Connect with us

Crypto World

CRV price slides towards support amid LlamaLend pool exploit

Published

on

CRV price slides towards range lows as LlamaLend pool exploit weighs on sentiment - 1

CRV price trades near $0.24 as LlamaLend exploit concerns weigh on short-term sentiment.

Summary

  • CRV price is holding above $0.22 support but struggling below $0.25 resistance.
  • A $240K LlamaLend pool exploit has added fresh uncertainty around Curve’s ecosystem.
  • A daily close below $0.22 could expose the psychological $0.20 level.

Curve DAO (CRV) token is trading at $0.24 at press time, down 3.5% over the past 24 hours. The pullback comes during a recovery attempt, with price still near the upper half of its seven-day range between $0.21 and $0.26.

CRV is up about 5% on the week but remains down 20% over the past month.

Advertisement

Derivatives activity has softened. Volume is down 12% to $127 million, while open interest has slipped 1.73% to $67.8 million, according to CoinGlass data.

As uncertainty persists, the drop in open interest shows that some leveraged positions are being closed rather than opened, indicating caution among traders.

LlamaLend pool exploit adds pressure

Curve Finance’s March 2 statement confirming that it is looking into an attack on the sDOLA LlamaLend markets has dampened sentiment. The issue stemmed from how the pool’s price oracle was configured, which introduced the risk of manipulation.

Blockchain security firm BlockSec had clarified that the vulnerability affected only the sDOLA–crvUSD LlamaLend pool and not Inverse Finance itself. The exploit resulted in an estimated $240,000 profit for the attacker.

Advertisement

Borrowers who used sDOLA as collateral were liquidated, while lenders were unaffected. sDOLA holders even saw gains due to the price distortion.

The attack relied on a flash loan. Funds were borrowed, sDOLA was redeemed and re-staked as a donation, and the pool’s pricing mechanism was temporarily distorted.

Advertisement

That shift pushed several positions below liquidation thresholds, allowing the attacker to liquidate them at a profit.

Curve emphasized that the core protocol contracts were not compromised. Even so, the incident has revived concerns about oracle design and integration risks within DeFi lending markets.

CRV price technical analysis

CRV continues to trade in a bearish structure. The daily chart shows a sequence of lower highs and lower lows. Price sits below the descending 50-day moving average, reinforcing the short- to mid-term downward bias.

CRV price slides towards range lows as LlamaLend pool exploit weighs on sentiment - 1
CRV daily chart. Credit: crypto.news

Attempts to reclaim the 0.25–0.26 zone have failed so far, leaving overhead supply in place. Bollinger Bands expanded to the downside after a period of contraction, confirming that the latest volatility break favored sellers.

Price is now hugging the lower band, a sign that sell pressure has not fully eased. A close back above the mid-band would be the first sign of stabilization, but that has yet to occur.

Advertisement

The momentum is still skewed toward bears because the relative strength index is less than 50. It recently recovered from around the 30 level, but there hasn’t been any major bullish divergence. 

Immediate support sits near 0.22, which marks the lower boundary of the current range and a liquidity cluster. A daily close below that level could open the path toward the psychological 0.20 mark.

On the upside, 0.25 acts as near-term resistance. A sustained move above 0.30 would be required to break the pattern of lower highs and shift the broader structure.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Published

on

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Crypto hackers attempting to use “ClickFix” attacks to steal crypto have now turned to impersonating venture capital firms and hijacking browser extensions in their two most recent attacks. 

According to a report by cybersecurity firm Moonlock Lab on Monday, scammers are using fake venture capital firms such as SolidBit, MegaBit and Lumax Capital. The hackers are using the firms to contact users via LinkedIn with partnership offers, then funneling them to fake Zoom and Google Meet links. 

When a target clicks the fraudulent link, they are taken to an event page featuring a fake Cloudflare “I’m not a robot” checkbox. Clicking it copies a malicious command to the clipboard and prompts the user to open their computer’s terminal and paste the so-called verification code, which executes the attack.

“The ClickFix technique is what makes the final step so effective,” the Moonlock Lab team said. “By turning the victim into the execution mechanism—having them paste and run the command themselves—the attackers sidestep the very controls the security industry has spent years building. No exploit. No suspicious download.”

Advertisement

Moonlock Lab alleges that a person using the name Mykhailo Hureiev, listed as the co-founder and managing partner at SolidBit Capital, has been a primary point of contact for the initial LinkedIn phase of the scam. Two X users have also reported suspicious conversations with a Hureiev account.

A user under the name Mykhailo Hureiev has allegedly been the primary point of contact for the scam’s initial LinkedIn phase. Source: big dan

However, Moonlock Lab notes that the campaign’s infrastructure is sophisticated and designed to rotate identities as soon as one front is exposed.

Chrome extension hijacked to steal crypto

Meanwhile, crypto hackers have, until recently, been spreading a malicious Chrome extension with a “ClickFix” attack angle.

QuickLens, an extension that lets users run Google Lens searches directly in their browser, was removed from the web store after it was compromised to push malware, John Tuckner, the founder of cybersecurity firm Annex Security, said in a Feb. 23 report.

After QuickLens changed ownership on Feb. 1, a new version was released two weeks later containing malicious scripts that launched ClickFix attacks and other information-stealing tools. Tuckner noted that the extension had around 7,000 users. 

Advertisement
QuickLens was removed from the web store after it was compromised to push malware. Source: Annex Security

The hijacked extension reportedly searched for crypto wallet data and seed phrases to steal funds. It also scraped the contents of Gmail inboxes, YouTube channel data, and other login credentials or payment information entered into web forms, according to a eSecurity Planet report on March 2.

ClickFix attacks are used to target many industries

The ClickFix technique has gained popularity among threat actors since last year, according to Moonlock Lab, because it forces victims to execute the malicious payload manually, bypassing standard security tools.

Related: February crypto losses hit lowest level since March 2025, says PeckShield

However, security researchers have been tracking its use since at least 2024, with targets spanning a wide range of industries. 

Microsoft Threat Intelligence sent out a warning in August last year that it had been tracking “campaigns targeting thousands of enterprise and end-user devices globally every day.”

Advertisement

Meanwhile, cyber threat intelligence company Unit42 reported in July last year that the “relatively new social engineering technique” has been impacting industries such as manufacturing, wholesale and retail, state and local governments, and utilities and energy.

Magazine: Would Bitcoin really be at $200K if not for Jane Street? Trade Secrets