Connect with us
DAPA Banner

Crypto World

Ethereum (ETH) Price Analysis: Major Whales Acquire 700K ETH Amid Bullish Technical Signals

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

Key Highlights

  • Large Ethereum holders accumulated approximately 700K ETH from Thursday through Monday
  • Spot ETH ETFs saw continuous inflows for eight days straight, totaling $493.7 million
  • Bitmine acquired 101,627 ETH in their biggest weekly purchase of 2026
  • The SuperTrend technical indicator turned bullish for the first time since the beginning of 2025
  • Negative funding rates persisted for six consecutive days, creating downward pressure below $2,400

Ethereum is currently hovering near $2,300 following a period marked by substantial whale buying activity and robust ETF capital inflows, though futures market dynamics continue to constrain upward price movement.

[[IMG_4]]
Ethereum (ETH) Price

Data from CryptoQuant reveals that addresses containing over 10,000 ETH added close to 700,000 ETH to their holdings from Thursday through Monday. Exchange reserves of Ethereum have declined by approximately 458,000 ETH since Thursday, indicating strengthening demand from buyers.

[[IMG_5]]
Source: CryptoQuant

Institutional participation has also intensified. US-based spot Ethereum ETFs registered their eighth consecutive day of positive net inflows, accumulating a combined $493.7 million, based on data from SoSoValue.

Bitmine Immersion Technologies executed the year’s largest weekly ETH acquisition, purchasing 101,627 ETH. This transaction elevated their aggregate holdings to 4.976 million ETH. Chairman Tom Lee of Bitmine suggested that the cryptocurrency bear market might be nearing its conclusion sooner than market consensus anticipates, referencing historical cycle patterns dating back to 2015.

Lee highlighted that each cryptocurrency bear market since 2015 has aligned with equity market corrections exceeding 20%. By contrast, the 2026 equity pullback measured just 8%, forming the basis of his argument that the present downturn could prove more abbreviated.

Smart money analytics platform Lookonchain identified multiple significant whale movements throughout the week. Among them, a freshly created wallet pulled 35,000 ETH off Binance before moving the assets to custodial service BitGo.

Technical Indicator Turns Positive

Crypto analyst Ali Martinez shared on X that Ethereum’s daily SuperTrend indicator has switched to bullish territory for the first time since the start of 2025. Martinez observed that the previous occurrence of this technical flip was followed by an extended uptrend. He additionally noted that Bitcoin has yet to breach its corresponding SuperTrend resistance threshold.

Advertisement

Derivatives Market Creates Headwinds

Notwithstanding robust demand in spot markets, Ethereum funding rates remained in negative territory for six consecutive days. This condition indicates that derivatives market participants maintain a bearish stance, contributing to price weakness below the $2,400 level.

Over the preceding 24-hour period, ETH experienced $53.4 million in total liquidations. Long position liquidations accounted for the majority at $28.4 million.

Examining the four-hour timeframe, ETH is positioned above its 20-period, 50-period, and 100-period exponential moving averages, which are grouped between $2,268 and $2,323. Immediate resistance is located at $2,388, while support levels are found at $2,267 and $2,263.

Advertisement

The 14-day Relative Strength Index registers 55, suggesting a slight advantage for buyers over sellers. Conversely, both the 9-day Stochastic and 14-day Stochastic RSI oscillators are positioned around 40, indicating diminishing upward momentum.

Over the past 30 days, ETH has climbed from approximately $2,155 to above $2,320, though it has retreated roughly 2% on the weekly timeframe from a peak of $2,450.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

AI floods crypto bug bounty programs with reports and false alarms

Published

on

OpenClaw enforces zero-crypto rule after scam fallout

Crypto teams are seeing a rise in bug bounty submissions as artificial intelligence tools make it easier to scan code and draft reports. 

Summary

  • Crypto teams say AI has sharply increased bug bounty submissions while false positives are rising too.
  • Cosmos Labs reported a 900% jump in submissions, forcing stricter review and triage processes.
  • Developers say defensive AI may help teams filter weak bug reports and find real threats.

At the same time, many protocols say the growing volume includes more low-quality or inaccurate findings, which is making review work harder.

Bug bounty programs reward security researchers for reporting software flaws before attackers exploit them. In crypto, these programs have become a common part of security efforts because protocols often manage large amounts of user funds and operate through open-source code.

Advertisement

Barry Plunkett, co-CEO of Cosmos Labs, said AI is changing how bug bounty programs work. He said the company’s program saw a sharp rise in volume over the past year.

“Our program has seen a 900% increase in submission volume from last year, on the order of 20-50 per day,” Plunkett noted.

He added that the rise included both valid and invalid reports, creating more work for teams trying to separate real issues from weak claims.

Kadan Stadelmann, chief technology officer at Komodo Platform, also said he has seen growth in bug bounty submissions and payouts across organizations. He said some recent reports appeared to be low quality and in some cases may have been false positives.

Advertisement

”There has definitely been an increase in low-quality bug bounty submissions, some of which have been false positives, potentially suggesting AI sourcing,” Stadelmann told Cointelegraph.

He added that AI may have lowered the cost and effort required to produce a report, leading to more submissions.

AI helps researchers but adds more noise

AI tools can help researchers review large amounts of code and point to possible vulnerabilities more quickly. That has made it easier for security researchers to join bounty programs and send findings to protocols.

However, AI systems can also generate inaccurate results. In bug bounty work, that can mean teams receive reports that sound technical but do not describe real flaws. This adds pressure on developers and security staff who must review each claim.

The wider trend is visible beyond crypto. In January, Daniel Stenberg, creator of the open-source tool curl, said he was ending his bug bounty program after dealing with what he described as an influx of ”AI slop in vulnerability reports.”

Advertisement

HackerOne, one of the largest bug bounty platforms, reported in January that it recorded 85,000 valid bounty submissions in 2025. That figure was up 7% from the previous year.

Platforms tighten review standards

As submission volumes rise, some crypto teams are changing how they run bounty programs. Plunkett said Cosmos Labs has tightened how it scores incoming reports and now gives more weight to trusted researchers with a strong record.

He also said the company is working with bug bounty providers that offer more advanced triage support. That step is meant to help reduce the time spent reviewing weak or duplicate submissions.

These changes show that teams are trying to keep bounty programs useful while managing the extra load created by AI-assisted reporting. Programs still need outside researchers, but they also need stronger filters.

Advertisement

Security teams may turn to AI for defense

Stadelmann said AI may also become part of the answer. He said smaller teams may struggle most because they have fewer engineers available to review large numbers of submissions.

”Blockchain teams will have to create AI deterrents to sift through incoming bug bounties,” He said.

He added that defensive AI systems could help sort reports and reduce the burden on internal teams.

Stadelmann also said protocols may need stricter standards for submissions to lower the number of weak reports. As AI tools spread, bug bounty programs are likely to stay active, but teams may need new processes to manage the growing flow.

Advertisement

Source link

Continue Reading

Crypto World

Umbra privacy protocol blocks front-end to deter Kelp exploiters

Published

on

Crypto Breaking News

Privacy-preserving crypto protocol Umbra has pulled its front-end hosting offline in a bid to complicate misuse by hackers who have been moving funds from recent high-profile breaches. The move comes as Umbra disclosed that roughly $800,000 worth of stolen funds were routed through its protocol, a signal that attackers continue to exploit cross-chain bridges and related services despite ongoing security efforts.

In a post on X, Umbra said it had transitioned the hosted front end into maintenance mode and would bring it back online only when it can be done without disrupting recovery efforts. The team stressed that the decision was a precaution aimed at safeguarding the recovery process while acknowledging that the open-source nature of its front end means other implementations could still be used by malicious actors.

Key takeaways

  • Umbra paused its hosted front end to hinder attacker use, citing approximately $800,000 in stolen funds moved through its protocol.
  • The development follows a high-profile sequence of exploits, including the Kelp protocol breach that netted around $280 million, with investigators suspecting North Korean actors were involved.
  • Despite the suspension, Umbra emphasized that on-chain activity and self-hosted or locally deployed interfaces remain possible, underscoring the limits of front-end restrictions.
  • Analysts and commentators warn that front-end freezes alone may not satisfy regulators or prosecutors who view interface changes as indicative of broader control over a protocol.
  • Ambiguity persists about how to balance privacy objectives with anti-fraud and sanctions enforcement in decentralized systems.

Umbra’s action in a shifting security landscape

Umbra’s decision to take its front end offline highlights a growing debate about defensible responses when breaches spill over into the tooling that users rely on most. The targeted move aims to reduce the surface area hackers can exploit for money movement tied to the latest breaches, according to Umbra’s statement. The project noted that the protocol “protects the identity of the receiver, not the sender,” a distinction it says does not assist hackers trying to conceal fund trails. It also stressed that every stolen fund routed through its contracts can be identified, and that it has been collaborating with security researchers involved in the investigation.

In parallel, security researchers and industry observers have repeatedly warned that the tokenized services bridging assets across networks remain a common vector for theft. The Kelp breach, which saw illicit gains reach hundreds of millions of dollars, has intensified scrutiny of cross-chain activity and the ways in which attackers pivot across networks to move funds. PeckShield and other monitoring outfits have flagged Umbra as a target of interest for opportunistic attackers attempting to bridge stolen Ether into Bitcoin and other assets, underscoring the ongoing liquidity risk within the bridge ecosystem.

The front end debate: is a UI pause enough?

Roman Storm, a co-founder of the crypto mixer Tornado Cash, has argued that a temporary freeze on the front end may not be sufficient to placate authorities or deter illicit use. Storm’s comments reference his own legal battles over sanctions-related charges, where prosecutors characterized control over a protocol as equivalent to controlling its operations. He has argued that limiting user interfaces may be read as exerting influence over a broader system, raising questions about what constitutes meaningful control in decentralized architectures.

Advertisement

Umbra’s own note touched on this tension, noting that the protocol’s core remains usable through smart contracts and, in many cases, through self-hosted front ends. The company asserted that even if the hosted front end goes offline, attackers could still access the open-source components if they choose to deploy their own interfaces or use local deployments. The broader implication is that while operators can reduce risk through UI changes, the core protocol’s code and governance remain the ultimate locus of control—and the primary determinant of how funds move once a user interacts with the protocol on-chain.

Privacy versus enforcement: what changes for users and investigators?

Umbra’s framing of its front-end pause as a protective measure for recovery efforts reflects a nuanced approach to privacy-preserving design. The project reiterated that its technology is intended to protect recipient anonymity, rather than to obscure the sender’s trail. In practice, this means that investigators and security researchers can, with cooperation and the right tools, trace flows of stolen funds even when they pass through privacy-centric constructs. Umbra’s statement that all stolen funds can be identified when appropriate signals and data are available is consistent with ongoing industry norms that seek a balance between user privacy and fraud prevention.

For investors and builders, the incident reinforces a persistent theme in crypto: even advanced privacy protocols operate within a broader ecosystem where law enforcement, sanctions regimes, and compliance expectations shape what is feasible in practice. The ongoing sanctions regime targeting North Korean cyber actors adds a layer of regulatory risk to the activity around cross-chain platforms and mixers, as authorities increasingly couple enforcement actions with industry-wide stances against funding networks linked to sanctioned entities.

What to watch next

As recovery efforts continue, observers will be watching for updates on when and how Umbra will restore front-end access without compromising investigators’ ability to trace and recover funds. The episode also raises questions about the durability of privacy-first designs in the face of coordinated enforcement and incident response. Other protocols with similar privacy-centric aims may reassess their own front-end exposure, governance processes, and incident-response playbooks in light of Umbra’s experience.

Advertisement

In the near term, market participants should monitor whether other bridges and privacy-focused contracts adjust their public interfaces or deploy additional mitigations to reduce exploit risk. Regulators and prosecutors will likely keep a close eye on how developers balance user privacy with the need to curb illicit finance, particularly as high-profile attacks continue to test the resilience of cross-chain ecosystems.

Ultimately, the event underscores a core dynamic in the crypto security landscape: improvements in on-chain privacy and usability must be matched by robust off-chain collaboration, transparent communications, and adaptable incident response plans if communities are to navigate the evolving threat environment without stifling innovation.

readers should stay tuned for further disclosures from Umbra and for subsequent analyses from security researchers detailing how such vulnerabilities are being addressed and what this portends for the broader privacy-centric segment of DeFi.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading

Crypto World

Volo Protocol loses $3.5 million in exploit days after KelpDAO’s breach

Published

on

Russia-linked Grinex exchange halts operations after $13 million ‘state-backed’ hack

Another day, another exploit. The security crisis in blockchain-based decentralized finance (DeFi), once touted as a challenger to legacy infrastructure, is only getting worse.

The latest victim is Volo Protocol, a platform built on the Sui blockchain, where users deposit assets into yield-generating “vaults,” which function as pooled investments. Deposited tokens such as bitcoin, stablecoins and tokenized assets are deployed using various onchain strategies to generate returns.

Early Wednesday, the protocol confirmed a security breach that drained a total of roughly $3.5 million in digital assets from three of the vaults. Assets locked in other vaults were not affected, it said in a post on X.

“The ~$28M in TVL across all other Volo vaults is safe. The exploit was isolated to 3 specific vaults, and we have confirmed no shared attack vector exists with the remaining vaults,” the protocol said, adding that it is “prepared to absorb” the financial loss rather than pass it on to users.

Advertisement

The attack hit vaults holding wrapped bitcoin (WBTC), Matridock’s tokenized gold token, XAUm, and the dollar-pegged stablecoin USDC. In response, the protocol froze all vaults and began working with the Sui Foundation and onchain investigators to contain the damage and trace funds.

Since the incident, Volo has “frozen” $500,000 in assets through coordination with ecosystem partners, meaning those funds have been immobilized onchain to prevent any movement or withdrawal. Still, the majority of the stolen funds remain under investigation.

Growing unease

The breach adds to growing unease across decentralized finance, where a string of exploits has raised questions about smart contract security and protocol oversight. The timing is particularly sensitive, coming just days after the weekend’s KelpDAO exploit, in which an attacker drained millions by artificially minting unbacked liquid restaking tokens, rsETH.

The aftermath has rippled across the DeFi, triggering collateral damage in multiple protocols, including leading lending platform Aave, where users rushed to withdraw funds because of the heightened uncertainty.

Advertisement

To date, decentralized finance has suffered roughly $7.78 billion in hacks, according to data from DeFiLlama. Bridge protocols — which enable the transfer of assets across blockchains — account for another $2.90 billion in losses. Combined, the figure exceeds $10 billion, roughly equivalent to the market capitalization of cryptocurrencies ranked between 10th and 15th globally.

Volo says it will publish a full post-mortem once its investigation is complete and remediation steps are finalized.

But for DeFi users and investors, a broader pattern is becoming harder to ignore: while institutional adoption is accelerating, relatively little of that capital appears to be flowing into improving security, with exploits continuing to arrive in clusters.

Read more: The $13 billion DeFi wipeout in two days, and it started with KelpDAO attack

Advertisement

Source link

Continue Reading

Crypto World

Justin Sun Takes Legal Action Against World Liberty Financial Over Frozen Crypto Holdings

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR

  • Justin Sun, founder of Tron, initiated legal proceedings against World Liberty Financial in California’s federal court system
  • The lawsuit alleges WLFI improperly froze Sun’s token holdings, stripped voting privileges, and issued threats to destroy his assets
  • Sun attempted private resolution before pursuing litigation
  • A new governance measure would permanently lock tokens of holders who don’t consent to new terms
  • Sun maintains his support for President Trump’s cryptocurrency initiatives despite the legal conflict

Justin Sun, the blockchain entrepreneur behind Tron, has initiated legal proceedings against World Liberty Financial—a cryptocurrency venture supported by the Trump family—in California’s federal court.

According to Sun’s complaint, the World Liberty Financial team improperly locked his token holdings, eliminated his governance voting capabilities, and issued threats to permanently destroy his investment without providing adequate justification.

Sun maintains he pursued private negotiation channels before resorting to legal action. When the WLFI management refused to restore access to his frozen assets, he determined that litigation was his only remaining recourse.

Previously recognized as World Liberty Financial’s most significant external investor, Sun has now emerged as the project’s most outspoken detractor.

Advertisement

On April 12th, Sun made public allegations that WLFI developers had secretly incorporated a blacklist mechanism within the project’s smart contract infrastructure. This hidden functionality, he asserts, grants the development team authority to freeze, limit, and essentially seize investor assets.

World Liberty Financial addressed these accusations on their social channels, dismissing them as “baseless allegations” and portraying Sun as someone “playing the victim.” The organization suggested imminent legal proceedings with the statement: “See you in court pal.”

The Governance Dispute

The situation intensified following World Liberty‘s April 15th release of a governance resolution. This measure proposes converting more than 62 billion WLFI tokens from unlimited lockup periods into predetermined vesting timelines.

The resolution establishes that founders, development personnel, and advisors would face a two-year token freeze, followed by incremental distribution across three additional years. Additionally, a 10% token destruction would occur upon proposal approval.

Investors declining to accept these revised conditions would see their holdings locked permanently under the current framework.

Advertisement

Sun characterized the resolution as “one of the most absurd governance scams” he’s encountered. He contends it masquerades as a governance initiative while actually functioning as an investor trap for those who don’t actively participate.

Due to his frozen token status, Sun reports he’s completely unable to participate in the voting process—neither in support nor opposition.

Sun Still Backs Trump Despite Legal Fight

Sun emphasized through his public statements that this legal action doesn’t represent opposition to President Trump or his administration’s initiatives.

“Unfortunately, certain individuals on the World Liberty project team have been operating the project in a manner that goes against President Trump’s values,” Sun wrote.

Sun reportedly ranks among the top holders of the TRUMP memecoin. This substantial investment secured him access to an exclusive cryptocurrency gala dinner in May 2025, where he received a commemorative watch during the event.

Analytical data from CoinCarp reveals 642,882 holders of the TRUMP memecoin currently exist. More than 91% of total supply concentration resides within the top 10 wallet addresses.

Advertisement

World Liberty Financial has not issued any official statement regarding the lawsuit when approached by journalists.

Source link

Advertisement
Continue Reading

Crypto World

Mastercard Joins Blockchain Security Standards Council Alongside Coinbase and Fireblocks

Published

on

Mastercard Joins Blockchain Security Standards Council Alongside Coinbase and Fireblocks

Mastercard has joined the Blockchain Security Standards Council (BSSC) as a Charter-level member. The payments company will help shape security frameworks for blockchain networks and tokenized assets.

The announcement arrived on April 21, 2026, from Wakefield, Massachusetts. Mastercard will also join working groups that focus on security and privacy guidelines.

A Payments Giant Deepens Its Blockchain Commitment

The BSSC operates as a nonprofit consortium. It builds audit frameworks and security standards for digital asset ecosystems.

Mastercard joins a roster that already includes Coinbase, Fireblocks, and Anchorage Digital. BitGo, Figment, and Ribbit Capital also sit on the council.

Advertisement

Meanwhile, Claire Le Gal will represent Mastercard on the BSSC board. She leads Integrity and Standards at the firm’s Security Solutions unit.

Her team handles fraud prevention, cyber resilience, disputes, and threat intelligence. Therefore, her input should carry weight inside the council’s working groups.

Adam Rak serves as the council’s Executive Director. He called Mastercard’s payments experience valuable for setting strong blockchain security rules.

“Part of my job is to make life difficult for criminals,” Claire Le Gal, Mastercard Senior Vice President, said.

Why the Move Matters for Institutional Adoption

Mastercard already runs the Multi-Token Network and Crypto Credential products. Both aim to embed trust into blockchain and tokenized infrastructure.

Advertisement

The company launched Crypto Credential in 2023 to replace complex wallet addresses with simple aliases. In addition, the BSSC publishes its General Security and Privacy standard for blockchain operators.

However, fragmented security practices remain a hurdle for institutional capital. Unified standards could therefore speed up TradFi participation across digital asset markets.

The move signals that traditional finance now treats blockchain as critical infrastructure. Consequently, shared security rules look less optional and more essential.

Mastercard’s security team will feed guidance into BSSC working groups. Moreover, the company plans to share operational insights from decades of payments risk management.

Advertisement

The coming months will show whether the council’s standards gain traction beyond member firms. For now, blockchain governance has gained a major institutional voice. The BSSC can also point to Mastercard as proof that legacy finance wants to help write the rules.

The post Mastercard Joins Blockchain Security Standards Council Alongside Coinbase and Fireblocks appeared first on BeInCrypto.

Source link

Advertisement
Continue Reading

Crypto World

U.S. military commander flags Bitcoin’s cybersecurity role in Senate hearing

Published

on

Bitcoin exchange supply hits record low even as Winklevoss twins move $130M BTC

A senior U.S. military commander has described Bitcoin as a cybersecurity tool with potential use in national defense.

Summary

  • A U.S. military commander said Bitcoin can function as a cybersecurity tool, noting its proof-of-work design raises the cost for potential attackers.
  • Lawmakers examined Bitcoin’s role in national security during a Senate hearing focused on Indo-Pacific threats and cyber risks from state-linked actors.

At a Senate Armed Services Committee hearing on Tuesday, Samuel Paparo said Bitcoin’s role goes beyond financial use cases and can support security systems tied to U.S. strategic interests.

“It is a valuable computer science tool, as a power projection,” Paparo said, adding that the network’s proof of work design “imposes more cost” on attackers attempting to interfere with it. 

Advertisement

“Outside of the economic formulation of it, it has got really important computer science applications for cybersecurity.”

The hearing focused on the U.S. military’s posture in the Indo-Pacific, with discussions spanning ongoing conflicts in Ukraine and the Middle East, China’s military activity, and threats linked to North Korea.

Paparo’s remarks follow earlier comments from Jason Lowery, who has argued that proof-of-work networks can be used to secure digital systems in a cyber conflict. He said Bitcoin is often seen only as a monetary system, while its design can also secure “all forms of data, messages, or command signals.”

Advertisement

State-linked cyber operations have increased in recent years, with attacks such as ransomware, phishing, and denial of service targeting infrastructure and financial systems. The Lazarus Group remains one of the most prominent examples, having stolen billions in crypto over the past decade, funds that U.S. officials say have supported North Korea’s nuclear program.

Paparo’s comments came after Tommy Tuberville asked how the U.S. could lead in Bitcoin-related competition, noting that Chinese policy groups are also examining the asset as a strategic tool. Paparo did not directly address policy steps but pointed to Bitcoin’s underlying structure.

“Bitcoin is a reality. It is a peer to peer zero trust transfer of value. Anything that supports all instruments of national power for the United States of America is to the good,” he said.

Concern over reliance on foreign-made mining hardware has also drawn attention in Washington, even as the U.S. holds the largest Bitcoin reserves among nation states and a significant share of global hashrate.

Advertisement

Last month, Bill Cassidy and Cynthia Lummis introduced the Mined in America Act, aimed at expanding domestic production of Bitcoin mining equipment. The proposal also seeks to formalize the Strategic Bitcoin Reserve established under an executive order signed by Donald Trump.

Source link

Advertisement
Continue Reading

Crypto World

Kelp Exploiter Moves $175M of Stolen Funds: Arkham

Published

on

Kelp Exploiter Moves $175M of Stolen Funds: Arkham

The attacker behind the roughly $290 million Kelp DAO exploit began moving tens of thousands of Ether to newly created blockchain addresses on Tuesday, in what appears to be an effort to start laundering the stolen funds.

The wallet tagged by Arkham as linked to the Kelp DAO exploit moved about 75,700 Ether (ETH) worth roughly $175 million across three transactions on Tuesday, including a 25,000 ETH transfer to one newly created address and transfers of 50,700 ETH and 0.7 ETH to another.

Blockchain investigator ZachXBT wrote in a Tuesday Telegram post that addresses tied to the exploit had begun moving funds through THORChain and Umbra. He flagged three THORChain transactions totaling about $1.5 million and a separate $78,000 transfer through Umbra.

On Saturday, an attacker drained about 116,500 restaked Ether (rsETH), worth roughly $290 million to $293 million at the time, from Kelp DAO’s LayerZero-powered rsETH bridge.

Advertisement

LayerZero said Kelp DAO’s 1/1 decentralized verifier network (DVN) setup created a single point of failure by relying on a single verifier path for cross-chain messages. LayerZero said it had previously advised against that configuration.

Fallout spreads across DeFi

The transfers came hours after Arbitrum said its 12-member security council had taken emergency action to freeze 30,766 ETH tied to the exploit and move the funds into an “intermediary frozen wallet” accessible only through Arbitrum governance.

Kelp DAO attacker-tagged wallet, latest transactions. Source: Arkham 

The exploit also hit other DeFi protocols, including Aave, where the attacker used the stolen funds as collateral to borrow against the protocol. Early estimates put the hole at about $195 million, but Aave’s Monday incident report later outlined two potential outcomes: roughly $123.7 million in bad debt under one scenario and about $230.1 million under another.

The transfers suggest the attackers had begun moving funds through non-custodial protocols that can complicate tracing and recovery. THORChain does not require traditional Know Your Customer checks.

During the $1.4 billion Bybit hack in 2025, attackers converted about 83% of the stolen Ether into Bitcoin (BTC), with 72% of the funds moving through THORChain, according to Bybit CEO Ben Zhou. Zhou said at the time that 77% of the stolen funds were still traceable.

Advertisement

Related: ZachXBT asks MemeCore to explain valuation and token supply

Aave unfreezes Ethereum V3 market as borrow rates spike

On Tuesday, Aave said it had unfrozen Wrapped Ether (WETH) reserves on the Ethereum Core V3 market, enabling users to supply WETH to the V3 lending protocol once again. However, WETH reserves across Ethereum Prime, Arbitrum, Base, Mantle and Linea remain frozen.

Source: Julio Moreno

Meanwhile, the thinning liquidity saw Aave’s borrowing rates for USDt (USDT) rise from 3% to 14%, marking the highest figures since December 2024, wrote Julio Moreno, the head of research at analytics platform CryptoQuant, in a Monday X post.

Fears over a potential contagion caused significant outflows from Aave, as its total value locked (TVL) fell by about $10 billion since the exploit to $16.4 billion as of Tuesday, DefiLlama data shows.

Magazine: 53 DeFi projects infiltrated, 50M NEO tokens could be ‘given back’: Asia Express

Advertisement