According to on-chain observer Ember, recently, a whale/institution transferred the last Ethereum ecosystem tokens (LDO and AAVE) worth $8.94 million
A whale transferred another $8.94 million worth of LDO and AAVE to Binance. Arbitrum plans to allocate 35 million ARB for the RWA development plan and is voting for it. The Opentensor Foundation, the organization behind Bittensor (TAO Coin), identified the root cause of the vulnerability related to the hack. Here's a summary of the latest news from the crypto market.
1. A whale transferred another $8.94 million worth of LDO and AAVE to Binance. According to on-chain observer Ember, recently, a whale/institution transferred the last Ethereum ecosystem tokens (LDO and AAVE) to Binance. This means that this whale’s bet on the Ethereum ETF’s favorable market ended with a loss of $5 million. This whale bought about $52.6 million in ETH ecosystem-related tokens (including LDO, UNI, AAVE, ENS, LINK, FXS, etc.) after the ETH spot ETF’s 19-4 document was approved at the end of May.
2. A whale deposited another 2,100 ETH on Binance. According to tracking by on-chain observer, ‘ai_9684xtpa,’ a whale recently deposited another 2,100 ETH worth $6.56 million on Binance. Today, the address sent 4,165 ETH (worth a total of $13.2 million) at an average reload price of $3,169. If it sells all of it, a profit of $3.99 million will be realized.
3. A multi-signature address transferred 300.000 LINKs to CEX. A multi-signature address recently transferred 300,000 LINKs (worth about $3.9 million) to the GSR Marktes Binance deposit address, according to on-chain monitor ‘ai_9684xtpa. The whale will lose about $1.91 million if it sells this pile.
4. TonUP’s New IDO Project BOOM to be released. BOOM, the new IDO project of TON ecosystem Launchpad platform TonUP, will go live on July 11th. According to the official introduction, BOOM UP is a game-fi project based on the TON Blockchain, accessible via Telegram. Players can enjoy games on mobile devices, while assets are securely stored on the TON Blockchain. The IDO will use a new model to provide two rounds of issuance:
5. Arbitrum plans to allocate 35 million ARB for RWA development plan. The snapshot showed that the Arbitrum RWA development plan nominated six projects and plans to allocate 35 million ARB to them, including Securitize BUIDL 56 (11 million), Ondo USDY 22 (6 million), Superstate USTB 24 (6 million), Mountain USDM 15 (4 million), OpenEden TBill 15 (4 million) and Backed Finance bIB01 17 (4 million). The plan was proposed on April 23rd. It also aims for Arbitrum to provide 1% financial diversification each year through the growth of the RWA ecosystem. The opposition rate to the current proposal is currently as high as 76.8%. This vote will end on July 11th.
6. Lista DAO and BounceBit reach a cooperation agreement. Lista DAO announced a partnership with BounceBit. The former will support BounceBit’s BBTC as collateral and users will be able to borrow lisUSD under Lista’s innovation zone.
7. Bittensor (TAO Coin) detects vulnerability! The Opentensor Foundation (OTF), the organization behind the decentralized artificial intelligence project Bittensor (TAO Coin), has identified the root cause of an $8 million vulnerability in Bittensor wallets. OTF attributed it to a malicious package upload in a post-mortem report. According to the foundation, the attack began at 10:06 a.m. PT on July 2. Furthermore, the attacker transferred funds from the affected Bittensor wallets to his own wallets. OTF detected an “anomaly in the transfer volume” at 10:26 am. It then placed its network validators behind a firewall in “safe mode” at 10:41 am to prevent any nodes from connecting to the Blockchain, halting transactions and giving the team time to investigate.
The Bittensor PyPI package is a Python library that enables interaction with the Bittensor (TAO Coin) network. But the foundation said the malicious version, which appears to be a legitimate Bittensor package, contains code designed to steal private keys. When users downloaded the package and decrypted their keys, the information was sent to a remote server controlled by the attacker, allowing them to steal money from victims.