Connect with us

Crypto World

Real-World Assets on Ethereum Top $15 Billion

Published

on

Real-World Assets on Ethereum Top $15 Billion

The tokenized gold market has surged past $4 billion, significantly contributing to Ethereum’s Real-World Asset (RWA) market, which now exceeds $15 billion.

Ethereum’s real-world asset (RWA) market has grown significantly, reaching $15 billion and accounting for 58% of the global RWA market. This expansion is largely driven by the increasing popularity of tokenized gold.

“Tokenized gold, such as PAX Gold (PAXG) or Tether Gold (XAUT), offers investors the security of owning fully backed physical bullion while enjoying the liquidity and portability of digital assets,” according to ARKM Research. This blend of traditional and digital finance facilitates a seamless transition for investors seeking stability and growth.

Gold-backed tokens are now competing directly with leading crypto derivatives, shedding their niche status. Tether Gold (XAUT) is the largest tokenized gold token by market capitalization, backed by physical gold stored in Swiss vaults. Meanwhile, Paxos Gold (PAXG) is regulated by the New York Department of Financial Services (NYDFS), with each token backed by one troy ounce of gold.

Advertisement

In addition to gold, the on-chain perpetual futures trading market for gold and silver, exemplified by platforms like TradeXYZ, has seen record levels of interest and volume in recent months, further indicating the growing appetite for tokenized commodities.

This article was generated with the assistance of AI workflows.

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Bitcoin climbs as IBIT posts one of the quarter’s biggest inflow days amid Iran volatility

Published

on

Bitcoin climbs as IBIT posts one of the quarter’s biggest inflow days amid Iran volatility

Bitcoin traded near $68,000 on Tuesday as U.S. spot ETFs pulled in $458 million, according to data curated by SoSoValue, marking one of the quarter’s strongest inflow days despite the ongoing conflict with Iran.

The inflows suggest institutional investors are treating bitcoin’s recent volatility stemming from the war as contained rather than systemic.

Singapore-based trading firm QCP Capital said in a recent note that the roughly $300 million in long liquidations triggered by the weekend headlines were “notable but contained,” arguing that positioning had already been materially lightened in recent weeks.

Options markets told a similar story, QCP wrote, with one-day implied volatility briefly spiking to 93% before quickly retracing, a sign traders were hedging event risk rather than bracing for prolonged escalation.

Advertisement

Meanwhile, U.S. spot bitcoin ETFs added $1.1 billion over three consecutive sessions last week, according to SoSoValue data previously reported by CoinDesk, with BlackRock’s IBIT accounting for roughly half.

Source link

Continue Reading

Crypto World

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Published

on

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Crypto hackers attempting to use “ClickFix” attacks to steal crypto have now turned to impersonating venture capital firms and hijacking browser extensions in their two most recent attacks. 

According to a report by cybersecurity firm Moonlock Lab on Monday, scammers are using fake venture capital firms such as SolidBit, MegaBit and Lumax Capital. The hackers are using the firms to contact users via LinkedIn with partnership offers, then funneling them to fake Zoom and Google Meet links. 

When a target clicks the fraudulent link, they are taken to an event page featuring a fake Cloudflare “I’m not a robot” checkbox. Clicking it copies a malicious command to the clipboard and prompts the user to open their computer’s terminal and paste the so-called verification code, which executes the attack.

“The ClickFix technique is what makes the final step so effective,” the Moonlock Lab team said. “By turning the victim into the execution mechanism—having them paste and run the command themselves—the attackers sidestep the very controls the security industry has spent years building. No exploit. No suspicious download.”

Advertisement

Moonlock Lab alleges that a person using the name Mykhailo Hureiev, listed as the co-founder and managing partner at SolidBit Capital, has been a primary point of contact for the initial LinkedIn phase of the scam. Two X users have also reported suspicious conversations with a Hureiev account.

A user under the name Mykhailo Hureiev has allegedly been the primary point of contact for the scam’s initial LinkedIn phase. Source: big dan

However, Moonlock Lab notes that the campaign’s infrastructure is sophisticated and designed to rotate identities as soon as one front is exposed.

Chrome extension hijacked to steal crypto

Meanwhile, crypto hackers have, until recently, been spreading a malicious Chrome extension with a “ClickFix” attack angle.

QuickLens, an extension that lets users run Google Lens searches directly in their browser, was removed from the web store after it was compromised to push malware, John Tuckner, the founder of cybersecurity firm Annex Security, said in a Feb. 23 report.

After QuickLens changed ownership on Feb. 1, a new version was released two weeks later containing malicious scripts that launched ClickFix attacks and other information-stealing tools. Tuckner noted that the extension had around 7,000 users. 

Advertisement
QuickLens was removed from the web store after it was compromised to push malware. Source: Annex Security

The hijacked extension reportedly searched for crypto wallet data and seed phrases to steal funds. It also scraped the contents of Gmail inboxes, YouTube channel data, and other login credentials or payment information entered into web forms, according to a eSecurity Planet report on March 2.

ClickFix attacks are used to target many industries

The ClickFix technique has gained popularity among threat actors since last year, according to Moonlock Lab, because it forces victims to execute the malicious payload manually, bypassing standard security tools.

Related: February crypto losses hit lowest level since March 2025, says PeckShield

However, security researchers have been tracking its use since at least 2024, with targets spanning a wide range of industries. 

Microsoft Threat Intelligence sent out a warning in August last year that it had been tracking “campaigns targeting thousands of enterprise and end-user devices globally every day.”

Advertisement

Meanwhile, cyber threat intelligence company Unit42 reported in July last year that the “relatively new social engineering technique” has been impacting industries such as manufacturing, wholesale and retail, state and local governments, and utilities and energy.

Magazine: Would Bitcoin really be at $200K if not for Jane Street? Trade Secrets