Connect with us
DAPA Banner

Crypto World

Iran Sees Bitcoin as Strategic Asset; USDt Dominates Oil Tolls, BPI

Published

on

Crypto Breaking News

Iran’s government has named Bitcoin (BTC) as one of the payment options for tolls on oil shipments passing through the Strait of Hormuz, a move highlighted by observers as a clear signal of Bitcoin’s role as a neutral and strategic asset in a sanctions-driven economy. Sam Lyman, head of research at the Bitcoin Policy Institute (BPI), described the development as a notable instance where Bitcoin’s censorship-resistant properties are front and center in state-level financial decisions.

According to Lyman, the Iranian authorities chose BTC for its resilience to external interference—“No one can freeze Bitcoin. No one can shut down the Bitcoin network.” Yet he cautions that, at present, there is no on-chain evidence of BTC toll payments being executed, and Iran’s payments ecosystem remains diversified across multiple instruments, including Chinese yuan and US dollar-pegged stablecoins.

Iran’s payment mix for tolls now includes yuan, USD-pegged stablecoins, and BTC, a combination that reflects a broader push to sidestep traditional financial channels amid international sanctions. However, Lyman notes that the bulk of Iran’s crypto activity to date has been denominated in USD-backed stablecoins, underscoring how dollar-mapped liquidity remains a core part of the regime’s on-chain strategy.

In framing this development, Lyman emphasizes a broader point about how policymakers should view Bitcoin. The move illustrates why some lawmakers advocate considering Bitcoin as a strategic asset, rather than pursuing a blanket hostility toward digital assets or a dismissive stance on their utility in national finance. As the discussion around crypto and national security evolves, this incident provides a real-world data point on how a state actor contemplates the potential of censorship-resistant settlement rails.

Advertisement

Key takeaways

  • Iran publicly designates Bitcoin as a payment option for oil tolls crossing the Strait of Hormuz, signaling a strategic use of BTC beyond speculative trading.
  • Bitcoin’s censorship-resistant properties are cited as the primary rationale for its use in sovereign-level payments, according to Sam Lyman of the Bitcoin Policy Institute.
  • As of now, there is no on-chain evidence confirming BTC toll payments; Iran’s crypto activity remains dominated by USD-backed stablecoins, notably USDt.
  • Iran has shifted roughly $3 billion in cryptocurrencies since 2022, with the majority in stablecoins; U.S. authorities report a smaller portion of frozen assets relative to total movement, suggesting ongoing liquidity despite sanctions.
  • The episode feeds into a broader policy debate about whether Bitcoin should be treated as a strategic asset by Western lawmakers and regulators, rather than being treated solely as a fringe or risk-prone technology.

Bitcoin as a strategic asset in Iran’s trade payments

Iran’s government has long pursued a formal digital asset strategy, a stance that has evolved since at least 2018. In the Hormuz toll context, Bitcoin has been positioned as a possible backbone for cross-border settlement where conventional financial channels are constrained by sanctions and geopolitical pressures. Lyman pointed out that the government’s willingness to accept BTC alongside yuan and USD-pegged stablecoins reflects a deliberate hedging of liquidity channels in a restrictive environment.

In the eye of observers, the assertion that BTC serves as a strategic asset hinges on two factors: censorship resistance and reliability under pressure. Bitcoin’s network-persistence means it cannot be unilaterally shut down by a single authority, a feature that can be appealing when traditional rails are subject to sanctions or asset freezes. Lyman underscored this logic in his discussion with Cointelegraph, framing BTC as part of a broader toolkit rather than a quick fix for all payment frictions.

Still, the practical reality remains nuanced. The Iranian government has not publicly disclosed confirmed on-chain BTC toll payments for Hormuz tolls to date. Lyman notes that while BTC is listed among accepted instruments, on-chain activity in this specific payment channel has not been evidenced publicly. This gap between the stated policy and observable transaction data highlights a common challenge in assessing the real-world use of crypto in state finance: official statements can outpace, or partially obscure, on-chain signals.

As part of the same ecosystem, the government’s stance toward stablecoins continues to be influential. USDt, a dollar-pegged stablecoin issued by Tether, has long been a dominant instrument in Iran’s on-chain activity. Lyman pointed out that the majority of crypto interactions in Iran are denominated in USDT, underscoring how dollar-denominated liquidity remains a central pillar of the regime’s digital asset operations.

“This is one of the most significant situations where Bitcoin is very clearly a strategic asset. The reason why Iran wants to use Bitcoin for these transactions is that no one can freeze Bitcoin. No one can shut down the Bitcoin network.”

The comment, attributed to Lyman, captures the core tension: Bitcoin’s perceived resilience against external controls sits alongside the practical reality that stablecoins and other instruments still dominate domestic crypto flows. BPI’s analysis, including its coverage of the Hormuz episode, also notes that a substantial portion of Iran’s on-chain activity has historically moved through USDt rather than BTC, reflecting both liquidity preferences and the regulatory environments surrounding stablecoins.

Advertisement

In a broader sense, the Hormuz toll framework can be read as part of a longer arc in which Iran has experimented with digital assets to bypass restrictions and diversify its financial channels. The government’s approach aligns with a multi-asset strategy rather than a single-asset solution, suggesting that BTC’s strategic prominence may emerge more from its stability of long-term censorship resistance than from its immediate transactional footprint.

Stablecoins and on-chain realities

The USDt dynamic is central to Iran’s crypto activity narrative. Lyman notes that the regime has used stablecoins extensively in its digital asset operations since the early days of the country’s crypto exploration. This preference persists despite publicized episodes in which stablecoin issuers and custodians faced enforcement actions or wallet freezes elsewhere in the ecosystem. Lyman frames this as a calculated risk, describing it as “rolling the dice” in the sense that stablecoins provide a familiar dollar proxy while carrying counterparty risk from issuers and custodians.

On the macro scale, Lyman estimates that Iran has managed to move roughly $3 billion in cryptocurrencies since 2022, with the majority denominated in stablecoins. Meanwhile, U.S. authorities have reported that only a fraction of those assets has been frozen—about $600 million—leaving a substantial portion still accessible for movement. The discrepancy between total crypto activity and frozen assets underscores how the regime has relied on the speed and flexibility of on-chain funds, particularly stablecoins, to navigate sanctions and maintain some degree of financial continuity.

These dynamics matter for policymakers and market participants alike. The use of stablecoins in sanctioned environments raises questions about enforcement reach, liquidity, and the substitution effects between different digital assets. It also highlights the ongoing importance of stablecoins in offshore and state-affiliated crypto activity, even as Bitcoin is increasingly framed as a strategic tool in high-stakes financial calculations.

Advertisement

For readers tracking market implications, the Hormuz development adds another layer to the evolving relationship between geopolitics and crypto liquidity. While Bitcoin’s censorship-resistant property is appealing in theory, the actual balance of assets and the on-chain evidence of toll payments remain under close watch. The Iranian case also illustrates how state actors may leverage a portfolio of instruments—BTC, yuan, and stablecoins—to preserve monetary sovereignty in a constrained environment.

More broadly, the Hormuz case invites a closer look at how Western policymakers might treat Bitcoin in national-security terms. If Bitcoin is recognized as a strategic asset, it could influence future regulatory debates and sanctions policy, potentially encouraging or discouraging certain kinds of on-chain transactions depending on their perceived strategic value and accessibility to sanctioned networks.

What to watch next

The next phase will likely hinge on whether any verifiable on-chain BTC toll transactions materialize and how policymakers and regulators adjust their framing of Bitcoin within national-security and sanctions regimes. Observers will also monitor whether Iran expands or shifts its mix of currencies for tolls and cross-border trade, and how stablecoin governance and custodial practices evolve in constrained markets. The Hormuz episode remains a critical, real-world flashpoint for understanding Bitcoin’s evolving role in geopolitical finance.

For researchers and investors, the key takeaway is that Bitcoin’s strategic value is being evaluated in state contexts, even as practical adoption and verification lag behind rhetoric. The balance between censorship resistance and regulatory risk will continue to shape how institutions, custodians, and markets perceive Bitcoin’s place in sanctioned economies.

Advertisement

Source note: These observations and figures are based on recent remarks from Sam Lyman, head of research at the Bitcoin Policy Institute. The Institute’s related analysis on the state of play around Bitcoin, the Strait of Hormuz, and the situation in Iran is available here: Bitcoin Policy Institute — State of Play.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Kelp Restaking Protocol Exploited, $293M Drained

Published

on

Crypto Breaking News

DeFi markets faced another high-profile setback this weekend as Kelp, a liquid restaking protocol, disclosed a cyber attack targeting its rsETH restaking token. The incident prompted an immediate pause of rsETH smart contracts across Kelp’s mainnet and multiple Layer-2 networks as the project investigates potentially hundreds of millions of dollars in losses. Blockchain security firm Cyvers later pegged the damage at about $293 million, signaling a significant hit to users and counterparties tied to the restaking ecosystem.

Kelp stated on X that it detected suspicious cross-chain activity involving rsETH and subsequently halted rsETH contracts on mainnet and several Layer-2s to prevent further damage while the investigation unfolds. Cyvers added that the attacker exploited the rsETH adapter bridge—the software component that manages the rsETH token—allowing the drain of funds from the platform. The firm also noted that the attacker has been actively moving funds, with a substantial portion converted into Ethereum (ETH).

In the wake of the breach, the attacker’s on-chain activity has increasingly relied on a Tornado Cash mixer-funded address. Cyvers reported that roughly $250 million of the stolen funds had already been swapped into ETH, underscoring the challenge of tracing and recovering assets in the DeFi space once they leave the original contract domains.

Key takeaways

  • The Kelp rsETH attack reportedly drained about $293 million, triggering contract pauses across Kelp’s mainnet and several Layer-2 networks as investigators assess the damage.
  • The attacker targeted the rsETH adapter bridge, leveraging cross-chain dynamics that underscore risks inherent to DeFi composability and restaking ecosystems.
  • At least nine protocols with exposure to rsETH reportedly froze activity in response, while Aave moved to suspend rsETH markets on V3 and V4 to contain risk.
  • Approximately $250 million of the stolen funds have been converted to ETH, with the attacker utilizing a Tornado Cash mixer-funded address, complicating on-chain tracing efforts.

Attack details and ecosystem response

According to Kelp, the breach traces to irregular cross-chain activity linked to rsETH, prompting an immediate safety pause to contain potential further loss. The company’s moderation was swift, spanning mainnet and several Layer-2 deployments, as the team works through the incident. While Kelp is conducting its investigation, the broader DeFi community has begun to map the ripple effects beyond a single protocol.

Blockchain security firm Cyvers provided a stark figure for the loss, estimating the total at about $293 million. The firm’s analysis highlights the risk that bridges and adapters—components that enable tokens like rsETH to move across chains—present when vulnerabilities exist in the bridging layer. The incident aligns with a pattern of high-severity exploits aimed at cross-chain and interoperable DeFi primitives, where a single compromised bridge can force widespread disruption across multiple protocols.

Advertisement

In response to the breach, several DeFi platforms publicly paused or limited exposure to rsETH. Notably, Aave—one of the largest DeFi lenders—announced that rsETH markets had been frozen on its V3 and V4 deployments. Cyvers notes that at least nine protocols reportedly had exposure to rsETH and executed precautionary freezes or withdrawal restrictions as a precautionary measure to prevent cascading losses.

Analysts and observers have highlighted a core risk exposed by the incident: the compounding nature of DeFi’s composability. When multiple protocols rely on a shared token or bridge, a vulnerability in one hinge can reverberate across the entire network, forcing sudden risk management actions across an otherwise diversified ecosystem. Cyvers senior leadership emphasized to Cointelegraph that this is precisely the kind of incident that underscores the fragility and complexity of modern DeFi infrastructure when bridges and adapters are compromised.

Contextual backdrop: a string of cybersecurity incidents

The Kelp attack sits within a broader panorama of DeFi hacks observed over the past several months. In late April, Drift Protocol—a decentralized derivatives exchange—suffered a major exploit that drained roughly $280 million from the platform. Drift’s post-mortem described a months-long intrusion, noting the attackers’ alleged infiltration of developer machines and the eventual deployment of malware. The incident traced to a sophisticated operation that reportedly included access gained at a large crypto conference, followed by collaboration with the attackers before the breach unfolded.

Taken together, these events illuminate a persistent security challenge for the nascent DeFi stack: attackers are increasingly targeting the risk-prone layers of cross-chain interoperability and restaking mechanisms, where a single vulnerability can cascade into sizable losses across multiple protocols. Industry participants continue to debate the best path forward—ranging from more stringent bridge audit standards to enhanced multi-party computation (MPC) and formal verification for cross-chain components.

Advertisement

What this means for investors, users, and builders

For users and liquidity providers, the Kelp incident underscores the importance of understanding the specific risk profiles of restaking and cross-chain primitives. Restaking naturally introduces an expanded attack surface: while it offers potential yield enhancements, it also increases reliance on the security of adapter contracts and bridges that connect across layers of the ecosystem. Investors should monitor how protocols respond to such incidents, particularly regarding fund recovery efforts, contingency plans, and the timelines for resuming normal operations.

From a builder’s perspective, the episode highlights several priorities: rigorous security testing of bridge and adapter code, heightened monitoring for cross-chain anomalies, and clearer disclosure frameworks around incident response. The drift toward rapid, publicized pauses—while essential for risk containment—also presses for standardized playbooks so that platforms can coordinate responses without sacrificing user trust.

Regulators and policymakers may also take note of the evolving security landscape, especially as DeFi protocols broaden their engagement with restaking mechanisms and more intricate cross-chain flows. The balance between innovation and resilience will likely shape ongoing discussions around security best practices and capital-adequacy considerations for DeFi incumbents as they scale.

Closing perspective

As the Kelp investigation unfolds, observers will be watching for a clearer accounting of the breach’s root causes, the effectiveness of the emergency pauses, and any progress toward asset recovery. The incident, along with Drift’s earlier breach, reinforces a central theme for the crypto markets: cross-chain and restaking infrastructures demand heightened scrutiny, robust security postures, and coordinated risk management across the ecosystem. Readers should stay tuned for updates on Kelp’s findings, the status of rsETH across major platforms, and any new measures aimed at hardening DeFi’s interconnected layers.

Advertisement

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading

Crypto World

Kelp Hacked, Losses Climb to $293M As Other Protocols Impacted

Published

on

Cybercrime, Cybersecurity, Scams, Hacks

Kelp, a liquid restaking protocol, was the victim of a cyber attack on Saturday, causing the platform to pause smart contracts for its restaking token (rsETH), as it “investigates” the attack amid reports of hundreds of millions of dollars in losses.

“Earlier today, we identified suspicious cross-chain activity involving rsETH. We have paused rsETH contracts across mainnet and several Layer-2s,” the Kelp platform said in an X post.

The attacker exploited the rsETH adapter bridge contract, the software code that manages Kelp’s rsETH token, and drained the platform of about $293 million in funds, according to blockchain security firm Cyvers.

Cybercrime, Cybersecurity, Scams, Hacks
Source: Cyvers

The attacker used a Tornado Cash crypto mixer-funded address and has already converted about $250 million of the stolen funds to Ether (ETH), the native cryptocurrency of the Ethereum layer-1 blockchain network, Cyvers told Cointelegraph.

In response to the attack, decentralized finance (DeFi) platform Aave announced it had frozen rsETH markets on Aave V3 and V4. At least nine crypto protocols had exposure to the token and have frozen activity on their platforms in response, Cyvers said.

Advertisement
Cybercrime, Cybersecurity, Scams, Hacks
Source: Aave

“This is exactly the kind of incident that highlights the risks of composability in DeFi,” Deddy Lavid, CEO of Cyvers, told Cointelegraph. Cointelegraph reached out to Kelp but did not obtain a response by the time of publication. 

The incident is the latest in a string of cybersecurity hacks and exploits of crypto platforms over the last several months, as crypto losses from hacks and scams totaled about $482 million in Q1 2026.

Related: Fake Ledger Live app on Apple App Store drained $9.5M from victims: ZachXBT

Drift Protocol hacked for $280 million

Decentralized cryptocurrency exchange Drift Protocol also suffered an exploit in April, which drained the platform of about $280 million.

The Drift Protocol team said the attack took “months of deliberate preparation,” in which the team was infiltrated by suspected North Korean state-affiliated hackers.

Advertisement

In a post-mortem update, the Drift team said they met the attackers at a “major” crypto conference and collaborated with them for several months before the attackers deployed malware on developer machines and compromised the platform. 

Magazine: DeFi’s billion-dollar secret: The insiders responsible for hacks