- Spot Solana ETFs saw their strongest weekly inflows since February, attracting $39.23 million last week.
- Solana futures open interest surged by $1.5 billion in May, reaching $6.4 billion as trader positioning increased.
- SOL’s price rallied 15% to around $97, with analysts eyeing a potential breakout toward the $120 resistance level.
- The Bitwise BSOL ETF led inflows with $36 million, dominating cumulative flows which now total about $1.06 billion.
Spot Solana ETFs recorded their most substantial weekly performance since February, attracting $39.23 million in net flows as SOL’s price rallied 15% to $97, according to data. Consequently, this surge coincided with a sharp $1.5 billion rise in Solana futures open interest throughout May, signaling heightened trader activity in derivatives markets.
Bitwise‘s BSOL ETF led the wave with $36 million in weekly inflows, while Fidelity‘s FSOL added over $1.8 million. Since launch, BSOL has attracted $861 million, accounting for nearly 81% of all spot SOL ETF inflows, which now total about $1.06 billion. Meanwhile, aggregate open interest climbed to $6.4 billion from $4.94 billion on May 1.
The funding rate held near 0.065%, indicating traders paid to maintain long exposure. However, buying pressure has cooled in the $95-$96 range over the past 24 hours as volume deltas flattened. Technically, SOL is forming an Adam and Eve pattern with a neckline at the $95 resistance zone.
A confirmed move above $95 could target the $120 level, a view supported by analyst BATMAN who noted Solana broke a 231-day downtrend against Bitcoin. The $89-$91 zone now acts as the nearest support cluster for a potential retest.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- <p><strong>Mr_Rot13 Hacker Group Targets cPanel Flaws for Backdoor Attacks</strong> </p> <p>A threat actor known as Mr_Rot13 has been exploiting a recently disclosed critical cPanel flaw to deploy a backdoor called <strong>Filemanager</strong> on compromised systems. The vulnerability (CVE-2024-41940) affects cPanel’s WebHost Manager, allowing authentication bypass and remote takeover. </p> <p>According to XLab researchers, the flaw has been abused by multiple threat actors shortly after its public disclosure last month, leading to cryptocurrency mining, ransomware, botnet spread, and backdoor implants. Monitoring shows over 2,000 attacker IPs worldwide are involved in automated attacks. </p> <p>The exploitation uses a shell script to download a Go-based infector from a remote server, which then implants an SSH key for persistent access and drops a PHP web shell. That web shell injects JavaScript to steal login credentials and sends them to an attacker-controlled system. </p> <p>The backdoor supports file management, remote command execution, and shell access. It also collects host data like bash history, SSH details, database passwords. </p> <p>Evidence suggests Mr_Rot13 has operated silently for years, with infrastructure linked to samples dating back to 2020.</p>
- Tesla’s $420 Price Includes Free Optimus: Piper
- Google Threat Intelligence Group has confirmed that cybercriminals are using AI to develop zero-day exploits targeting a popular open-source web administration tool. This marks the first time Google has identified AI-assisted zero-day development in the wild.Cybercriminals used an AI model to discover and weaponize a zero-day vulnerability in a popular open-source web administration tool, according to Google’s Threat Intelligence Group.In a report published Monday, Google said the flaw let attackers bypass two-factor authentication and warned that the attackers were preparing a mass exploitation campaign before the company intervened. It is the first time Google has confirmed AI-assisted zero-day development in the wild.“As the coding capabilities of AI models advance, we continue to observe adversaries increasingly leverage these tools as expert-level force multipliers for vulnerability research and exploit development, including for zero-day vulnerabilities,” Google wrote. While these tools empower defensive research, they also lower the barrier for adversaries to reverse-engineer applications and develop sophisticated and AI-generated exploits.The report comes as researchers and governments warn that AI models are accelerating cyberattacks by helping hackers find vulnerabilities and generate malware, and automate exploit development.Though frontier LLMs struggle to navigate complex enterprise authorization logic, they have an increasing ability to perform contextual reasoning and effectively reading the developer’s intent to correlate the 2FA enforcement logic with the contradictions of its hard-coded exceptions,” the report said. This capability can allow models to surface dormant logic errors that appear functionally correct to traditional scanners but are strategically broken from a security perspective.According to Google, the unnamed attackers used AI to identify a logic flaw where the software trusted a condition that bypassed its two-factor authentication protections. Unlike traditional scanners that search for broken code or crashes, the AI analyzed how the software was intended to work and detected the contradiction, allowing attackers to bypass the security check without breaking the encryption itself.“AI-driven coding has accelerated the development of infrastructure suites and polymorphic malware by adversaries,” Google wrote. These AI-enabled development cycles facilitate defense evasion by enabling the creation of obfuscation networks and the integration of AI-generated decoy logic in malware that we have linked to suspected Russia-nexus threat actors.The report says that threat actors from China and North Korea are using AI to find software weaknesses, while Russian groups are using it to hide their malware.These actors have leveraged sophisticated approaches toward AI-augmented vulnerability discovery and exploitation, beginning with persona-driven jailbreaking attempts and the integration of specialized and high-fidelity security datasets to augment their vulnerability discovery and exploitation workflows,” Google wrote.While Google’s report aimed to warn about the growing risk of AI-powered cyberattacks, some researchers argue that the fear is overblown. A separate study led by Cambridge University of over 90,000 cybercrime forum threads found that most criminals were using AI for spam and phishing rather than vibe coding sophisticated cyberattacks.“The role of jailbroken LLMs (Dark AI) as instructors is also overstated, given the prominence of subculture and social learning in initiation – new users value the social connections and community identity involved in learning hacking and cybercrime skills as much as the knowledge itself,” the study said. Our initial results, therefore, suggest that even bemoaning the rise of the Viber criminal may be overstating the level of disruption to date.Despite Cambridge’s findings, however, the Threat Intelligence Group’s report also comes as Google has faced security concerns tied to AI-powered tools. In April, the company patched a prompt injection flaw in its Antigravity AI coding platform that researchers said could let attackers execute commands on a developer’s machine through manipulated prompts.“Although we do not believe Gemini was used based on the structure and content of these exploits, we have high confidence that the actor likely leveraged an AI model to support the discovery and weaponization of this vulnerability,” Google researchers wrote.Earlier this year, Anthropic restricted access to its Claude Mythos model after tests showed it could identify thousands of previously unknown software flaws. The findings also add to growing concerns that AI models are reshaping cybersecurity by helping both defenders and attackers find vulnerabilities faster.“As these capabilities reach the hands of more defenders, many other teams are now experiencing the same vertigo we did when the findings first came into focus,” Mozilla wrote in a blog post in April. “For a hardened target, just one such bug would have been red-alert in 2025, and so many at once makes you stop to wonder whether it’s even possible to keep up.”
- BitMine Slows ETH Buys; Lee Sets $62K Price Target
- Crypto Conference After-Party at Strip Club Sparks Backlash
