Connect with us

Crypto World

XRP price dips as $652m in tokens flow to Binance during Iran tensions

Published

on

Terraform bankruptcy administrator sues Jane Street over alleged insider trading

XRP slips about 4% in 24h as $652m flows to Binance amid Iran‑linked risk‑off move.

Summary

  • Around 472m XRP (≈$652m) moved to Binance in a week, the largest February inflow stretch, coinciding with US–Iran tensions.
  • XRP trades roughly $1.3–$1.4, down about 4% daily and over 35% year‑on‑year, while 24h volume holds near multi‑billion levels.
  • On‑chain data shows clustered late‑February exchange inflow spikes, signaling defensive positioning and potential short‑term sell‑side pressure.

XRP (XRP) exchange inflows to Binance have risen sharply, creating potential sell-side pressure as geopolitical tensions involving the United States, Israel and Iran escalate, according to CryptoQuant contributor Darkfost.

The exchange received more than 472 million XRP over the past week, representing what Darkfost described as the largest inflow stretch recorded on Binance for XRP during February, according to data shared by the analyst.

Advertisement

The market reaction intensified following weekend escalations in the Middle East, when strikes were launched shortly after the close of traditional financial markets, Darkfost stated. The timing amplified uncertainty across risk assets, with cryptocurrency markets reacting to the geopolitical developments, according to the analysis.

Chart data shared by Darkfost shows a cluster of unusually large inflow bars in late February, including several daily spikes well above prior February levels, while XRP’s price remained relatively unstable.

“Such inflows typically reflect a more defensive posture from investors holding XRP,” Darkfost wrote. “When large amounts of tokens move onto exchanges, it often signals a potential willingness to sell or at least to position liquidity closer to the market.”

Advertisement

Large transfers onto exchanges often precede increased liquidations or discretionary selling, particularly during broader risk-off periods, according to market observers. The transfers do not confirm outright selling, but shift substantial supply closer to the market during a period of elevated uncertainty.

“When amounts of flows like this are recorded, they can create the conditions for a sudden wave of selling pressure capable of impacting price action in the short term,” Darkfost stated.

The analyst noted that traders should monitor “whether it reflects the start of a broader distribution dynamic on XRP or simply short-term panic movements triggered by geopolitical uncertainty.”

During periods of geopolitical stress, traders typically reduce directional exposure and move assets into venues where they can exit quickly if volatility increases, according to market analysts.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Published

on

Crypto Professionals in the Firing Line as ClickFix Scam Spreads

Crypto hackers attempting to use “ClickFix” attacks to steal crypto have now turned to impersonating venture capital firms and hijacking browser extensions in their two most recent attacks. 

According to a report by cybersecurity firm Moonlock Lab on Monday, scammers are using fake venture capital firms such as SolidBit, MegaBit and Lumax Capital. The hackers are using the firms to contact users via LinkedIn with partnership offers, then funneling them to fake Zoom and Google Meet links. 

When a target clicks the fraudulent link, they are taken to an event page featuring a fake Cloudflare “I’m not a robot” checkbox. Clicking it copies a malicious command to the clipboard and prompts the user to open their computer’s terminal and paste the so-called verification code, which executes the attack.

“The ClickFix technique is what makes the final step so effective,” the Moonlock Lab team said. “By turning the victim into the execution mechanism—having them paste and run the command themselves—the attackers sidestep the very controls the security industry has spent years building. No exploit. No suspicious download.”

Advertisement

Moonlock Lab alleges that a person using the name Mykhailo Hureiev, listed as the co-founder and managing partner at SolidBit Capital, has been a primary point of contact for the initial LinkedIn phase of the scam. Two X users have also reported suspicious conversations with a Hureiev account.

A user under the name Mykhailo Hureiev has allegedly been the primary point of contact for the scam’s initial LinkedIn phase. Source: big dan

However, Moonlock Lab notes that the campaign’s infrastructure is sophisticated and designed to rotate identities as soon as one front is exposed.

Chrome extension hijacked to steal crypto

Meanwhile, crypto hackers have, until recently, been spreading a malicious Chrome extension with a “ClickFix” attack angle.

QuickLens, an extension that lets users run Google Lens searches directly in their browser, was removed from the web store after it was compromised to push malware, John Tuckner, the founder of cybersecurity firm Annex Security, said in a Feb. 23 report.

After QuickLens changed ownership on Feb. 1, a new version was released two weeks later containing malicious scripts that launched ClickFix attacks and other information-stealing tools. Tuckner noted that the extension had around 7,000 users. 

Advertisement
QuickLens was removed from the web store after it was compromised to push malware. Source: Annex Security

The hijacked extension reportedly searched for crypto wallet data and seed phrases to steal funds. It also scraped the contents of Gmail inboxes, YouTube channel data, and other login credentials or payment information entered into web forms, according to a eSecurity Planet report on March 2.

ClickFix attacks are used to target many industries

The ClickFix technique has gained popularity among threat actors since last year, according to Moonlock Lab, because it forces victims to execute the malicious payload manually, bypassing standard security tools.

Related: February crypto losses hit lowest level since March 2025, says PeckShield

However, security researchers have been tracking its use since at least 2024, with targets spanning a wide range of industries. 

Microsoft Threat Intelligence sent out a warning in August last year that it had been tracking “campaigns targeting thousands of enterprise and end-user devices globally every day.”

Advertisement

Meanwhile, cyber threat intelligence company Unit42 reported in July last year that the “relatively new social engineering technique” has been impacting industries such as manufacturing, wholesale and retail, state and local governments, and utilities and energy.

Magazine: Would Bitcoin really be at $200K if not for Jane Street? Trade Secrets