,’ while leaning on ERC-4337 smart accounts, an architectural choice that can support more programmable security policies than legacy EOAs. Ambitious? Yes. Reckless? Not if executed with audits and clear threat models. Why does this matter in the context of Phantom-style phishing? Because phishing scales on two levers: 1) Getting users to reveal secrets 2) Getting users to sign the wrong thing BMIC’s pitch is that modern wallet security has to assume both levers are being pulled constantly, and respond with layered defenses, cryptographic hardening, plus automated threat detection that can flag abnormal behavior patterns. CHECK OUT THE BMIC SECURITY STACK BMIC Presale Raising for Future Security $BMIC has raised over $445K, and tokens are currently priced at $0.049474. That’s a low entry price for something aimed at securing the future. It’s clear investors are looking for a high return by getting in early. The $BMIC token acts as the primary utility currency for the BMIC ecosystem, used to pay for quantum-resistant security services and access decentralized computing power through a ‘Burn-to-Compute’ mechanism. It further incentivizes the network by allowing holders to stake tokens for rewards while participating in governance decisions regarding the protocol’s development. The risk, of course, is execution. Post-quantum cryptography and AI security are powerful words, but buyers should watch for tangible deliverables: audited components, real user-facing threat telemetry, and clear explanations of how ‘zero public-key exposure’ is implemented in practice. Can it actually deliver? Still, the setup is intuitive: as wallets add social surfaces like chat, attackers get more entry points. Projects built around reducing key exposure and automating threat detection have a clean reason to exist. buy your $BMIC on the official presale page This article is not financial advice; crypto is volatile, presales are high-risk, and security claims should be independently verified.
9 Feb 2026, 22:36
How 2 Wallet Errors and Phishing Attacks Cost Crypto Users $62M

In January, a crypto user lost $12.25 million by copying the wrong wallet address. In December as well, another one ended up losing $50 million in a similar way. Together, the two incidents cost $62 million, according to the popular Web3 security solution, Scam Sniffer. Crypto Blunders Signature phishing attacks also surged in January. In fact, Scam Sniffer found that $6.27 million was stolen from 4,741 victims, which is a 207% increase from December. The largest cases involved $3.02 million from SLVon and XAUt via permit/increaseAllowance, and $1.08 million from aEthLBTC via permit. Two wallets alone accounted for 65% of all phishing losses. Address poisoning is a scam where attackers send small transactions from wallet addresses that closely resemble real ones, hoping users copy the wrong address from their transaction history. This can lead to funds being sent directly to scammers by mistake. Signature phishing further increases the risk by tricking users into signing malicious approvals that give attackers permission to move funds later. As such, these tactics rely on social engineering and human error, and may make even experienced users vulnerable. In November last year, a crypto holder lost over $3 million worth of PYTH tokens after mistakenly sending funds to a scammer’s wallet. The error occurred when the victim copied a fake deposit address from their transaction history. Blockchain analysts at Lookonchain said the attacker created a lookalike address matching the first four characters of the real wallet and sent a tiny SOL transaction to appear legitimate. The victim later transferred 7 million PYTH tokens without fully verifying the address and fell victim to an address poisoning attack. The transferred stash was worth about $3.08 million at that time. Coordinated Multisig Scam Attempt Amidst the growing frequency of such attacks, the non-custodial wallet, Safe, formerly known as Gnosis Safe, also issued a warning for its users about a large-scale address poisoning and social engineering campaign targeting multisig wallets. According to the platform, attackers created thousands of lookalike Safe addresses to trick users into sending funds to the wrong destination. It disclosed that the incident was not a protocol exploit, infrastructure breach, or smart contract vulnerability. Safe identified around 5,000 malicious addresses, which have now been flagged and removed from the Safe Wallet interface to reduce the risk of accidental fund transfers. The post How 2 Wallet Errors and Phishing Attacks Cost Crypto Users $62M appeared first on CryptoPotato .
9 Feb 2026, 19:24
Infini Exploit Wallet Reawakens to Scoop $13 Million in Ethereum

A blockchain wallet connected to Infini’s $50 million breach has begun moving funds again after almost a year of silence.
9 Feb 2026, 19:15
Rosen Law Firm is investigating potential securities claims on behalf of investors in Balancer (BAL)

The Rosen Law Firm, a US-based securities class action firm, has initiated an investigation into potential securities claims linked to the major exploit that rocked Balancer on November 3, 2925. Rosen has alleged that Balancer may have issued materially misleading business information to the public and its investors prior to the incident. Rosen encourages Balancer investors to reach out The law firm claims in a recent announcemen t that it is investigating potential securities claims on behalf of investors and has urged those who purchased Balancer cryptocurrency to reach out, as they may be entitled to compensation without payment of any out-of-pocket fees or costs through a contingency fee arrangement. This is in preparation for the class action Rosen is seeking to launch in hopes of recovering investor losses. Those who wish to join the prospective class action have been urged to reach out via its official channels for information on the class action. Rosen is confident in its ability to pursue justice and has clients throughout the globe, concentrating its practice in securities class actions and shareholder derivative litigation. The Law Firm claims it was ranked No. 1 by ISS Securities Class Action Services for the number of securities class action settlements in 2017 and has been ranked in the top 4 each year since 2013. What happened with the Balancer exploit? The Balancer exploit occurred on November 3, 2025, and according to Cryptopolitan reporting at the time, Balancer, a decentralized finance protocol, was hit in a major attack where the attackers made away with more than $100 million in digital assets, according to blockchain security firms. Security researchers at PeckShield and Cyvers also flagged the incident, warning that funds linked to the attacker’s wallet were still being siphoned. The attack was sophisticated and targeted a vulnerability in Balancer’s V2 smart contracts, specifically the arithmetic precision/running errors in pool invariant calculations, plus access control issues in the vault system. The protocol responded to the attack by pausing operations as parts of the exploit involved cross-chain elements. The breach allowed the attackers unauthorized manipulation of balances and drainage across chains in a short time. Some funds were reportedly recovered by whitehat actors, and Balancer outlined reimbursement plans for affected liquidity providers. That outline was made in late November, and the team pledged to distribute $8 million from the recovered assets to those affected. The plan would involve non-socialized distribution, meaning the funds go only to LPs in the specifically affected pools rather than broadly across the protocol. It also emphasized pro-rata based on Balance Pool Token holdings at pre-exploit snapshot blocks and in-kind reimbursement with whitehats who were entitled to 10% bounties for their help. While the proposal moved through community review and governance discussion stages, there has been no widespread confirmation of full payouts or distributions as of February 2026. If you're reading this, you’re already ahead. Stay there with our newsletter .
9 Feb 2026, 15:59
Infini Exploiter Hackers Resurface to Buy the $ETH Dip: How $BMIC Adds Security for the Future

Quick Facts: The Infini exploiter resurfaced to purchase approximately $13M in $ETH, highlighting persistent vulnerabilities in legacy blockchain security. BMIC introduces post-quantum cryptography and Zero Public-Key Exposure to prevent future ‘Harvest Now, Decrypt Later’ attacks. The BMIC presale has raised over $444K, signaling strong market demand for AI-enhanced, quantum-proof financial tools. The ghost of a past exploit has returned to the blockchain. On-chain data confirms that the wallet associated with the notorious Infini exploit has broken its silence, moving significant capital to accumulate Ethereum during the recent market dip. This isn’t just a simple buy order. It’s a strategic reallocation of illicit funds totaling approximately $13M , timed perfectly with $ETH’s local bottom. That re-emergence signals a troubling shift in crypto market structure: bad actors are becoming sophisticated asset managers. Instead of immediately laundering stolen funds through mixers, these entities are holding, staking, and trading to compound their gains. The market reaction has been mixed. While some traders view the whale-sized buy pressure as a bullish signal for $ETH, security analysts see it as a glaring reminder of the ecosystem’s fragility. Frankly, it’s a wake-up call. This event exposes a critical failure in current blockchain architecture. If a wallet can be compromised and the funds monitored but not frozen, the underlying security model isn’t ready for institutional adoption. The industry is effectively playing a game of whack-a-mole with legacy vulnerabilities. But a shift is happening. While hackers exploit the transparency of current chains, next-generation protocols are building immune systems against them. That’s where BMIC ($BMIC) comes in, a project deploying quantum-secure cryptography to render these types of wallet exploits mathematically impossible. Closing The Door On ‘Harvest Now, Decrypt Later’ The Infini incident highlights a specific vulnerability: the exposure of public keys and the persistence of compromised data. In the current EVM landscape, once a wallet interacts with a malicious contract, the user’s assets are often exposed forever. BMIC fundamentally alters this dynamic by introducing the first full Quantum-Secure Finance Stack. By utilizing post-quantum cryptography (PQC) and ERC-4337 Smart Accounts, BMIC ensures that even if a bad actor intercepts data today, they can’t decrypt it. Not now, and not when quantum computers eventually break standard encryption. Why does this matter? Because the threat vector is evolving. The ‘Harvest Now, Decrypt Later’ strategy means hackers are scraping encrypted data today to unlock it when computing power advances. BMIC counters this with a proprietary Zero Public-Key Exposure model. Unlike traditional wallets that broadcast keys, BMIC transactions remain shielded. It offers a level of sovereign protection that legacy wallets simply can’t match. Plus, the integration of AI-Enhanced Threat Detection adds a proactive layer to this defense. While the Infini hacker relied on the passive nature of the blockchain to execute their trades unnoticed until it was too late, BMIC’s infrastructure actively monitors for anomalies. This creates a secure environment for ecosystem fuel, governance, and staking, ensuring that users, not exploiters, retain control of their digital future. FIND OUT MORE ABOUT THE BMIC QUANTUM STACK Smart Money Rotation Into Quantum Infrastructure While the Infini hacker buys $ETH for short-term gains, forward-looking investors are positioning themselves in infrastructure plays that solve the security crisis permanently. The $BMIC presale has emerged as a focal point for this capital rotation, already raising over $444K from early adopters who recognize that the quantum transition is inevitable. At the current token price of $0.049474, the entry point offers a distinct asymmetry compared to buying established Layer-1s. The market is beginning to value ‘insurance’ protocols, tech that protects the trillions of dollars in TVL from catastrophic failure. BMIC ($BMIC) isn’t merely a wallet; it’s a ‘Burn-to-Compute’ utility token powering a Quantum Meta-Cloud. It bridges the gap between decentralized finance and high-performance computing, making it one of the best crypto presales . The utility here extends beyond simple storage. By enabling quantum-secure staking with no exposed keys, $BMIC solves the dilemma of earning yield without risking the principal. As regulatory scrutiny tightens on money laundering (highlighted by the Infini hacker’s movements), enterprises will be forced to migrate to compliant, secure environments. BMIC provides that sanctuary. The current presale phase represents a rare opportunity to acquire the standard for future digital security before the wider market reprices the risk of legacy chains. EXPLORE THE $BMIC PRESALE The content of this article does not constitute financial or investment advice. Cryptocurrencies are highly volatile assets, and presales carry significant risk. Always conduct your own due diligence before making any financial decisions.







































