Connect with us

Crypto World

Saylor’s Strategy Spends Over $200 Million to Acquire 3,015 BTC: Details

Published

on

Saylor's Strategy Spends Over $200 Million to Acquire 3,015 BTC: Details


Some of the comments below the company’s post said this purchase shows “conviction, not hesitation.”

After hinting about another purchase on Sunday, Strategy’s co-founder and former CEO, Michael Saylor, has made it official, indicating that his firm has splashed $204.1 million to acqure additional 3,015 BTC.

The average cost for the latest transaction was $67,700, and the company’s stash has grown to 720,737 BTC. It was purchased at an average price of just under $76,000, which means that the NASDAQ-listed firm continues to be deep in the red on its bitcoin position.

Advertisement

With the cryptocurrency’s price trading at around $66,000 as of press time, Strategy’s fortune is worth around $47.5 billion, which represents an unrealized net loss of over $7 billion.

Most comments below Saylor’s posts outlined their support for the move, with one user calling the purchase of 3,015 BTC during the current macro conditions a show of “conviction” and not hesitation.

Strategy’s stock price has not opened for trading yet after the weekend events in the Middle East, but is down by 0.5% in pre-market trading. More volatility is expected when Wall Street opens in a few hours.

Advertisement
SPECIAL OFFER (Exclusive)

Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Bitcoin climbs as IBIT posts one of the quarter’s biggest inflow days amid Iran volatility

Published

on

Bitcoin climbs as IBIT posts one of the quarter’s biggest inflow days amid Iran volatility

Bitcoin traded near $68,000 on Tuesday as U.S. spot ETFs pulled in $458 million, according to data curated by SoSoValue, marking one of the quarter’s strongest inflow days despite the ongoing conflict with Iran.

The inflows suggest institutional investors are treating bitcoin’s recent volatility stemming from the war as contained rather than systemic.

Singapore-based trading firm QCP Capital said in a recent note that the roughly $300 million in long liquidations triggered by the weekend headlines were “notable but contained,” arguing that positioning had already been materially lightened in recent weeks.

Options markets told a similar story, QCP wrote, with one-day implied volatility briefly spiking to 93% before quickly retracing, a sign traders were hedging event risk rather than bracing for prolonged escalation.

Advertisement

Meanwhile, U.S. spot bitcoin ETFs added $1.1 billion over three consecutive sessions last week, according to SoSoValue data previously reported by CoinDesk, with BlackRock’s IBIT accounting for roughly half.

Source link

Continue Reading

Crypto World

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Published

on

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Crypto hackers attempting to use “ClickFix” attacks to steal crypto have now turned to impersonating venture capital firms and hijacking browser extensions in their two most recent attacks. 

According to a report by cybersecurity firm Moonlock Lab on Monday, scammers are using fake venture capital firms such as SolidBit, MegaBit and Lumax Capital. The hackers are using the firms to contact users via LinkedIn with partnership offers, then funneling them to fake Zoom and Google Meet links. 

When a target clicks the fraudulent link, they are taken to an event page featuring a fake Cloudflare “I’m not a robot” checkbox. Clicking it copies a malicious command to the clipboard and prompts the user to open their computer’s terminal and paste the so-called verification code, which executes the attack.

“The ClickFix technique is what makes the final step so effective,” the Moonlock Lab team said. “By turning the victim into the execution mechanism—having them paste and run the command themselves—the attackers sidestep the very controls the security industry has spent years building. No exploit. No suspicious download.”

Advertisement

Moonlock Lab alleges that a person using the name Mykhailo Hureiev, listed as the co-founder and managing partner at SolidBit Capital, has been a primary point of contact for the initial LinkedIn phase of the scam. Two X users have also reported suspicious conversations with a Hureiev account.

A user under the name Mykhailo Hureiev has allegedly been the primary point of contact for the scam’s initial LinkedIn phase. Source: big dan

However, Moonlock Lab notes that the campaign’s infrastructure is sophisticated and designed to rotate identities as soon as one front is exposed.

Chrome extension hijacked to steal crypto

Meanwhile, crypto hackers have, until recently, been spreading a malicious Chrome extension with a “ClickFix” attack angle.

QuickLens, an extension that lets users run Google Lens searches directly in their browser, was removed from the web store after it was compromised to push malware, John Tuckner, the founder of cybersecurity firm Annex Security, said in a Feb. 23 report.

After QuickLens changed ownership on Feb. 1, a new version was released two weeks later containing malicious scripts that launched ClickFix attacks and other information-stealing tools. Tuckner noted that the extension had around 7,000 users. 

Advertisement
QuickLens was removed from the web store after it was compromised to push malware. Source: Annex Security

The hijacked extension reportedly searched for crypto wallet data and seed phrases to steal funds. It also scraped the contents of Gmail inboxes, YouTube channel data, and other login credentials or payment information entered into web forms, according to a eSecurity Planet report on March 2.

ClickFix attacks are used to target many industries

The ClickFix technique has gained popularity among threat actors since last year, according to Moonlock Lab, because it forces victims to execute the malicious payload manually, bypassing standard security tools.

Related: February crypto losses hit lowest level since March 2025, says PeckShield

However, security researchers have been tracking its use since at least 2024, with targets spanning a wide range of industries. 

Microsoft Threat Intelligence sent out a warning in August last year that it had been tracking “campaigns targeting thousands of enterprise and end-user devices globally every day.”

Advertisement

Meanwhile, cyber threat intelligence company Unit42 reported in July last year that the “relatively new social engineering technique” has been impacting industries such as manufacturing, wholesale and retail, state and local governments, and utilities and energy.

Magazine: Would Bitcoin really be at $200K if not for Jane Street? Trade Secrets