Category: Cryptocurrency News

Cryptocurrency News and Public Mining Pools

VanEck files for AVAX ETF

Global investment manager VanEck has filed for an Avalanche (AVAX) exchange-traded fund (ETF) with the US Securities and Exchange Commission (SEC) seeking to offer investors direct exposure to the smart contract platform. A snippet of the S-1 filing was shared on social media on March 14 by Bloomberg analyst James Seyffart, who has been closely monitoring developments in the crypto ETF industry.Source: James SeyffartThe proposed VanEck Avalanche ETF intends to “reflect the performance of the price of “AVAX,” the native token of the Avalanche network, less the expenses of the Trust’s operations,” the prospectus read. The proposed fund will hold AVAX and will “value its Shares daily based on the reported MarketVector Avalanche Benchmark Rate,” the prospectus said.As Seyffart noted in a follow-up post, the Trust’s registration “was shared widely […] earlier this week, But this is the first actual filing with the SEC.”Avalanche is the 16th largest crypto asset, with a total market capitalization of $7.7 billion. The blockchain is notable for its high throughput and Ethereum Virtual Machine (EVM) compatibility. Related: US Bitcoin ETFs break outflow streak with $13.3M inflowETF race heats upThe overwhelming success of the US spot Bitcoin (BTC) exchange-traded funds and the election of a pro-crypto administration in Washington have triggered an influx of crypto fund applications at the SEC.As Cointelegraph recently reported, nine issuers have filed for an XRP (XRP) ETF, with Franklin Templeton joining the race on March 11. Issuers are also vying to list ETFs linked to Solana (SOL), Litecoin (LTC) and Dogecoin (DOGE).Although the SEC has punted its decision on these offerings, opting to designate a longer period for review, Seyffart and fellow Bloomberg analyst Eric Balchinas say there are “relatively high odds of approval” later this year. A January report by JPMorgan said the approval of altcoin ETFs will likely trigger billions of dollars in inflows, underscoring the pent-up demand for cryptocurrencies. In particular, SOL and XRP products could attract the most institutional interest.Assuming modest adoption rates, SOL and XRP ETFs could attract billions in their first 12 months. Source: JPMorgan“When applying these so-called “adoption rates” to SOL and XRP, we see SOL attracting roughly $3 billion-$6 billion of net assets and XRP gathering $4 billion-$8 billion in net new assets,” the report said.Related: US Bitcoin ETF assets break $100 billion

VanEck files for AVAX ETF

Global investment manager VanEck has filed for an Avalanche (AVAX) exchange-traded fund (ETF) with the US Securities and Exchange Commission (SEC) seeking to offer investors direct exposure to the smart contract platform. A snippet of the S-1 filing was shared on social media on March 14 by Bloomberg analyst James Seyffart, who has been closely monitoring developments in the crypto ETF industry.Source: James SeyffartThe proposed VanEck Avalanche ETF intends to “reflect the performance of the price of “AVAX,” the native token of the Avalanche network, less the expenses of the Trust’s operations,” the prospectus read. The proposed fund will hold AVAX and will “value its Shares daily based on the reported MarketVector Avalanche Benchmark Rate,” the prospectus said.As Seyffart noted in a follow-up post, the Trust’s registration “was shared widely […] earlier this week, But this is the first actual filing with the SEC.”Avalanche is the 16th largest crypto asset, with a total market capitalization of $7.7 billion. The blockchain is notable for its high throughput and Ethereum Virtual Machine (EVM) compatibility. Related: US Bitcoin ETFs break outflow streak with $13.3M inflowETF race heats upThe overwhelming success of the US spot Bitcoin (BTC) exchange-traded funds and the election of a pro-crypto administration in Washington have triggered an influx of crypto fund applications at the SEC.As Cointelegraph recently reported, nine issuers have filed for an XRP (XRP) ETF, with Franklin Templeton joining the race on March 11. Issuers are also vying to list ETFs linked to Solana (SOL), Litecoin (LTC) and Dogecoin (DOGE).Although the SEC has punted its decision on these offerings, opting to designate a longer period for review, Seyffart and fellow Bloomberg analyst Eric Balchinas say there are “relatively high odds of approval” later this year. A January report by JPMorgan said the approval of altcoin ETFs will likely trigger billions of dollars in inflows, underscoring the pent-up demand for cryptocurrencies. In particular, SOL and XRP products could attract the most institutional interest.Assuming modest adoption rates, SOL and XRP ETFs could attract billions in their first 12 months. Source: JPMorgan“When applying these so-called “adoption rates” to SOL and XRP, we see SOL attracting roughly $3 billion-$6 billion of net assets and XRP gathering $4 billion-$8 billion in net new assets,” the report said.Related: US Bitcoin ETF assets break $100 billion

Stablecoins Supply Up By $20 Billion – The Key To Bitcoin’s Next Move?

Early in 2025, there was a significant surge in the stablecoin market, with a $20 billion increase in total supply. With a 10% increase from January, the total supply now stands at almost $205 billion. The spike, according to data from Glassnode, comes after a dip in late 2024, when the supply of stablecoins fell from $187 billion to $185 billion. Related Reading: Bitcoin And S&P Decline Together, But Data Predicts A Turnaround Stablecoins See A Strong Rebound For trading cryptocurrencies, stablecoins—like USDT and USDC—often act as a reserve for investors expecting the right time to buy assets like Bitcoin. The most recent rise shows that investor interest has surged, especially in view of last year’s slow down. Since Jan 1, the aggregate #stablecoin supply has increased by $20.17B (+10.9%), now reaching more than $205B. For comparison, the December peak clocked in at $187B but the supply actually contracted in the last two weeks of 2024 and dropped to $185B by January 2025. pic.twitter.com/gQbdMEDisb — glassnode (@glassnode) March 13, 2025 Given the previous fall, this comeback is especially notable. For most of 2024 the market has been losing stablecoins; but, this trend has lately reversed. Although past patterns suggest that Bitcoin’s price may be impacted, it is unknown whether this increase will lead to a rise in purchases of cryptocurrencies. Bitcoin Investors Watching Closely A growing stablecoin supply is often seen as a bullish sign for Bitcoin. Historically, the price of Bitcoin has risen in line with the stablecoin count. The reasoning is simple: more stablecoins mean more potential capital just waiting to be entered into the market. Some analysts believe this fresh injection could push Bitcoin higher. However, not all stablecoins are used for trading. Many are held for remittances, payments, or as a hedge against inflation, especially in countries where local currencies are unstable. As of today, the market cap of cryptocurrencies stood at $2.65 trillion. Chart: TradingView Stablecoin Exchange Holdings Drop 21% While the total supply is rising, only 21% of stablecoins are currently sitting on exchanges. This is a significant drop from 2021, when over 50% of the supply was available for immediate trading, Glassnode disclosed. This shift suggests that while new coins are being issued, they are not all being deployed into crypto markets right away. Related Reading: TRUMP Token Takedown—Did Insiders Plan The Crash? This could point to one of two possibilities: either stablecoins are being used more often outside of exchanges or investors are still waiting for the suitable moment. Should the latter prove right, the impact on Bitcoin could be less notable than expected. What This Means For Bitcoin’s Future The stablecoin market is currently experiencing a resurgence, which is generally a favorable development for the cryptocurrency sector. However, it is uncertain whether this will result in a short-term increase in the price of Bitcoin. Stablecoin utilization has fluctuated, and additional economic variables will contribute to this development. At the time of writing, Bitcoin was trading at 82,264, down 1.1% and 6.9% in the daily and weekly frames. Featured image from Warwick Business School, chart from TradingView

James Howells Loses Appeal to Dig Up Landfill for $675 Million Bitcoin Hard Drive

submitted by /u/goldyluckinblokchain [link] [comments]

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity