Connect with us
DAPA Banner

Crypto World

Goldman Sachs files for Bitcoin Premium Income ETF

Published

on

Bitcoin Core maintainers face shake-up as Gloria Zhao revokes PGP key

Goldman Sachs has filed for a Bitcoin Premium Income ETF that aims to turn BTC’s volatility into yield via a covered‑call strategy built on spot ETF exposure.

Summary

  • Goldman Sachs files with the SEC for a Bitcoin Premium Income ETF.info.
  • The fund aims to generate yield from Bitcoin using a covered call strategy.news.
  • Filing underscores Wall Street’s shift toward structured Bitcoin income products.

Goldman Sachs has filed a registration statement with the U.S. Securities and Exchange Commission (SEC) to launch a Bitcoin Premium Income exchange‑traded fund, marking one of the 157‑year‑old investment bank’s most direct moves into crypto to date.

According to the preliminary prospectus, the Goldman Sachs Bitcoin Premium Income ETF is designed to provide “current income with a secondary objective of capital appreciation,” giving investors Bitcoin exposure while generating additional yield through options.

Advertisement

The filing, made under the Goldman Sachs ETF Trust on April 14, 2026, proposes that the offering become effective 75 days after submission, which would put the earliest potential launch in late June or early July if regulators sign off.

Goldman Sachs will not hold Bitcoin directly in the new fund but will instead gain exposure through shares of spot Bitcoin ETFs and related instruments, mirroring structures used by rivals such as the iShares Bitcoin Premium Income ETF.

As explained in a breakdown by Arkham Research, a Bitcoin covered‑call ETF “is designed to transform Bitcoin from a passive asset into an income‑generating asset” by holding BTC exposure and then selling call options on that position to collect premiums.

Goldman’s registration statement says the fund will “sell call options generally representing 40% to 100% of the Fund’s exposure to Bitcoin,” a range that caps upside during sharp rallies but allows the ETF to harvest option income in sideways or modestly trending markets.

Advertisement

The proposal comes after the bank quietly ramped up its Bitcoin exposure via existing spot products, with earlier SEC filings showing Goldman holding roughly $1.27 billion of the iShares Bitcoin Trust ETF, an 88% increase on the previous quarter, according to TheStreet.

Industry outlets note that the move aligns Goldman with a broader Wall Street rush into yield‑enhanced Bitcoin vehicles, following similar covered‑call or premium income products from BlackRock and other issuers looking to monetise Bitcoin’s volatility for income‑focused clients.

Bitcoin‑linked structured products and ETFs have already been a recurring theme in crypto.news coverage of the spot ETF trade, with previous story pieces tracking how inflows into BTC funds and their derivatives have influenced the Bitcoin price, options skew and liquidity across major venues.

Advertisement

Investors tracking the implications of Goldman’s ETF filing on the underlying asset can monitor real‑time moves on the Bitcoin market‑cap page, alongside comparable data for Ethereum and other major tokens on their respective price pages as institutional product design around BTC continues to evolve.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

CoW Swap users warned after Blockaid flags COW.FI frontend attack

Published

on

Harvard endowment tilts harder into Bitcoin ETFs than Google stock

Blockaid flags CoW Swap’s cow.fi frontend as malicious, urging users to revoke token approvals and avoid the dApp amid a broader wave of DeFi interface attacks.

Summary

  • Blockaid flags CoW Swap’s main cow.fi frontend as malicious.
  • Users are urged to revoke token approvals and avoid the dApp immediately.
  • Incident highlights growing wave of DeFi frontend attacks across major protocols.

Blockchain security firm Blockaid has warned that CoW Swap’s primary website COW.FI has been compromised in a suspected frontend attack, marking the latest high‑profile exploit attempt against a major DeFi trading interface.

In an alert shared on X, Blockaid said its system “has detected a front-end attack targeting Cowswap” and confirmed that the cow.fi domain has been flagged as malicious inside Blockaid‑integrated wallets, advising users “to refrain from signing transactions and avoid interactions with the dApp until the issue is resolved.”

Advertisement

Following the warning, CoW Swap community channels and independent security commentators urged traders who had connected wallets to CoW Swap to immediately revoke any outstanding token approvals and to stop interacting with the platform’s frontend until further notice, even though underlying smart contracts have not been reported as compromised.

Blockaid’s latest alert comes amid a surge in so‑called frontend hijacks, where attackers compromise a project’s website or DNS rather than its on‑chain contracts, silently swapping legitimate transaction prompts for malicious ones that drain user wallets.linkedin+1

In February, Blockaid reported a similar frontend attack on tokenization platform OpenEden, warning users to “refrain from signing transactions and avoid interactions with the dApp until the issue is resolved,” while separate incidents have recently hit lending protocol Curvance and asset manager Maple Finance.

As highlighted in CoW Swap’s own DeFi security guides, these attacks target “people, devices, and transaction behavior instead of only attacking code,” making basic hygiene like checking URLs, using browser bookmarks and monitoring token approvals critical for retail and professional users alike.

Advertisement

Security platforms such as Kerberus and Revoke‑style tools recommend users regularly audit and revoke token approvals after any suspected incident, noting that revocation “only removes future permission for that contract to move your tokens” and cannot recover funds already drained.

For DeFi traders, the CoW Swap incident underscores a lesson that keeps recurring in crypto.news coverage of exchange exploits, bridge hacks and protocol drains: even when audited smart contracts remain intact, a single compromised frontend can still turn a routine swap into a total wallet loss if users sign blind.

Advertisement

Source link

Continue Reading

Crypto World

Tether Introduces Multichain Self-Custodial Wallet

Published

on

Tether Introduces Multichain Self-Custodial Wallet

Self-custodial wallet tether.wallet supports Bitcoin, USDT, USAT and XAUT across multiple blockchains at launch.

Tether today unveiled its self-custodial crypto wallet using the open-source Wallet Development Kit (WDK) developed by the firm. According to an announcement from the firm, tether.wallet supports USDT, USAT, Bitcoin and XAUT, what the firm says represent “the only assets that truly matter for most of the people.”

Tether says the initiative, which it’s dubbing “the People’s Wallet” aligns with its mission to promote financial inclusion globally, particularly in developing countries and regions with high inflation.

Tether CEO Paolo Ardoino was quoted in the announcement on the firm’s aim of preserving self-custody, without compromising on user experience:

Advertisement

“The objective is to remove the complexity that has prevented broader adoption while preserving the properties that make the digital assets technology valuable. Users should be able to send value as easily as sending a message, without relying on intermediaries and without giving up control of their assets.”

As an example, the firm’s announcement notes that the wallet lets users pay fees in the asset being transferred, instead of needing to acquire or hold separate tokens for gas. The wallet also supports easily readable addresses for sending and receiving that look more like an email address, instead of the typical alphanumeric string.

Tether says at launch, the wallet supports USDT and XAUT on Ethereum, Polygon, Plasma, and Arbitrum, and USAT on Ethereum. It also supports Bitcoin both natively and via the Lightning Network. The firm plans to add support for “several other blockchains” in the future.

Last month, Tether announced that it had engaged a Big Four firm to conduct its first ever “full independent financial statement audit.”

This article was written with the assistance of AI workflows. All our stories are curated, edited and fact-checked by a human.

Advertisement

Source link

Continue Reading

Crypto World

North Korea Used AI to Hack Zerion in Second Crypto Attack

Published

on

North Korea Used AI to Hack Zerion in Second Crypto Attack

Crypto wallet Zerion revealed that North Korean-affiliated hackers used AI in a long-term social engineering attack to steal about $100,000 from the company’s hot wallets last week. 

The Zerion team released a post-mortem on Wednesday, where it confirmed that no user funds, Zerion apps or infrastructure were affected and that it had proactively disabled the web app as a precaution. 

While the amount was relatively small in crypto hacking terms, it is another incident of a crypto worker being targeted for an “AI-enabled social engineering attack linked to a DPRK threat actor,” Zerion said.

It is the second attack of this nature this month, following the $280 million exploit of the Drift Protocol, which was the victim of a “structured intelligence operation” by DPRK-affiliated hackers. The human layer, not smart contract bugs, has now become North Korea’s primary point of entry into crypto firms.  

Advertisement

AI is changing the way cyber threats work

Zerion said the attacker gained access to some team members’ logged-in sessions and credentials, as well as private keys to company hot wallets. 

“This incident showed that AI is changing the way cyber threats work,” the company said. 

It confirmed that the attack was similar to those that had been investigated by the Security Alliance (SEAL) last week.

Related: Researchers discover malicious AI agent routers that can steal crypto

Advertisement

SEAL reported that it had tracked and blocked 164 domains linked to the DPRK group UNC1069 in a two-month window from February to April.

It stated that the group operates “multiweek, low-pressure social engineering campaigns” across Telegram, LinkedIn and Slack. Malicious actors impersonate known contacts or credible brands or leverage access to previously compromised company and individual accounts.

“UNC1069’s social engineering methodology is defined by patience, precision, and the deliberate weaponization of existing trust relationships.”

Google’s cybersecurity unit Mandiant detailed in February the group’s use of fake Zoom meetings and a “known use of AI tools by the threat actor for editing images or videos during the social engineering stage.”

DPRK’s social engineering is evolving

Earlier this month, MetaMask developer and security researcher Taylor Monahan said North Korean IT workers have been embedding themselves in crypto companies and decentralized finance projects for at least seven years.

Advertisement

“The evolution of the DPRK’s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges,” blockchain security firm Elliptic said in a blog post earlier this year. 

“Individual developers, project contributors, and anyone with access to cryptoasset infrastructure is a potential target.”

There are two types of DPRK attack vectors, one more sophisticated than the other. Source: ZachXBT

Magazine: How AI just dramatically sped up the quantum risk for Bitcoin