Connect with us

Crypto World

Will XRP price rebound as Brad Garlinghouse predicts $10 trillion flowing to XRPL?

Published

on

xrp price

XRP price continued its downtrend in February despite notable catalysts, including higher ETF inflows than Ethereum and Bitcoin, the launch of the permissioned DEX feature, and substantial inflows of real-world assets.

Summary

  • XRP price dropped into a bear market as the crypto market crash continued.
  • Brad Garlinghouse expects XRPL to have over $10 trillion in assets over time.
  • Technical analysis points to more XRP weakness before rebounding.

Ripple (XRP) token dropped to a low of $1.1137 in February, its lowest level since November 2024, and 70% below its all-time high.

Some key XRP metrics did well in February, even as the crypto market crash gained steam. For example, spot XRP ETFs added close to $60 million in inflows, while Bitcoin and Ethereum funds shed over $206 million and $369 million, respectively.

Advertisement

The XRP Ledger network also experienced strong inflows, with the amount of money in its real-world assets network rising by 10% to $2 billion. That amount is much higher than Solana’s $1.8 billion.

Brad Garlinghouse, Ripple’s CEO, predicted that over $10 trillion in assets would move to the network. 

He cited the ongoing surge in institutional-scale capital and a structural shift in global finance, where most assets are moving on-chain. For example, data compiled by DeFi Llama shows that the total RWA on-chain capital market capitalization has soared to over $20.8 billion.

Advertisement

Some of the top companies that are launching tokenized assets are blue-chip names like BlackRock, WisdomTree, Franklin Templeton, and Fidelity. 

Advertisement

Garlinghouse’s statement came two weeks after the developers launched Permissioned DEX, a tool allowing institutions to park the in the decentralized finance industry in a secure and regulated manner. 

Also, Ripple Labs recently received a banking charter from the Office of the Comptroller of the Currency. As such, it is positioning itself as an all-rounded platform offering various services to companies in the financial services industry.

XRP price technical analysis 

xrp price
Ripple price chart | Source: crypto.news

Technical analysis suggests that the XRP price remains in a technical bear market after plunging by double digits in the past few months. 

Ripple is about to form a mini death cross pattern, which happens when the 50-week and 100-week Exponential Moving Averages cross each other. This is a common bearish continuation sign in technical analysis.

The Relative Strength Index has dropped and is hovering slightly above the oversold level of 30. The Percentage Price Oscillator has also continued falling and is at its lowest level in years. It also formed a big double-top pattern at $3.38 and a neckline at $1.6143.

Advertisement

Therefore, despite its strong fundamentals, there is a likelihood that it will continue falling in the near term. The initial target will be at $1.1137, its lowest level in February. A move below that level will point to more downside, potentially to $1.

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Published

on

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Crypto hackers attempting to use “ClickFix” attacks to steal crypto have now turned to impersonating venture capital firms and hijacking browser extensions in their two most recent attacks. 

According to a report by cybersecurity firm Moonlock Lab on Monday, scammers are using fake venture capital firms such as SolidBit, MegaBit and Lumax Capital. The hackers are using the firms to contact users via LinkedIn with partnership offers, then funneling them to fake Zoom and Google Meet links. 

When a target clicks the fraudulent link, they are taken to an event page featuring a fake Cloudflare “I’m not a robot” checkbox. Clicking it copies a malicious command to the clipboard and prompts the user to open their computer’s terminal and paste the so-called verification code, which executes the attack.

“The ClickFix technique is what makes the final step so effective,” the Moonlock Lab team said. “By turning the victim into the execution mechanism—having them paste and run the command themselves—the attackers sidestep the very controls the security industry has spent years building. No exploit. No suspicious download.”

Advertisement

Moonlock Lab alleges that a person using the name Mykhailo Hureiev, listed as the co-founder and managing partner at SolidBit Capital, has been a primary point of contact for the initial LinkedIn phase of the scam. Two X users have also reported suspicious conversations with a Hureiev account.

A user under the name Mykhailo Hureiev has allegedly been the primary point of contact for the scam’s initial LinkedIn phase. Source: big dan

However, Moonlock Lab notes that the campaign’s infrastructure is sophisticated and designed to rotate identities as soon as one front is exposed.

Chrome extension hijacked to steal crypto

Meanwhile, crypto hackers have, until recently, been spreading a malicious Chrome extension with a “ClickFix” attack angle.

QuickLens, an extension that lets users run Google Lens searches directly in their browser, was removed from the web store after it was compromised to push malware, John Tuckner, the founder of cybersecurity firm Annex Security, said in a Feb. 23 report.

After QuickLens changed ownership on Feb. 1, a new version was released two weeks later containing malicious scripts that launched ClickFix attacks and other information-stealing tools. Tuckner noted that the extension had around 7,000 users. 

Advertisement
QuickLens was removed from the web store after it was compromised to push malware. Source: Annex Security

The hijacked extension reportedly searched for crypto wallet data and seed phrases to steal funds. It also scraped the contents of Gmail inboxes, YouTube channel data, and other login credentials or payment information entered into web forms, according to a eSecurity Planet report on March 2.

ClickFix attacks are used to target many industries

The ClickFix technique has gained popularity among threat actors since last year, according to Moonlock Lab, because it forces victims to execute the malicious payload manually, bypassing standard security tools.

Related: February crypto losses hit lowest level since March 2025, says PeckShield

However, security researchers have been tracking its use since at least 2024, with targets spanning a wide range of industries. 

Microsoft Threat Intelligence sent out a warning in August last year that it had been tracking “campaigns targeting thousands of enterprise and end-user devices globally every day.”

Advertisement

Meanwhile, cyber threat intelligence company Unit42 reported in July last year that the “relatively new social engineering technique” has been impacting industries such as manufacturing, wholesale and retail, state and local governments, and utilities and energy.

Magazine: Would Bitcoin really be at $200K if not for Jane Street? Trade Secrets