Bitcoin whales dominate accumulation as BTC holds near $80,000
Large Bitcoin holders, commonly referred to as whales, have emerged as the dominant buyers while Bitcoin trades in the $80,000 price range. New on-chain data shows that wallets holding significant amounts of BTC are absorbing supply at a faster pace than smaller retail investors.
Market analysts note that this accumulation trend has intensified during periods of sideways price action. While short-term traders reduced exposure amid volatility, long-term holders increased their positions, signaling confidence in Bitcoin’s medium- to long-term outlook.
Whales absorb supply during consolidation
On-chain metrics indicate that wallets holding between 1,000 and 10,000 BTC recorded steady net inflows as Bitcoin hovered near $80,000. These entities often include institutional investors, funds, and early adopters with high conviction strategies.
Analysts explain that whale accumulation during consolidation phases historically reduces available supply on exchanges. As coins move from liquid trading venues into long-term storage, selling pressure declines, which can create conditions for future price expansion if demand increases.
Smaller holders, by contrast, showed more mixed behavior. Retail wallets displayed periods of distribution, likely driven by profit-taking and sensitivity to short-term market swings.
Institutional behavior shapes the market
The growing influence of institutional participants continues to reshape Bitcoin’s market structure. Since the approval of spot Bitcoin exchange-traded products in major jurisdictions, large investors have gained easier access to BTC exposure.
This structural shift means that price movements increasingly reflect strategic capital allocation rather than speculative retail flows. Analysts argue that whale-driven accumulation at elevated price levels suggests expectations of higher valuations over the next market cycle.
At the same time, institutional participation has contributed to tighter liquidity conditions. With a larger share of Bitcoin held by entities less likely to trade frequently, sudden demand spikes can have an outsized impact on price.
Key levels and market outlook
Technically, the $80,000 level has become an important psychological and structural zone. Bitcoin repeatedly tested this range without sustained breakdowns, reinforcing it as a support area watched closely by traders.
If whale accumulation continues and macro conditions remain stable, analysts see potential for Bitcoin to challenge higher resistance levels in early 2026. However, they caution that external factors such as interest rate expectations, regulatory developments, and broader risk sentiment could still influence short-term price action.
For now, the data points to a market where large holders quietly build positions while volatility compresses. Historically, similar patterns have preceded major directional moves.
Whether this accumulation phase leads to another breakout or an extended consolidation remains uncertain. What is clear is that whales are once again playing a decisive role in shaping Bitcoin’s trajectory at a critical price level.
Source: Coindesk
Ethereum’s ZK-tech push in 2026 could unlock exponential scaling
Ethereum (ETH) is on the cusp of a fundamental transformation that could see its core blockchain scale exponentially in 2026 by using zero-knowledge (ZK) proofs, according to recent protocol updates and developer commentary.
The planned shift will allow Ethereum validators to check small ZK proofs instead of re-executing every transaction, radically lowering computational requirements and increasing throughput. This technical evolution aims to bring the network closer to an eventual target of around 10,000 transactions per second (TPS), compared with roughly 30 TPS today.
What changed and why it matters
Under Ethereum’s current validation model, each validator must re-execute every transaction in every block. This ensures decentralization and security but significantly limits throughput. With the new approach, validators will verify cryptographic proofs that attest to the correctness of transaction execution. This is far lighter work and could be done using low-spec hardware including old laptops and even smart devices.
Researcher Justin Drake demonstrated at EthProofs Day during Devconnect that small ZK proofs can already be validated on modest hardware. His work underscores the practical feasibility of the concept, which previously existed mainly as theoretical research.
Protocol engineer Gary Schulte explained that this model lets block builders and ZK provers do the heavy cryptographic work, while the majority of validators only perform the lightweight verification checks. This division could enable the gas limit to rise without excluding home validators with lower computing power.
Developers and analysts liken the importance of this upgrade to Ethereum’s Merge in 2022, when the network transitioned from proof-of-work to proof-of-stake. That event dramatically reduced energy use and set the stage for future scaling. The ZK transition could be similarly foundational because it targets the core throughput constraint.
Rollout timeline and adoption phases
Ethereum’s transition to ZK proof validation will be phased. In 2026, an optional switch is expected, where roughly 10 % of validators might adopt ZK proof verification by year-end. This early adoption period will help kickstart scaling effects for Layer-1 without forcing an abrupt network-wide change.
The protocol upgrade known as Glamsterdam will play a central role in enabling this transition. One of its key features is the removal of penalties for delayed execution, which previously discouraged validators from processing proofs because they took longer than standard transaction re-execution.
Ethereum is scheduled to move into a mandatory ZK-validation phase in 2027, at which point proof generation and verification will become the norm across the network. This staged approach aims to reduce risk while giving teams and validators time to adapt.
Broader ecosystem impacts
The significance of ZK technology extends beyond pure throughput. Zero-knowledge methods enhance privacy and security guarantees and are already widely used in Layer-2 scaling solutions such as zkSync and Starknet. Those rollups bundle transactions off-chain and post succinct proofs to Ethereum, boosting efficiency and lowering fees for decentralized applications.
As core Ethereum integrates similar cryptography at the protocol layer, it could unlock richer composability with Layer-2 systems and improve interoperability across the ecosystem.
Industry observers are watching these developments closely, noting that widespread adoption of ZK proofs could strengthen Ethereum’s competitive position against rival blockchains. Additionally, participation by everyday validators using accessible hardware could help preserve decentralization even as throughput scales upward.
Source: Cointelegraph
North Korean crypto hacks accelerate in 2025 as attacks grow more sophisticated
Crypto-related cyberattacks linked to North Korea intensified sharply in 2025, with state-sponsored hacking groups stealing billions of dollars in digital assets and refining techniques that increasingly challenge global cybersecurity defenses, according to new industry data.
Blockchain security firms estimate that North Korean-linked actors accounted for a significant share of total crypto thefts this year, continuing a multi-year trend in which digital assets have become a key funding source for the country’s sanctioned economy. The scale and frequency of attacks in 2025 mark a clear escalation compared with previous years.
State-backed hackers target centralized platforms
Investigators attribute much of the activity to groups tied to Lazarus Group, a well-documented cyber unit believed to operate under the direction of Pyongyang. These groups increasingly targeted centralized exchanges, wallet providers, and crypto infrastructure firms rather than individual users.
Security analysts say attackers focused on supply-chain vulnerabilities, compromised developer credentials, and social engineering campaigns aimed at employees with privileged system access. In several cases, hackers infiltrated internal networks weeks before executing thefts, allowing them to bypass standard security controls.
This shift reflects a move away from opportunistic phishing toward long-term, intelligence-driven operations, according to cybersecurity researchers.
Billions in stolen crypto linked to sanctions evasion
Estimates from blockchain analytics firms suggest North Korean-linked hackers stole multiple billions of dollars worth of crypto assets in 2025 alone, surpassing totals recorded in 2023 and 2024. Officials and analysts believe the funds are used to support government operations, including weapons development programs, in violation of international sanctions.
The United Nations has repeatedly warned that cryptocurrency theft plays a growing role in North Korea’s sanctions evasion strategy. Digital assets offer fast settlement, global reach, and limited oversight compared with traditional financial systems.
Laundering methods become harder to track
After stealing funds, hackers used increasingly complex laundering techniques. These included cross-chain bridges, decentralized exchanges, privacy-focused protocols, and rapid asset swapping to obscure transaction trails.
Blockchain investigators noted a rise in the use of automated tools that split large sums into thousands of smaller transactions, making tracking and recovery more difficult. Some stolen funds were also routed through decentralized finance platforms before being converted into stablecoins or fiat-linked assets.
Despite advances in blockchain forensics, recovery rates remain low once assets pass through multiple layers of obfuscation.
Industry and governments respond
Crypto exchanges and custodians responded by tightening internal security, expanding employee training, and increasing collaboration with blockchain intelligence firms. Several platforms froze suspicious wallets linked to known North Korean entities, though enforcement remains uneven across jurisdictions.
Governments, particularly in the United States, South Korea, and Japan, increased coordination with private firms to share threat intelligence. Regulators also renewed calls for stricter compliance standards among crypto service providers.
However, experts warn that defensive measures often lag behind attacker innovation.
A persistent threat for 2026
Security researchers expect North Korean crypto hacking activity to remain elevated into 2026, especially as digital assets continue to grow in value and adoption. Analysts say the combination of geopolitical isolation, technical expertise, and financial incentives makes crypto an enduring target.
“The threat is not going away,” one blockchain security executive said. “The attacks are becoming more patient, more targeted, and more effective.”
As the crypto industry matures, North Korea’s role as one of its most persistent adversaries remains firmly entrenched.
Source: The Block