Connect with us

Crypto World

BTC and XRP Crash Over? Analyst Pinpoints Exact Rebound Timeline

Published

on

BTC and XRP Crash Over? Analyst Pinpoints Exact Rebound Timeline


The timeframe might be shorter than you expect.

The cryptocurrency market is bleeding out once again, led by bitcoin’s decline to under $67,000 for the first time since last Friday’s calamity.

However, one analyst believes there’s finally good news for BTC and XRP, and he even provided a more precise timing for the potential rebound.

Advertisement

The primary cryptocurrency has been in a free-fall state for weeks. It stood over $90,000 on January 28, but dumped by $30,000 since then to bottom out, at least for now, at $60,000 last Friday.

It tried to recover some ground since then and tapped $72,000 on a couple of occasions, but was stopped yesterday again and driven to under $67,000 as of press time.

Approximately at the time when the latest correction took place, popular analyst Ali Martinez said on X that the early TD Sequential buy signal had flashed for BTC. Moreover, he was precise with the timing of the potential rebound, claiming that it could be in the next 3-9 days.

The metric, developed by Tom DeMark, identifies potential market reversal points, usually after a strong move in either direction. Martinez has frequently posted about the TD Sequential for several cryptocurrencies, and the indicator’s success rate has been rather impressive, especially for Ripple’s XRP.

You may also like:

Before the latest drop, the cross-border token also flashed a buy signal. Although it has since retraced by 3-4%, Martinez reminded that the TD Sequential has “perfectly timed” the local top for XRP in the past, and could signal a rapid rebound now.

SPECIAL OFFER (Exclusive)

SECRET PARTNERSHIP BONUS for CryptoPotato readers: Use this link to register and unlock $1,500 in exclusive BingX Exchange rewards (limited time offer).

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

North Korea Linked Hackers Deploy New Crypto Malware

Published

on

North Korea Linked Hackers Deploy New Crypto Malware

North Korea-linked threat actors are escalating social engineering campaigns targeting cryptocurrency and fintech companies, deploying new malware designed to harvest sensitive data and steal digital assets.

In a recent campaign, a threat cluster tracked as UNC1069 deployed seven malware families aimed at capturing and exfiltrating victim data, according to a Tuesday report from Mandiant, a US cybersecurity firm that operates under Google Cloud.

The campaign relied on social engineering schemes involving compromised Telegram accounts and fake Zoom meetings with deepfake videos generated through artificial intelligence tools.

“This investigation revealed a tailored intrusion resulting in the deployment of seven unique malware families, including a new set of tooling designed to capture host and victim data: SILENCELIFT, DEEPBREATH and CHROMEPUSH,” the report states.

Advertisement
Threat actor UNC1069, attack chain. Source: Mandiant/Google Cloud

Related: CZ sounds alarm as ‘SEAL’ team uncovers 60 fake IT workers linked to North Korea

Mandiant said the activity represents an expansion of the group’s operations, primarily targeting crypto firms, software developers and venture capital companies.

The malware included two newly discovered, sophisticated data-mining viruses, named CHROMEPUSH and DEEPBREATH, which are designed to bypass key operating system components and gain access to personal data.

The threat actor with “suspected” North Korean ties has been tracked by Mandiant since 2018, but AI advancements helped the malicious actor scale up its operations and include “AI-enabled lures in active operations” for the first time in November 2025, according to a report at the time from the Google Threat Intelligence Group.

Cointelegraph contacted Mandiant for additional details regarding the attribution, but had not received a response by publication.

Advertisement

Related: Balancer hack shows signs of months-long planning by skilled attacker

Attackers are stealing crypto founder accounts to launch ClickFix attacks

In one intrusion outlined by Mandiant, attackers used a compromised Telegram account belonging to a crypto founder to initiate contact. The victim was invited to a Zoom meeting featuring a fabricated video feed in which the attacker claimed to be experiencing audio problems.

The attacker then directed the user to run troubleshooting commands in their system to fix the purported audio issue in a scam known as a ClickFix attack.

The provided troubleshooting commands had embedded a hidden single command that initiated the infection chain, according to Mandiant.

Advertisement
UNC1069 victimology map. Source: Mandiant/Google Cloud

North Korea-linked illicit actors have been a persistent threat to both crypto investors and Web3-native companies.

In June 2025, four North Korean operatives infiltrated multiple crypto firms as freelance developers, stealing a cumulative $900,000 from these startups, Cointelegraph reported.

Earlier that year, the Lazarus Group was linked to the $1.4 billion hack of Bybit, one of the largest crypto thefts on record.

Magazine: Coinbase hack shows the law probably won’t protect you — Here’s why

Advertisement