Connect with us
DAPA Banner

Crypto World

Crypto’s latest selloff was a TradFi event, not a crypto crisis

Published

on

Crypto's latest selloff was a TradFi event, not a crypto crisis

HONG KONG — Last week’s sharp crypto sell-off was less a replay of 2022’s scandals and more a macro-driven unwind spilling over from traditional finance, according to market participants at Consensus Hong Kong 2026.

“After Oct. 10th, a lot of people had already reduced risk,” said Fabio Frontini, founder of Abraxas Capital Management. “This is just a spillover from TradFi entirely… it’s all interconnected now.”

Panelists pointed to the unwinding of yen carry trades as a key catalyst. Thomas Restout, group CEO of B2C2, described the mechanics: investors borrow in low-interest-rate currencies like the yen and deploy that capital into higher-yielding or risk assets, including bitcoin, ether, gold and silver.

“What does that mean? That means people borrow currencies that have cheap interest rates, and they use it to put on carry trades,” Restout said.

Advertisement

The yen carry trade refers to investors borrowing Japanese yen at low interest rates, converting it into other currencies then investing into higher-yielding assets. However, should yen strengthen, investors have to buy it back to repay loans, causing the trade to “unwind” and trigger market volatility.

As yen rates rose, borrowing costs increased. At the same time, higher volatility triggered steeper margin requirements. “In metals, it went from 11% margin requirements to 16%,” Restout added. This forced some players to unwind positions as collateral demands surged.

The result was broad pressure across risk assets, not just crypto.

Exchange-traded funds (ETFs) tracking bitcoin also saw heavy volumes during the downturn, though panelists pushed back on the idea of full-scale institutional capitulation. At their peak, bitcoin ETFs totaled roughly $150 billion in assets; today they still hold around $100 billion, Restout said. Net outflows since October are about $12 billion—significant, but modest relative to total assets.

Advertisement

“If anything, it means that the money is changing hands,” Restout said, suggesting rotation rather than wholesale exit.

Looking ahead, Emma Lovett, credit lead for Market DLT at J.P. Morgan, said 2025 marked a regulatory inflection point. A more permissive U.S. backdrop has accelerated experimentation beyond private, permissioned blockchains toward public chains and stablecoin settlement.

“What we started to see in 2025… is the introduction of using public chains and… stable coins for the settlement of traditional securities,” she said, signaling a deeper convergence of TradFi and crypto infrastructure in 2026.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Circle Internet Group faces class action over failure to stop Drift Protocol exploit funds

Published

on

Circle Internet Group faces class action over Drift Protocol exploit
Circle Internet Group faces class action over Drift Protocol exploit
  • Circle is accused of failing to freeze exploit-linked transfers.
  • Approximately $230 million in stolen funds was routed through Circle’s USDC.
  • Drift plans $147.5 million recovery backed by future revenue.

Circle Internet Group, the issuer of the USDC stablecoin, is facing a class action lawsuit over its alleged failure to stop the movement of stolen funds linked to the Drift Protocol exploit.

The lawsuit, filed by Drift investor Joshua McCollum at the US district court in Massachusetts on behalf of over 100 impacted users, centres on whether the company had both the ability and the obligation to intervene as the exploit unfolded.

Lawsuit targets Circle’s role in fund transfers

The legal action stems from the April 2026 breach of Drift Protocol, a Solana-based decentralised exchange, where attackers drained roughly $285 million.

A significant portion of those funds, estimated at around $230 million, was quickly converted into USDC.

From there, the funds were moved across chains, primarily from Solana to Ethereum, using cross-chain infrastructure.

Advertisement

The transfers were not instantaneous. They occurred over several hours and were split into more than 100 transactions.

This detail sits at the centre of the lawsuit.

Plaintiffs argue that Circle had a window of opportunity to act.

According to the claim, the company could have frozen the affected wallets or halted the transfers, limiting the damage. Instead, the funds continued moving until they were fully out of reach.

Advertisement

The case accuses Circle of negligence and of indirectly facilitating the loss by failing to act despite having the technical capability to do so.

This argument is reinforced by previous instances where the company has frozen wallets tied to illicit activity, showing that such intervention is not only possible but already part of its operational toolkit.

At its core, the lawsuit raises a difficult question: when a centralised entity operates within a decentralised system, where does its responsibility begin and end?

Drift’s recovery plan

In response to the exploit, Drift Protocol has outlined a structured recovery plan aimed at addressing user losses while rebuilding the platform’s liquidity and operations.

Advertisement

The protocol is seeking to mobilise up to $147.5 million, with a significant portion backed by Tether and other ecosystem partners.

This figure, however, should not be viewed as immediate compensation.

A large share of the funding comes in the form of a revenue-linked credit facility estimated at around $100 million.

This means the protocol will draw funds over time and repay them using future trading fees and platform revenue rather than distributing the full amount upfront.

Advertisement

To manage user claims, Drift plans to issue a new recovery token, though its official name and final structure are yet to be confirmed.

This token will be distributed to affected users and will represent their share of the recovery pool.

It is expected to be transferable, allowing users to either hold it and wait for gradual repayments or sell it on secondary markets for immediate liquidity, likely at a discount.

The recovery pool itself will not rely solely on external funding.

Advertisement

It is designed to be continuously replenished through multiple sources, including protocol revenue, partner contributions, and any funds that may be recovered from the attackers.

This creates a system where repayments are tied directly to the platform’s ability to restart operations and generate consistent trading activity.

Despite these measures, there remains a clear shortfall.

With total losses estimated at approximately $285 million and recovery efforts targeting up to $150 million, a large portion of user funds is not immediately covered.

Advertisement

This gap highlights that users are unlikely to be fully reimbursed in the near term, and recovery will depend heavily on Drift’s long-term performance.

To support a relaunch, part of the recovery framework is also focused on restoring liquidity.

Incentives and financial support are being directed toward market makers to rebuild order books and improve trading conditions once the platform resumes full operations.

Without sufficient liquidity, even a technically sound relaunch would struggle to attract users back.

Advertisement

Another major shift is the protocol’s decision to move away from USDC as its primary settlement asset and instead adopt USDT.

This change comes after roughly $230 million of the stolen funds were converted into USDC and moved across chains during the exploit.

The switch signals a reassessment of risk and reflects a broader effort to restructure the platform’s core infrastructure following the incident.

Overall, Drift’s recovery plan is built around gradual restitution rather than immediate payouts.

Advertisement

Its success will depend on how quickly the platform can regain user trust, restore liquidity, and generate enough revenue to sustain long-term repayments.

Source link

Advertisement
Continue Reading

Crypto World

Fake Ledger Device Sold Chinese Marketplace: Research

Published

on

China, Ledger, Hardware Wallet, Cybersecurity, Hacks

A Brazilian security researcher has warned others of the latest counterfeit Ledger device scam aimed at stealing users’ crypto.

Posting as “Past_Computer2901” on the “ledgerwallet” Reddit channel on Thursday, the security researcher said they purchased what they thought was a legitimate Ledger device for personal use, but soon realized after it arrived that it was a sophisticated counterfeit aimed at stealing user funds. 

“This isn’t meant to cause panic, but rather to serve as a serious warning — I’m honestly still a bit shaken by the sheer scale of this operation,” they said. 

Scammers are adopting increasingly sophisticated strategies to target users opting for self-custody, from supply chain attacks to social engineering and approval scams.

Advertisement

Earlier this month, more than 50 victims were tricked into revealing their seed phrases on a fake Ledger Live app that made its way to the Apple App Store via a bait-and-switch strategy. The victims lost a combined $9.5 million before Apple took down the malicious app.

How the counterfeit Ledger device scam works

The researcher said he bought the Ledger Nano S Plus from a Chinese marketplace, which was priced the same as the official Ledger store. The packaging and the listing also appeared legitimate at first.

However, when they connected the device to the genuine Ledger Live app — which was luckily already installed on their computer — it failed Ledger’s built-in “Genuine Check.” 

This prompted them to pull apart the device, discovering modified hardware and firmware designed to capture and expose sensitive wallet data.

Advertisement

The security researcher said the scammers target first-time Ledger users, as the QR code that comes in the box would normally direct users to download a malicious version of the Ledger Live app that would show a fake “Genuine Check.”

Users continuing to follow the prompts will eventually allow scammers to obtain a user’s seed phrases and drain funds at any time.

China, Ledger, Hardware Wallet, Cybersecurity, Hacks
Picture of the counterfeit Ledger device being taken apart. Source: Reddit

“Stay safe out there. Only download Ledger Live from ledger.com. Only buy hardware from ledger.com,” the security researcher said. 

“If your device fails the Genuine Check — stop using it immediately.”

After pulling apart the device, they discovered clear signs of tampering, including scraped chip markings and a WiFi and Bluetooth antenna embedded inside the unit. 

Legitimate Ledger hardware products are designed to keep private keys fully offline.

Advertisement

Related: Musician loses $420K Bitcoin ‘retirement fund’ via fake Ledger app

The security researcher then looked into the firmware, putting the “chip into boot mode,” which initially identified the device as a Nano S Plus 7704 with an attached serial number.

However, once the boot sequence completed, another manufacturer’s name showed up: Espressif Systems, a publicly listed Chinese semiconductor company based in Shanghai.

Cointelegraph reached out to Espressif for comment but didn’t receive an immediate response.

Advertisement

Magazine:  What’s a ‘Network State’ and are there real-life examples? Big Questions