News
6 Mar 2026, 05:30
October 10th and the Flight of the Chinese Tea Money

Crypto investors remember October 2025 for the historic liquidation event that shaved off billions in market cap, broke charts across exchanges, and left traders wrecked. Far fewer remember that October was also the month the U.S. government announced what it described as its largest Bitcoin seizure ever—coins tied to an alleged international crypto money-laundering network
6 Mar 2026, 04:00
OG Trader Sillytuna Says $24M Crypto Theft Came With Violent Threats

Sillytuna, one of Ethereum’s earliest NFT whales, has reported a $24 million crypto theft that allegedly combined an on‑chain address‑poisoning scam with offline violence and threats. The Crime’s Details In a post on the social network X on March 4 , the trader known as Sillytuna reported that he had been the victim of a $24 million-dollar crypto theft in AUSD/aEThUSDC from his wallet. Mr. Silly claims the authorities have been involved, not just because the immense amount of money that was subtracted, but also because the crime wasn’t just online, describing it as a violent robbery that left him physically unharmed but deeply shaken. shaken. Following the incident, Mr. Silly stated he is quitting the crypto space and expressed gratitude for still having his “limbs”. $24 million dollar theft of AUSD from 0x6fe0fab2164d8e0d03ad6a628e2af78624060322 Involved violence, weapons, kidnapp and rape threats. Obvs police involved. Please pass on to all those who trace such things. And now… definitely out of crypto. ****ers. Still have limbs,… — Sillytuna (@sillytuna) March 4, 2026 In a different post on March 5 , Mr. Silly offered a generous bounty for anyone who can recover some of the funds, even if they were involved in the original crime. Reminder: 10% bounty of any funds individuals or platforms can recover for me. Even if you were involved. — Sillytuna (@sillytuna) March 5, 2026 The Architecture Behind a Crypto Theft The most plausible scenario for cases like this one is a hybrid operation where online reconnaissance and social engineering set the stage long before any overt threat appears. Criminals can quietly map a target’s on‑chain footprint, social media presence and real‑world routines, then use low‑friction tricks like address poisoning to ensure that when a big move eventually happens, single copy‑paste mistake routes funds into their infrastructure. Once a victim realizes something is wrong, the operation can escalate to doxxing, extortion and even in‑person intimidation or kidnapping threats. A Chain Of Major Crypto Thefts The crime against Sillytuna is another example of recent catastrophic losses tied to violent situations in the crypto world. In December 2025, a single trader lost almost $50 million in USDT after copying a poisoned address from their own transaction history , then publicly offered a seven‑figure “peaceful resolution” bounty if the attacker returned most of the funds. Scam‑tracking firms also point to at least two more victims who lost roughly $62 million in just two months to similar address‑poisoning mistakes, while physical “wrench attacks” and kidnappings targeting crypto holders have surged worldwide. This sort of hacking attacks tend to be a multi‑layer campaign rather than a single hack. They are designed to exploit every weak point between a person’s wallet’s interface and their real‑world vulnerability. This situation leaves the crypto community sitting on the uncomfortable truth that you do not have to be “reckless” or technically incompetent to end up in a position like this. If even the greatest of them all can be felled by coordinated efforts, no one is safe. Cover image from ChatGPT, ETHUSD chart from Tradingview
5 Mar 2026, 21:10
Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation

BitcoinWorld Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation In a significant security incident shaking the decentralized finance (DeFi) sector, Solv Protocol has confirmed a devastating exploit resulting in a $2.7 million loss. The breach, first reported by The Block, directly impacted approximately 10 users of the protocol. Consequently, the Solv Protocol team has publicly committed to compensating affected users for the loss of 38.0474 SolvBTC. This event underscores the persistent and critical security challenges within the rapidly evolving blockchain ecosystem. Analyzing the Solv Protocol Exploit The Solv Protocol exploit represents a targeted attack on a specific financial mechanism within its system. Initial analyses suggest the vulnerability was not a broad network failure. Instead, it likely involved a flaw in the smart contract logic managing SolvBTC, the protocol’s yield-bearing Bitcoin representation. Furthermore, the relatively low number of affected users—around 10—indicates a sophisticated, possibly targeted, attack vector rather than a widespread drain. Security researchers often categorize such incidents. The table below outlines common DeFi exploit types for context: Exploit Type Typical Mechanism Prevention Focus Flash Loan Attack Manipulating asset prices via uncollateralized loans Oracle security, circuit breakers Reentrancy Attack Recursive function calls draining funds Checks-Effects-Interactions pattern Logic Error Flaw in contract business logic Extensive auditing, formal verification While the exact technical details of the Solv Protocol breach remain under investigation, the immediate financial impact is clear. The $2.7 million valuation of the stolen 38.0474 SolvBTC highlights the substantial sums now routinely managed by DeFi protocols. This incident follows a concerning trend of high-value exploits, emphasizing the industry’s ongoing battle with security. Immediate Response and User Compensation Solv Protocol’s response to the hack has been notably swift. The protocol’s announcement to fully compensate users for the lost SolvBTC is a critical step for maintaining trust. This commitment involves covering the loss from the protocol’s treasury or insurance funds. Such a move is increasingly becoming a standard, though not universal, practice among responsible DeFi projects following a security incident. The compensation plan focuses on making users whole for the specific asset loss. Key aspects of the response include: Transparent Communication: The protocol quickly acknowledged the incident publicly. Direct User Support: Affected users are being contacted through official channels. Security Freeze: Vulnerable contract sections were likely paused to prevent further loss. Investigation Launch: Internal and external audits of the exploit’s root cause have begun. This approach aims to stabilize the situation and protect the protocol’s long-term viability. However, the process of identifying all affected users and calculating precise compensation amounts can be complex. It often requires detailed blockchain forensic analysis to trace the exploit’s flow of funds accurately. Expert Perspective on DeFi Security Posture Security experts consistently point to several foundational practices for mitigating such risks. Firstly, rigorous smart contract auditing by multiple independent firms is non-negotiable. Secondly, implementing bug bounty programs can crowdsource security review from white-hat hackers. Thirdly, designing protocols with upgradeability and emergency pause functions allows for rapid response. Finally, utilizing decentralized oracle networks with robust data validation can prevent price manipulation attacks. The Solv Protocol incident will likely become another case study in the importance of these measures. Broader Impact on the DeFi and SolvBTC Ecosystem The ramifications of this $2.7 million exploit extend beyond the immediate financial loss. For the broader DeFi sector, each major hack renews scrutiny from regulators and potential users. It tests the narrative of DeFi as a secure alternative to traditional, custodial finance. Moreover, for SolvBTC specifically, the attack could temporarily undermine confidence in its mechanism as a secure wrapper for Bitcoin liquidity. Historically, protocols that handle compensation effectively can recover user trust. However, the recovery process depends heavily on several factors: The speed and transparency of the compensation distribution. The clarity and thoroughness of the post-mortem report. The implementation of concrete, verifiable security improvements. The overall market sentiment and volatility at the time. Market data often shows a short-term dip in a protocol’s native token value following an exploit. The long-term trajectory, however, is determined by the team’s response. A robust and honest recovery process can sometimes strengthen a protocol’s reputation for responsibility in the face of adversity. Conclusion The $2.7 million Solv Protocol exploit serves as a stark reminder of the security imperatives in decentralized finance. While the protocol’s pledge to compensate users for the 38.0474 SolvBTC loss is a positive step, it highlights a reactive rather than proactive security stance. The entire DeFi industry must continue to prioritize and invest in advanced security auditing, formal verification, and resilient protocol design. Ultimately, the response to this Solv Protocol breach will be closely watched as a benchmark for crisis management and user protection in the blockchain space. FAQs Q1: What is Solv Protocol and what does it do? Solv Protocol is a decentralized finance (DeFi) platform focused on creating and managing financial primitives. Its key product, SolvBTC, is a yield-bearing representation of Bitcoin designed to unlock Bitcoin liquidity across various blockchain ecosystems. Q2: How did the Solv Protocol exploit happen? The exact technical cause is under investigation. Typically, such exploits involve a vulnerability in a smart contract’s code, such as a logic error or an oversight in access controls, which an attacker then manipulates to drain funds. Q3: Who is affected by this security breach? The exploit directly impacted approximately 10 users who held the specific SolvBTC assets targeted by the attack. The protocol has stated it will compensate these users for their losses. Q4: What does ‘compensation for the loss of 38.0474 SolvBTC’ mean? It means Solv Protocol has committed to reimbursing the affected users with the equivalent value of the 38.0474 SolvBTC that was stolen. This will likely be funded from the protocol’s treasury or designated insurance reserves. Q5: What should users of other DeFi protocols do following this news? Users should practice general security hygiene: use hardware wallets, verify contract addresses, be cautious of unusually high yields, and only interact with protocols that have undergone extensive, public audits from reputable firms. Diversifying assets across protocols can also mitigate risk. This post Solv Protocol Exploit: Devastating $2.7M Breach Targets SolvBTC, Protocol Vows Compensation first appeared on BitcoinWorld .
5 Mar 2026, 10:25
iPhone Crypto Wallets Under Attack from State-Grade Malware

The era of assumed iPhone invincibility is over for mobile crypto traders. A sophisticated new threat, the ‘Coruna exploit kit’, is actively leveraging 23 disparate iOS vulnerabilities to bypass Apple’s top-notch security and drain crypto wallets. According to a new Google TAG report, the kit does not just crash apps or serve ads. It silently scans for BIP39 seed phrase theft, extracts QR codes, and siphons private keys from unpatched devices. The funds are gone before the user realizes the browser has been compromised. #Big #Breaking #Coruna Exploit Kit #Targeting iOS for Crypto Theft Confirmed & Analyzed pic.twitter.com/fOsWmLGxIK — Crypto Analyst (@shuklarewa9082) March 5, 2026 That matters. For years, advanced exploit chains were the exclusive domain of nation-state intelligence agencies. Coruna marks a terrifying regime change: state-grade surveillance tools have been repackaged for mass-market retail theft. This iPhone crypto wallet warning comes as Chainalysis reported in 2025 that the crypto theft market is valued at over $75Bn, with wallet drainers accounting for a large amount of that figure. ( SOURCE: CoinGecko ) How Coruna Exploits 23 iOS Vulnerabilities to Drain Crypto Wallets The Coruna exploit kit is a highly efficient “1-click” attack that activates when a user visits a compromised site, often posing as a gambling or news platform. It targets vulnerabilities in WebKit to breach the device, then uses local privilege escalation exploits to escape the browser’s sandbox. Analyzing iOS versions 13.0 to 17.2.1, Coruna employs multiple entry points to deliver a crypto wallets drainer designed to steal blockchain assets. It scans the file system for cryptocurrency-related strings, checks the photo library for QR codes, and extracts mnemonic phrases from the Notes app. This automated exploitation can result in immediate and irreversible theft of assets, and any iPhone user who uses their device for crypto trading and asset storing needs to stay vigilant. DISCOVER: Next Crypto to Explode in 2026 State-Grade Malware Goes Mass Market Previously, exploit chains of this complexity were hoarded by entities like NSO Group for targeted surveillance of high-value targets—dissidents, journalists, or diplomats. Coruna flips the script. It takes vulnerabilities weaponized in campaigns like Operation Triangulation , a suspected state-sponsored attack, and hands them to financially motivated criminal groups. The barrier to entry for executing a sophisticated MetaMask hack or draining a Trust Wallet has collapsed, and even the most inexperienced tech heads can now carry it out. This follows a disturbing pattern whereby tools developed for espionage inevitably leak into the broader cybercriminal ecosystem. The attackers behind Coruna are not looking for state secrets. They are looking for liquidity. This is industrial-scale theft. The iVerify security firm documented the exploit affecting at least 42,000 devices, with total losses not yet announced. BREAKING: New "Coruna" iOS Exploit Targets Crypto Wallets! Apple users, stop being exit liquidity! "Coruna" packs 23 exploits for 3 targets: 1) iOS 13-17.2.1 users 2) MetaMask/Uniswap degens 3) Phishing link clickers. Open a site, and it auto-scans for your seed phrases. pic.twitter.com/zE2ZBmdtuD — Vortex (@Vortex_Quant) March 5, 2026 Who Is Being Targeted and Why Mobile Crypto Traders Are Especially Exposed If you trade on mobile and hold self-custody wallets, you are the target profile. The attack vectors are often embedded in sites that crypto users frequent: unregulated gambling interfaces, dubious token claim pages, and third-party app stores. The malware explicitly targets data directories associated with major non-custodial wallets. It looks for the encrypted vaults of MetaMask, BitKeep (now Bitget Wallet), and Trust Wallet. If the encryption is weak, or if the user has stored the password in a compromised keychain or note, the wallet is drained. The risk is compounded by user behavior. Mobile traders frequently interact with DApps and sign transactions on the go, often prioritizing speed over security hygiene. Coruna exploits this complacency. It doesn’t need to trick you into signing a bad transaction; it simply steals the keys to the castle while you browse. For now, proceed with caution and consider moving your crypto funds to cold wallet storage, such as a Ledger or Trezor. EXPLORE: Best Crypto Presales to Buy in 2026 The post iPhone Crypto Wallets Under Attack from State-Grade Malware appeared first on Cryptonews .
5 Mar 2026, 08:11
New Critical iPhone Exploit, Morgan Stanley Taps Coinbase, a16z to Raise $2 Billion: The Last 24 Hours in Crypto

A lot happened in the world of cryptocurrencies over the last 24 hours. We have handpicked a few of the more important titles you may have missed, so let’s have a quick look. Google Warns of New iPhone Exploit Targeting Crypto Users Google researchers have flagged a relatively powerful exploit kit that they call “Coruna.” It is capable of infecting iPhone devices and potentially jeopardizing sensitive information, including seed phrases of cryptocurrency wallets. The toolkit contains a total of 23 vulnerabilities across five exploit chains that target devices running older versions of iOS, ranging from iOS 13 to 17.2.1. Multiple security analysts say that attackers have managed to deploy the exploit through compromised websites and fake crypto-oriented platforms. Once a vulnerable device visits the website, malware can scan messages and apps like MetaMask to locate wallet credentials or financial information. The exploit has originally been linked to espionage campaigns before spreading to cybercriminal groups with financial motives. This highlights how advanced surveillance tools can leak into the broader criminal ecosystem, as well as the critical importance of maintaining technological hygiene, updating your phone’s software, and following mandatory security tips when interacting with crypto platforms. Morgan Stanley Taps Coinbase and BNY Mellon for Bitcoin Infrastructure Morgan Stanley is preparing to deepen its involvement in crypto infrastructure. The banking behemoth is supposedly considering launching a Bitcoin investment product. The bank intends to rely on Coinbase for cryptocurrency custody services, as well as on BNY Mellon for additional asset custody related to the proposed Morgan Stanley Bitcoin Trust. The ETF itself will hold Bitcoin directly, and the custody structure will primarily rely on offline cold storage to reduce hacking risks, according to the filing . The move signals growing institutional demand for regulated access to crypto products. Major financial institutions have undoubtedly increased their involvement and partnered with well-known crypto firms rather than building their own infrastructure in a bid to accelerate Wall Street’s venture into the digital asset industry. Zerohash Applies for U.S. National Trust Bank Charter Popular crypto infrastructure firm Zerohash has formally applied for a National Trust Bank Charter with the U.S. Office of the Comptroller of the Currency (OCC). This step could enable the company to operate as a federally regulated trust bank. If the application is approved and the charter granted, this would allow Zerohash to further expand its services to niches such as digital asset custody, stablecoin management, and tokenized asset infrastructure under a unified federal regulatory framework. The company is already powering crypto integrations for institutions, which include Morgan Stanley, Stripe, and Interactive Brokers. The move comes a day after Kraken became the first crypto company to obtain a Fed Master Account. Venture Giant a16z Targets $2 Billion for a New Crypto Fund Silicon Valley venture capital powerhouse Andreessen Horowitz (a16z) is raising around $2 billion for a fund focused on investing in the cryptocurrency industry. According to the reports, the round can close as early as the first half of this year. Historically, a16z has been one of the most prominent VCs in the Web3 ecosystem, backing major projects and startups across blockchain infrastructure, crypto apps, DeFi, and related areas. Despite the ongoing crypto winter, a new fund of this size suggests that venture investors still see long-term opportunity, highlighting that periods of pressure can also be times of opportunity. Recall that Dragonfly – another crypto-oriented VC – recently launched their fourth fund worth $650 million. Tether Makes $1.5 Billion Bet on AI Sleep Tracking Last but not least, we have the stablecoin giant Tether making a strategic investment in the AI-powered mattress and sleep-oriented technology company Eight Sleep at a $1.5 billion valuation. The investment seems to be part of the firm’s broader strategy to diversify and expand well beyond crypto and stablecoins into emerging sectors such as health technology and artificial intelligence. The post New Critical iPhone Exploit, Morgan Stanley Taps Coinbase, a16z to Raise $2 Billion: The Last 24 Hours in Crypto appeared first on CryptoPotato .
5 Mar 2026, 02:10
Silver Price Forecast: XAG/USD Holds Steady Above $84.00 but Faces Critical Vulnerability

BitcoinWorld Silver Price Forecast: XAG/USD Holds Steady Above $84.00 but Faces Critical Vulnerability Global markets on March 21, 2025, observed the silver price (XAG/USD) maintaining a delicate position above the $84.00 per ounce threshold, yet technical charts reveal underlying vulnerabilities that could signal significant movement in the coming sessions. This analysis examines the complex interplay of macroeconomic forces, technical indicators, and historical patterns shaping the precious metal’s trajectory. Silver Price Forecast: Technical Chart Analysis Reveals Key Levels Technical analysts currently scrutinize the XAG/USD chart structure with particular attention. The $84.00 level has transformed into a crucial psychological and technical support zone. Furthermore, the 50-day and 200-day moving averages converge nearby, creating a potential inflection point. Market participants note that silver has tested this support region three times in the past month, demonstrating its significance. Each test has resulted in a bounce, but the diminishing volume during these recoveries suggests weakening bullish conviction. Consequently, a decisive break below $84.00 could trigger accelerated selling pressure toward the next major support near $81.50, a level established during the January 2025 consolidation phase. Conversely, resistance remains formidable around the $86.80 mark, which aligns with the early March 2025 high. The Relative Strength Index (RSI) currently hovers near 45, indicating neither overbought nor oversold conditions but leaning toward bearish momentum. Additionally, the Moving Average Convergence Divergence (MACD) histogram shows fading bullish momentum, with the signal line threatening a crossover into negative territory. These chart-based observations provide critical context for the current “steady but vulnerable” market description. Macroeconomic Drivers Influencing Precious Metals Beyond the charts, fundamental factors exert substantial pressure on silver prices. The U.S. dollar index (DXY) has shown renewed strength following the latest Federal Reserve policy statements, creating headwinds for dollar-denominated commodities like silver. Central bank policies globally continue to prioritize inflation control, keeping real interest rates elevated—a traditional negative for non-yielding assets. However, industrial demand presents a countervailing force. Silver’s essential role in photovoltaic solar panels, electric vehicles, and 5G infrastructure provides a structural demand floor. The International Silver Institute reported a 4% year-over-year increase in industrial consumption for 2024, a trend expected to continue through 2025. Geopolitical tensions also contribute to silver’s safe-haven appeal, though typically less pronounced than gold’s. Recent supply chain concerns regarding primary silver mining output from key regions like Mexico and Peru have introduced volatility. The London Bullion Market Association (LBMA) reported silver holdings in exchange-traded products remain near multi-year highs, indicating sustained institutional interest despite price vulnerability. Expert Analysis and Market Sentiment Indicators Market strategists offer nuanced perspectives on the current setup. “The $84 level represents more than just a number on a chart,” notes commodities analyst Dr. Anya Sharma of the Global Resources Institute. “It encapsulates the equilibrium between industrial demand growth and financial market headwinds. A sustained break either direction will likely establish the trend for Q2 2025.” Sharma references historical data showing that silver volatility typically expands following prolonged consolidation near major moving averages. Sentiment indicators from the Commitments of Traders (COT) reports reveal that managed money positions have reduced net-long exposure over the past two weeks. Meanwhile, commercial hedgers have increased short positions slightly, often interpreted as professional hedging against potential downside. This positioning data aligns with the technical vulnerability narrative. Seasonality patterns also come into play, as the period following the March quarter-end often sees repositioning across commodity portfolios. Comparative Performance: Silver Versus Other Assets Understanding silver’s position requires comparison with related markets. The gold-to-silver ratio, a closely watched metric, currently sits near 78:1, slightly above its five-year average of 75:1. This suggests silver may be modestly undervalued relative to gold, potentially limiting severe downside if the ratio reverts toward its mean. Compared to industrial metals like copper, silver has underperformed year-to-date, reflecting its dual nature as both monetary and industrial metal. Silver (XAG/USD) Key Technical Levels and Indicators Level Type Price Significance Immediate Support $84.00 Psychological & 50-day MA confluence Secondary Support $81.50 January 2025 consolidation low Immediate Resistance $86.80 March 2025 swing high Primary Resistance $88.50 2024 yearly high Current RSI 45 Neutral with bearish bias The following factors currently define the trading environment for XAG/USD: Dollar Strength: A resilient U.S. dollar creates valuation pressure. Real Yields: Higher real interest rates reduce appeal. Industrial Demand: Green technology adoption provides support. ETF Flows: Physical-backed product holdings remain stable. Volatility Expectations: Options markets price increased movement. Historical Context and Forward-Looking Scenarios Examining silver’s price action during similar technical setups in the past decade provides valuable insight. In 2019, silver consolidated around its 200-day moving average for several weeks before breaking higher amid monetary policy shifts. Conversely, in 2021, a similar pattern resolved with a downward break following taper talk announcements. The current environment shares characteristics with both periods, making the upcoming economic data releases particularly consequential. The U.S. Personal Consumption Expenditures (PCE) report, due next week, could serve as the catalyst that resolves the current indecision. Forward-looking scenarios depend heavily on the $84.00 handle. A bullish scenario requires a daily close above $86.80 with expanding volume, potentially targeting the $90.00 psychological zone. The bearish scenario involves a sustained break below $84.00, confirmed by a weekly close, opening the path toward $81.50 and possibly $79.00. The probability-weighted analysis from several trading desks suggests a slightly higher likelihood for the bearish resolution in the near term, given the macroeconomic backdrop. Conclusion The silver price forecast remains finely balanced as XAG/USD demonstrates resilience above $84.00 while exhibiting technical vulnerability. This analysis confirms that the precious metal sits at a critical juncture, influenced by competing macroeconomic forces, technical patterns, and shifting market sentiment. Traders and investors should monitor the $84.00 support level with heightened attention, as its integrity will likely determine the short-to-medium-term directional bias. The coming sessions will test whether industrial demand and safe-haven flows can outweigh the pressures from dollar strength and monetary policy, ultimately defining the next chapter in silver’s volatile market narrative. FAQs Q1: What does XAG/USD holding above $84.00 technically signify? The $84.00 level represents a major confluence of technical support, including the 50-day moving average and a key psychological round number. Holding above it suggests underlying demand, but repeated tests without strong rallies indicate vulnerability. Q2: What are the main factors making silver prices vulnerable in 2025? Primary factors include a strengthening U.S. dollar, elevated real interest rates reducing the appeal of non-yielding assets, and technical chart patterns showing weakening momentum despite holding support levels. Q3: How does industrial demand affect silver’s price compared to gold? Industrial applications, particularly in green technology like solar panels and EVs, provide silver with a fundamental demand floor that gold lacks. This can limit downside during economic slowdowns but also ties silver more closely to manufacturing cycles. Q4: What key price level should traders watch if $84.00 breaks? A confirmed break below $84.00 with sustained selling volume would likely target the next significant support zone around $81.50, which was established during the January 2025 consolidation period. Q5: How are institutional investors currently positioned in silver markets? According to recent Commitments of Traders reports, managed money (speculative) positions have reduced net-long exposure, while commercial entities have increased hedging activity. This positioning often precedes increased volatility. This post Silver Price Forecast: XAG/USD Holds Steady Above $84.00 but Faces Critical Vulnerability first appeared on BitcoinWorld .









































