News
6 Mar 2026, 15:06
Shiba Inu: Alert Issued As SHIB Participant Social Media Account Gets Hacked

Shiba Inu participant's social media account breach triggers alert for SHIB community.
6 Mar 2026, 08:10
US Nonfarm Payrolls Show Hiring Moderated in February, Easing Inflation Pressure

BitcoinWorld US Nonfarm Payrolls Show Hiring Moderated in February, Easing Inflation Pressure The latest US Nonfarm Payrolls report for February 2025 reveals a significant cooling in hiring momentum, providing crucial data for the Federal Reserve’s ongoing battle against inflation. This moderation in job growth signals a potential shift in the labor market’s trajectory after a period of exceptional strength. Consequently, financial markets and policymakers are scrutinizing every detail of this release. February Nonfarm Payrolls Report Analysis The US Bureau of Labor Statistics reported that total nonfarm payroll employment increased by a seasonally adjusted figure in February. This number fell notably below the robust gains witnessed throughout much of 2024. Furthermore, the unemployment rate held steady, indicating a labor market that remains tight but is no longer accelerating. Key sectors showed varied performance, with notable changes from previous months. Several factors contributed to this hiring moderation. First, the Federal Reserve’s series of interest rate hikes has gradually increased borrowing costs for businesses. Second, certain industries that experienced explosive post-pandemic growth are now reaching a more sustainable pace. Finally, broader economic uncertainty may be causing some employers to adopt a more cautious hiring stance. Historical Context and Labor Market Trends To understand February’s data, one must examine the preceding twelve months. The US labor market demonstrated remarkable resilience following earlier economic challenges. However, economists consistently warned that such rapid job creation was unsustainable in the long term. The February report appears to validate those predictions, marking a potential inflection point. A comparison of recent monthly payroll changes illustrates this trend clearly: Month Payroll Change (Approx.) Notable Sector Activity Q4 2024 Avg. High Broad-based gains January 2025 Moderate Services sector led February 2025 Moderated Growth concentrated This sequential cooling aligns with traditional economic models where monetary policy actions exhibit a lagged effect on employment. The data also reflects adjustments in workforce participation rates and evolving demographic trends. Expert Analysis and Market Implications Leading financial institutions and labor economists have weighed in on the report’s implications. Many analysts highlight that a gradual slowdown in hiring is a necessary condition for stabilizing price levels. They argue that an overheated labor market contributes significantly to wage-driven inflationary pressures. Therefore, this moderation could be viewed as a positive development for long-term economic stability. Market reactions were immediate and pronounced. Bond yields adjusted downward as investors recalibrated expectations for future Federal Reserve interest rate moves. Equity markets exhibited mixed responses, with sectors sensitive to economic growth showing volatility. The US dollar also experienced fluctuations against major currency pairs following the data release. The report’s details extend beyond the headline number. Average hourly earnings growth, a key metric for inflation watchers, showed a measured increase. Similarly, the average workweek remained stable, suggesting employers are not yet making significant cuts to existing staff hours. These secondary indicators provide a more nuanced picture of labor market health. Sector-by-Sector Breakdown of Employment Changes Job growth was not uniform across the economy in February. The report detailed significant variations by industry: Healthcare and Social Assistance: Continued to add jobs at a steady pace, driven by demographic demand. Professional and Business Services: Showed markedly slower growth compared to previous quarters. Leisure and Hospitality: Hiring plateaued as post-pandemic recovery momentum faded. Goods-Producing Sectors: Manufacturing and construction employment saw minimal net change. This sectoral analysis reveals where economic activity is concentrating and where it is softening. It also helps policymakers identify areas of potential vulnerability or strength within the broader economy. Conclusion The February US Nonfarm Payrolls report confirms a anticipated moderation in hiring, delivering critical information for economic planning. This development supports the Federal Reserve’s goal of achieving a soft landing by cooling the labor market without triggering a recession. While the headline number indicates slower growth, underlying data suggests the job market remains fundamentally healthy. Consequently, all stakeholders will monitor subsequent reports to determine if this moderation represents a new trend or a temporary pause. FAQs Q1: What are the US Nonfarm Payrolls? The Nonfarm Payrolls are a key economic indicator released monthly by the Bureau of Labor Statistics. They measure the total number of paid US workers in the business sector, excluding farm employees, private household employees, and non-profit organization employees. Q2: Why did hiring moderate in February? Several converging factors likely contributed, including the cumulative effect of higher interest rates, a natural cooling after a period of very strong growth, and increased economic uncertainty leading to more cautious business hiring plans. Q3: How does this report affect Federal Reserve policy? A moderation in hiring reduces wage-growth pressure, which is a component of inflation. This data supports arguments for the Fed to pause or slow the pace of future interest rate hikes, as its policy actions appear to be having the intended cooling effect on the economy. Q4: What is the difference between the payroll number and the unemployment rate? The payroll number measures the net change in jobs from the previous month. The unemployment rate, derived from a separate household survey, measures the percentage of the labor force that is jobless and actively seeking work. They can sometimes tell different short-term stories. Q5: Which sectors are most sensitive to changes in the Nonfarm Payrolls data? Financial markets, particularly bonds and currencies, react immediately. Sector-specific stock performance, especially in cyclical industries like consumer discretionary, industrials, and financials, is also highly sensitive to labor market trends indicated by this report. This post US Nonfarm Payrolls Show Hiring Moderated in February, Easing Inflation Pressure first appeared on BitcoinWorld .
6 Mar 2026, 05:30
October 10th and the Flight of the Chinese Tea Money

Crypto investors remember October 2025 for the historic liquidation event that shaved off billions in market cap, broke charts across exchanges, and left traders wrecked. Far fewer remember that October was also the month the U.S. government announced what it described as its largest Bitcoin seizure ever—coins tied to an alleged international crypto money-laundering network
6 Mar 2026, 04:00
OG Trader Sillytuna Says $24M Crypto Theft Came With Violent Threats

Sillytuna, one of Ethereum’s earliest NFT whales, has reported a $24 million crypto theft that allegedly combined an on‑chain address‑poisoning scam with offline violence and threats. The Crime’s Details In a post on the social network X on March 4 , the trader known as Sillytuna reported that he had been the victim of a $24 million-dollar crypto theft in AUSD/aEThUSDC from his wallet. Mr. Silly claims the authorities have been involved, not just because the immense amount of money that was subtracted, but also because the crime wasn’t just online, describing it as a violent robbery that left him physically unharmed but deeply shaken. shaken. Following the incident, Mr. Silly stated he is quitting the crypto space and expressed gratitude for still having his “limbs”. $24 million dollar theft of AUSD from 0x6fe0fab2164d8e0d03ad6a628e2af78624060322 Involved violence, weapons, kidnapp and rape threats. Obvs police involved. Please pass on to all those who trace such things. And now… definitely out of crypto. ****ers. Still have limbs,… — Sillytuna (@sillytuna) March 4, 2026 In a different post on March 5 , Mr. Silly offered a generous bounty for anyone who can recover some of the funds, even if they were involved in the original crime. Reminder: 10% bounty of any funds individuals or platforms can recover for me. Even if you were involved. — Sillytuna (@sillytuna) March 5, 2026 The Architecture Behind a Crypto Theft The most plausible scenario for cases like this one is a hybrid operation where online reconnaissance and social engineering set the stage long before any overt threat appears. Criminals can quietly map a target’s on‑chain footprint, social media presence and real‑world routines, then use low‑friction tricks like address poisoning to ensure that when a big move eventually happens, single copy‑paste mistake routes funds into their infrastructure. Once a victim realizes something is wrong, the operation can escalate to doxxing, extortion and even in‑person intimidation or kidnapping threats. A Chain Of Major Crypto Thefts The crime against Sillytuna is another example of recent catastrophic losses tied to violent situations in the crypto world. In December 2025, a single trader lost almost $50 million in USDT after copying a poisoned address from their own transaction history , then publicly offered a seven‑figure “peaceful resolution” bounty if the attacker returned most of the funds. Scam‑tracking firms also point to at least two more victims who lost roughly $62 million in just two months to similar address‑poisoning mistakes, while physical “wrench attacks” and kidnappings targeting crypto holders have surged worldwide. This sort of hacking attacks tend to be a multi‑layer campaign rather than a single hack. They are designed to exploit every weak point between a person’s wallet’s interface and their real‑world vulnerability. This situation leaves the crypto community sitting on the uncomfortable truth that you do not have to be “reckless” or technically incompetent to end up in a position like this. If even the greatest of them all can be felled by coordinated efforts, no one is safe. Cover image from ChatGPT, ETHUSD chart from Tradingview
5 Mar 2026, 21:10
Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation

BitcoinWorld Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation In a significant security incident shaking the decentralized finance (DeFi) sector, Solv Protocol has confirmed a devastating exploit resulting in a $2.7 million loss. The breach, first reported by The Block, directly impacted approximately 10 users of the protocol. Consequently, the Solv Protocol team has publicly committed to compensating affected users for the loss of 38.0474 SolvBTC. This event underscores the persistent and critical security challenges within the rapidly evolving blockchain ecosystem. Analyzing the Solv Protocol Exploit The Solv Protocol exploit represents a targeted attack on a specific financial mechanism within its system. Initial analyses suggest the vulnerability was not a broad network failure. Instead, it likely involved a flaw in the smart contract logic managing SolvBTC, the protocol’s yield-bearing Bitcoin representation. Furthermore, the relatively low number of affected users—around 10—indicates a sophisticated, possibly targeted, attack vector rather than a widespread drain. Security researchers often categorize such incidents. The table below outlines common DeFi exploit types for context: Exploit Type Typical Mechanism Prevention Focus Flash Loan Attack Manipulating asset prices via uncollateralized loans Oracle security, circuit breakers Reentrancy Attack Recursive function calls draining funds Checks-Effects-Interactions pattern Logic Error Flaw in contract business logic Extensive auditing, formal verification While the exact technical details of the Solv Protocol breach remain under investigation, the immediate financial impact is clear. The $2.7 million valuation of the stolen 38.0474 SolvBTC highlights the substantial sums now routinely managed by DeFi protocols. This incident follows a concerning trend of high-value exploits, emphasizing the industry’s ongoing battle with security. Immediate Response and User Compensation Solv Protocol’s response to the hack has been notably swift. The protocol’s announcement to fully compensate users for the lost SolvBTC is a critical step for maintaining trust. This commitment involves covering the loss from the protocol’s treasury or insurance funds. Such a move is increasingly becoming a standard, though not universal, practice among responsible DeFi projects following a security incident. The compensation plan focuses on making users whole for the specific asset loss. Key aspects of the response include: Transparent Communication: The protocol quickly acknowledged the incident publicly. Direct User Support: Affected users are being contacted through official channels. Security Freeze: Vulnerable contract sections were likely paused to prevent further loss. Investigation Launch: Internal and external audits of the exploit’s root cause have begun. This approach aims to stabilize the situation and protect the protocol’s long-term viability. However, the process of identifying all affected users and calculating precise compensation amounts can be complex. It often requires detailed blockchain forensic analysis to trace the exploit’s flow of funds accurately. Expert Perspective on DeFi Security Posture Security experts consistently point to several foundational practices for mitigating such risks. Firstly, rigorous smart contract auditing by multiple independent firms is non-negotiable. Secondly, implementing bug bounty programs can crowdsource security review from white-hat hackers. Thirdly, designing protocols with upgradeability and emergency pause functions allows for rapid response. Finally, utilizing decentralized oracle networks with robust data validation can prevent price manipulation attacks. The Solv Protocol incident will likely become another case study in the importance of these measures. Broader Impact on the DeFi and SolvBTC Ecosystem The ramifications of this $2.7 million exploit extend beyond the immediate financial loss. For the broader DeFi sector, each major hack renews scrutiny from regulators and potential users. It tests the narrative of DeFi as a secure alternative to traditional, custodial finance. Moreover, for SolvBTC specifically, the attack could temporarily undermine confidence in its mechanism as a secure wrapper for Bitcoin liquidity. Historically, protocols that handle compensation effectively can recover user trust. However, the recovery process depends heavily on several factors: The speed and transparency of the compensation distribution. The clarity and thoroughness of the post-mortem report. The implementation of concrete, verifiable security improvements. The overall market sentiment and volatility at the time. Market data often shows a short-term dip in a protocol’s native token value following an exploit. The long-term trajectory, however, is determined by the team’s response. A robust and honest recovery process can sometimes strengthen a protocol’s reputation for responsibility in the face of adversity. Conclusion The $2.7 million Solv Protocol exploit serves as a stark reminder of the security imperatives in decentralized finance. While the protocol’s pledge to compensate users for the 38.0474 SolvBTC loss is a positive step, it highlights a reactive rather than proactive security stance. The entire DeFi industry must continue to prioritize and invest in advanced security auditing, formal verification, and resilient protocol design. Ultimately, the response to this Solv Protocol breach will be closely watched as a benchmark for crisis management and user protection in the blockchain space. FAQs Q1: What is Solv Protocol and what does it do? Solv Protocol is a decentralized finance (DeFi) platform focused on creating and managing financial primitives. Its key product, SolvBTC, is a yield-bearing representation of Bitcoin designed to unlock Bitcoin liquidity across various blockchain ecosystems. Q2: How did the Solv Protocol exploit happen? The exact technical cause is under investigation. Typically, such exploits involve a vulnerability in a smart contract’s code, such as a logic error or an oversight in access controls, which an attacker then manipulates to drain funds. Q3: Who is affected by this security breach? The exploit directly impacted approximately 10 users who held the specific SolvBTC assets targeted by the attack. The protocol has stated it will compensate these users for their losses. Q4: What does ‘compensation for the loss of 38.0474 SolvBTC’ mean? It means Solv Protocol has committed to reimbursing the affected users with the equivalent value of the 38.0474 SolvBTC that was stolen. This will likely be funded from the protocol’s treasury or designated insurance reserves. Q5: What should users of other DeFi protocols do following this news? Users should practice general security hygiene: use hardware wallets, verify contract addresses, be cautious of unusually high yields, and only interact with protocols that have undergone extensive, public audits from reputable firms. Diversifying assets across protocols can also mitigate risk. This post Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation first appeared on BitcoinWorld .
5 Mar 2026, 10:25
iPhone Crypto Wallets Under Attack from State-Grade Malware

The era of assumed iPhone invincibility is over for mobile crypto traders. A sophisticated new threat, the ‘Coruna exploit kit’, is actively leveraging 23 disparate iOS vulnerabilities to bypass Apple’s top-notch security and drain crypto wallets. According to a new Google TAG report, the kit does not just crash apps or serve ads. It silently scans for BIP39 seed phrase theft, extracts QR codes, and siphons private keys from unpatched devices. The funds are gone before the user realizes the browser has been compromised. #Big #Breaking #Coruna Exploit Kit #Targeting iOS for Crypto Theft Confirmed & Analyzed pic.twitter.com/fOsWmLGxIK — Crypto Analyst (@shuklarewa9082) March 5, 2026 That matters. For years, advanced exploit chains were the exclusive domain of nation-state intelligence agencies. Coruna marks a terrifying regime change: state-grade surveillance tools have been repackaged for mass-market retail theft. This iPhone crypto wallet warning comes as Chainalysis reported in 2025 that the crypto theft market is valued at over $75Bn, with wallet drainers accounting for a large amount of that figure. ( SOURCE: CoinGecko ) How Coruna Exploits 23 iOS Vulnerabilities to Drain Crypto Wallets The Coruna exploit kit is a highly efficient “1-click” attack that activates when a user visits a compromised site, often posing as a gambling or news platform. It targets vulnerabilities in WebKit to breach the device, then uses local privilege escalation exploits to escape the browser’s sandbox. Analyzing iOS versions 13.0 to 17.2.1, Coruna employs multiple entry points to deliver a crypto wallets drainer designed to steal blockchain assets. It scans the file system for cryptocurrency-related strings, checks the photo library for QR codes, and extracts mnemonic phrases from the Notes app. This automated exploitation can result in immediate and irreversible theft of assets, and any iPhone user who uses their device for crypto trading and asset storing needs to stay vigilant. DISCOVER: Next Crypto to Explode in 2026 State-Grade Malware Goes Mass Market Previously, exploit chains of this complexity were hoarded by entities like NSO Group for targeted surveillance of high-value targets—dissidents, journalists, or diplomats. Coruna flips the script. It takes vulnerabilities weaponized in campaigns like Operation Triangulation , a suspected state-sponsored attack, and hands them to financially motivated criminal groups. The barrier to entry for executing a sophisticated MetaMask hack or draining a Trust Wallet has collapsed, and even the most inexperienced tech heads can now carry it out. This follows a disturbing pattern whereby tools developed for espionage inevitably leak into the broader cybercriminal ecosystem. The attackers behind Coruna are not looking for state secrets. They are looking for liquidity. This is industrial-scale theft. The iVerify security firm documented the exploit affecting at least 42,000 devices, with total losses not yet announced. BREAKING: New "Coruna" iOS Exploit Targets Crypto Wallets! Apple users, stop being exit liquidity! "Coruna" packs 23 exploits for 3 targets: 1) iOS 13-17.2.1 users 2) MetaMask/Uniswap degens 3) Phishing link clickers. Open a site, and it auto-scans for your seed phrases. pic.twitter.com/zE2ZBmdtuD — Vortex (@Vortex_Quant) March 5, 2026 Who Is Being Targeted and Why Mobile Crypto Traders Are Especially Exposed If you trade on mobile and hold self-custody wallets, you are the target profile. The attack vectors are often embedded in sites that crypto users frequent: unregulated gambling interfaces, dubious token claim pages, and third-party app stores. The malware explicitly targets data directories associated with major non-custodial wallets. It looks for the encrypted vaults of MetaMask, BitKeep (now Bitget Wallet), and Trust Wallet. If the encryption is weak, or if the user has stored the password in a compromised keychain or note, the wallet is drained. The risk is compounded by user behavior. Mobile traders frequently interact with DApps and sign transactions on the go, often prioritizing speed over security hygiene. Coruna exploits this complacency. It doesn’t need to trick you into signing a bad transaction; it simply steals the keys to the castle while you browse. For now, proceed with caution and consider moving your crypto funds to cold wallet storage, such as a Ledger or Trezor. EXPLORE: Best Crypto Presales to Buy in 2026 The post iPhone Crypto Wallets Under Attack from State-Grade Malware appeared first on Cryptonews .









































