According to the announcement, the hackers stole 7.64 million USDC, the team injected 5.5 million USD of their own funds, and obtained additional liquidity through the Euler platform. Based on this calculation, the additional liquidity obtained through Euler amounted to approximately 2.14 million USD. Here's the first point of contention: YU is minted by staking YBTC. Obtaining $2.14 million through Euler means that the protocol staked more than $2.14 million of YU in Euler, which is backed by at least $3 million of BTC as collateral. If the $3 million worth of BTC belonged to the YALA team, why not simply exchange the BTC for USDT instead of paying a high interest rate to borrow from Euler? I can think of two possibilities: ① YALA's YU used as collateral for Euler does not have sufficient YBTC. ② The BTC corresponding to this portion of YBTC is not actually controlled by YALA (for example, through some kind of side agreement). The announcement also mentioned that some assets had been converted into Ethereum before trading resumed, but the subsequent price drop, coupled with the funds invested by the attackers, reduced the actual value of the restored assets. Herein lies the second point of contention: Based on an ETH price of 3000 USDT, the recoverable portion of the stolen funds is approximately $4.9 million. This means that recovered funds plus the project's own $5.5 million would exceed the $7.64 million shortfall. Given this situation, why couldn't the project team obtain the remaining $2.14 million in funding or a bridge loan through other means? After all, the project team has the ability to repay after the funds are recovered. I can think of three possibilities: ① The project team has no plans to resume operations, and any recovered funds will be used to repay their own capital first. ② The project's creditworthiness has been insufficient to secure additional funding, or other losses far exceed $2.14 million. Further investigation of YBTC data reveals that 99% of YBTC is controlled by three addresses, which also means that 99% of YU is controlled by these four addresses. Let's tentatively name them Address A through Address C. Next, we will analyze the behavior of each address one by one: Address A: Founded 39.35 million YU, repaid 17 million YU, net debt approximately 22 million YU, address balance 2.4 million YU. Address B: Minted 43.57 million YU, repaid 10 million YU, net debt 33.57 million YU, address balance 2.77 million YU. Most of the YU from Address B (approximately 30.15 million) flowed into contract 0x9593807414, which is Yala's Stability Pool. The current total deposits shown in the Stability Pool are 32.8 million YU. This means that Address B is also perfectly normal. Address C: A total of 32.5 million YU has been minted, 33.3 million YU has been repaid, and YBTC has been destroyed and BTC retrieved. All transactions are normal. Clearly, the problem lies with address A, so let's investigate further. Address A's transactions are highly complex, but overall, it net minted 28 million YU and obtained additional YU through other addresses. The vast majority of this YU has already flowed into various protocols. From Dabank, we can see other more interesting data: this address pledged a large amount of YU and PT, borrowing a total of $4.93 million in USDT and USDC from Euler. Clearly, these three loans were effectively defaulted on after YU fell to $0.15. This address used a small amount of U to purchase YALA 12 days ago, and also made a partial repayment to Euler. Given that the team mentioned "injecting $5.5 million" and obtaining additional liquidity through the Euler platform, this address is very likely the team's operating address, and we now know that the team obtained approximately $4.9 million in liquidity from Euler. This is a dividing line. The above is objective data and facts. What follows is my speculation and may not be accurate. (1) YALA obtained approximately 500 illegal YBTC through some means (meaning that YALA had no substantial control over the corresponding 500 BTC) and used these 500 YBTC to mint 28 million YU (which we will call illegal YU for now). These illicit funds may have been used for other purposes in the past, such as obtaining airdrops, providing DEX liquidity, or depositing into Pendle, but that's not important. I think the reason why 500 YBTC is illegal is simple: if you have $50 million of BTC at your disposal, you wouldn't take out a high-interest loan for a $7.64 million funding need. (2) After the hackers stole 7.64 million USDC, YALA used some of the illicit YU to obtain a loan of about 4.9 million USD from Euler, while also providing some of its own funds in an attempt to get the agreement back on track. One problem here is that the $5.5 million in equity funds claimed in the agreement plus the $4.9 million in illicit loans totals more than $7.64 million in funding shortfall. There are also many potential possibilities, such as the $5.5 million figure being exaggerated or a portion of the Euler loan being returned to the provider of the $5.5 million. (3) After the hacker was arrested, due to some factors, the recoverable funds were far less than US$7.64 million, such as the previously mentioned US$4.9 million (considering the disposal process, the actual recoverable funds were even lower). In this case, the YALA protocol would still bear a loss of more than US$2.7 million. In this situation, address A chose to default, shifting the losses to Euler, but at the cost of the YALA protocol going bankrupt and ceasing operations. (4) Who is the instigator? As mentioned before, more than 99% of YALA and YU are held by three addresses (plus one bfBTC depositor). Addresses B and C do not have any net inflow or outflow of YU and are not involved in the whole thing. BTC depositors will not suffer any losses; they simply need to repay YU and retrieve their BTC. The losers are holders of YU and its derivative assets, as well as Euler depositors. This money flowed to address A, ultimately benefiting the YALA team. They shifted the losses onto the users, and even profited if the team embezzled the $4.9 million from the judicial proceedings. Of course, all of this is based on the assumption that address A belongs to the YALA Team.According to the announcement, the hackers stole 7.64 million USDC, the team injected 5.5 million USD of their own funds, and obtained additional liquidity through the Euler platform. Based on this calculation, the additional liquidity obtained through Euler amounted to approximately 2.14 million USD. Here's the first point of contention: YU is minted by staking YBTC. Obtaining $2.14 million through Euler means that the protocol staked more than $2.14 million of YU in Euler, which is backed by at least $3 million of BTC as collateral. If the $3 million worth of BTC belonged to the YALA team, why not simply exchange the BTC for USDT instead of paying a high interest rate to borrow from Euler? I can think of two possibilities: ① YALA's YU used as collateral for Euler does not have sufficient YBTC. ② The BTC corresponding to this portion of YBTC is not actually controlled by YALA (for example, through some kind of side agreement). The announcement also mentioned that some assets had been converted into Ethereum before trading resumed, but the subsequent price drop, coupled with the funds invested by the attackers, reduced the actual value of the restored assets. Herein lies the second point of contention: Based on an ETH price of 3000 USDT, the recoverable portion of the stolen funds is approximately $4.9 million. This means that recovered funds plus the project's own $5.5 million would exceed the $7.64 million shortfall. Given this situation, why couldn't the project team obtain the remaining $2.14 million in funding or a bridge loan through other means? After all, the project team has the ability to repay after the funds are recovered. I can think of three possibilities: ① The project team has no plans to resume operations, and any recovered funds will be used to repay their own capital first. ② The project's creditworthiness has been insufficient to secure additional funding, or other losses far exceed $2.14 million. Further investigation of YBTC data reveals that 99% of YBTC is controlled by three addresses, which also means that 99% of YU is controlled by these four addresses. Let's tentatively name them Address A through Address C. Next, we will analyze the behavior of each address one by one: Address A: Founded 39.35 million YU, repaid 17 million YU, net debt approximately 22 million YU, address balance 2.4 million YU. Address B: Minted 43.57 million YU, repaid 10 million YU, net debt 33.57 million YU, address balance 2.77 million YU. Most of the YU from Address B (approximately 30.15 million) flowed into contract 0x9593807414, which is Yala's Stability Pool. The current total deposits shown in the Stability Pool are 32.8 million YU. This means that Address B is also perfectly normal. Address C: A total of 32.5 million YU has been minted, 33.3 million YU has been repaid, and YBTC has been destroyed and BTC retrieved. All transactions are normal. Clearly, the problem lies with address A, so let's investigate further. Address A's transactions are highly complex, but overall, it net minted 28 million YU and obtained additional YU through other addresses. The vast majority of this YU has already flowed into various protocols. From Dabank, we can see other more interesting data: this address pledged a large amount of YU and PT, borrowing a total of $4.93 million in USDT and USDC from Euler. Clearly, these three loans were effectively defaulted on after YU fell to $0.15. This address used a small amount of U to purchase YALA 12 days ago, and also made a partial repayment to Euler. Given that the team mentioned "injecting $5.5 million" and obtaining additional liquidity through the Euler platform, this address is very likely the team's operating address, and we now know that the team obtained approximately $4.9 million in liquidity from Euler. This is a dividing line. The above is objective data and facts. What follows is my speculation and may not be accurate. (1) YALA obtained approximately 500 illegal YBTC through some means (meaning that YALA had no substantial control over the corresponding 500 BTC) and used these 500 YBTC to mint 28 million YU (which we will call illegal YU for now). These illicit funds may have been used for other purposes in the past, such as obtaining airdrops, providing DEX liquidity, or depositing into Pendle, but that's not important. I think the reason why 500 YBTC is illegal is simple: if you have $50 million of BTC at your disposal, you wouldn't take out a high-interest loan for a $7.64 million funding need. (2) After the hackers stole 7.64 million USDC, YALA used some of the illicit YU to obtain a loan of about 4.9 million USD from Euler, while also providing some of its own funds in an attempt to get the agreement back on track. One problem here is that the $5.5 million in equity funds claimed in the agreement plus the $4.9 million in illicit loans totals more than $7.64 million in funding shortfall. There are also many potential possibilities, such as the $5.5 million figure being exaggerated or a portion of the Euler loan being returned to the provider of the $5.5 million. (3) After the hacker was arrested, due to some factors, the recoverable funds were far less than US$7.64 million, such as the previously mentioned US$4.9 million (considering the disposal process, the actual recoverable funds were even lower). In this case, the YALA protocol would still bear a loss of more than US$2.7 million. In this situation, address A chose to default, shifting the losses to Euler, but at the cost of the YALA protocol going bankrupt and ceasing operations. (4) Who is the instigator? As mentioned before, more than 99% of YALA and YU are held by three addresses (plus one bfBTC depositor). Addresses B and C do not have any net inflow or outflow of YU and are not involved in the whole thing. BTC depositors will not suffer any losses; they simply need to repay YU and retrieve their BTC. The losers are holders of YU and its derivative assets, as well as Euler depositors. This money flowed to address A, ultimately benefiting the YALA team. They shifted the losses onto the users, and even profited if the team embezzled the $4.9 million from the judicial proceedings. Of course, all of this is based on the assumption that address A belongs to the YALA Team.

The truth behind Yala's decoupling: From illegal collateralization to liquidity extraction, a meticulously planned escape.

2025/11/19 12:00

According to the announcement, the hackers stole 7.64 million USDC, the team injected 5.5 million USD of their own funds, and obtained additional liquidity through the Euler platform. Based on this calculation, the additional liquidity obtained through Euler amounted to approximately 2.14 million USD.

Here's the first point of contention: YU is minted by staking YBTC. Obtaining $2.14 million through Euler means that the protocol staked more than $2.14 million of YU in Euler, which is backed by at least $3 million of BTC as collateral.

If the $3 million worth of BTC belonged to the YALA team, why not simply exchange the BTC for USDT instead of paying a high interest rate to borrow from Euler?

I can think of two possibilities: ① YALA's YU used as collateral for Euler does not have sufficient YBTC. ② The BTC corresponding to this portion of YBTC is not actually controlled by YALA (for example, through some kind of side agreement).

The announcement also mentioned that some assets had been converted into Ethereum before trading resumed, but the subsequent price drop, coupled with the funds invested by the attackers, reduced the actual value of the restored assets.

Herein lies the second point of contention: Based on an ETH price of 3000 USDT, the recoverable portion of the stolen funds is approximately $4.9 million. This means that recovered funds plus the project's own $5.5 million would exceed the $7.64 million shortfall. Given this situation, why couldn't the project team obtain the remaining $2.14 million in funding or a bridge loan through other means? After all, the project team has the ability to repay after the funds are recovered.

I can think of three possibilities: ① The project team has no plans to resume operations, and any recovered funds will be used to repay their own capital first. ② The project's creditworthiness has been insufficient to secure additional funding, or other losses far exceed $2.14 million.

Further investigation of YBTC data reveals that 99% of YBTC is controlled by three addresses, which also means that 99% of YU is controlled by these four addresses. Let's tentatively name them Address A through Address C.

Next, we will analyze the behavior of each address one by one:

Address A: Founded 39.35 million YU, repaid 17 million YU, net debt approximately 22 million YU, address balance 2.4 million YU.

Address B: Minted 43.57 million YU, repaid 10 million YU, net debt 33.57 million YU, address balance 2.77 million YU. Most of the YU from Address B (approximately 30.15 million) flowed into contract 0x9593807414, which is Yala's Stability Pool. The current total deposits shown in the Stability Pool are 32.8 million YU. This means that Address B is also perfectly normal.

Address C: A total of 32.5 million YU has been minted, 33.3 million YU has been repaid, and YBTC has been destroyed and BTC retrieved. All transactions are normal.

Clearly, the problem lies with address A, so let's investigate further. Address A's transactions are highly complex, but overall, it net minted 28 million YU and obtained additional YU through other addresses. The vast majority of this YU has already flowed into various protocols.

From Dabank, we can see other more interesting data: this address pledged a large amount of YU and PT, borrowing a total of $4.93 million in USDT and USDC from Euler. Clearly, these three loans were effectively defaulted on after YU fell to $0.15.

This address used a small amount of U to purchase YALA 12 days ago, and also made a partial repayment to Euler.

Given that the team mentioned "injecting $5.5 million" and obtaining additional liquidity through the Euler platform, this address is very likely the team's operating address, and we now know that the team obtained approximately $4.9 million in liquidity from Euler.

This is a dividing line. The above is objective data and facts. What follows is my speculation and may not be accurate.

(1) YALA obtained approximately 500 illegal YBTC through some means (meaning that YALA had no substantial control over the corresponding 500 BTC) and used these 500 YBTC to mint 28 million YU (which we will call illegal YU for now).

These illicit funds may have been used for other purposes in the past, such as obtaining airdrops, providing DEX liquidity, or depositing into Pendle, but that's not important.

I think the reason why 500 YBTC is illegal is simple: if you have $50 million of BTC at your disposal, you wouldn't take out a high-interest loan for a $7.64 million funding need.

(2) After the hackers stole 7.64 million USDC, YALA used some of the illicit YU to obtain a loan of about 4.9 million USD from Euler, while also providing some of its own funds in an attempt to get the agreement back on track.

One problem here is that the $5.5 million in equity funds claimed in the agreement plus the $4.9 million in illicit loans totals more than $7.64 million in funding shortfall. There are also many potential possibilities, such as the $5.5 million figure being exaggerated or a portion of the Euler loan being returned to the provider of the $5.5 million.

(3) After the hacker was arrested, due to some factors, the recoverable funds were far less than US$7.64 million, such as the previously mentioned US$4.9 million (considering the disposal process, the actual recoverable funds were even lower). In this case, the YALA protocol would still bear a loss of more than US$2.7 million.

In this situation, address A chose to default, shifting the losses to Euler, but at the cost of the YALA protocol going bankrupt and ceasing operations.

(4) Who is the instigator? As mentioned before, more than 99% of YALA and YU are held by three addresses (plus one bfBTC depositor). Addresses B and C do not have any net inflow or outflow of YU and are not involved in the whole thing.

BTC depositors will not suffer any losses; they simply need to repay YU and retrieve their BTC. The losers are holders of YU and its derivative assets, as well as Euler depositors.

This money flowed to address A, ultimately benefiting the YALA team. They shifted the losses onto the users, and even profited if the team embezzled the $4.9 million from the judicial proceedings. Of course, all of this is based on the assumption that address A belongs to the YALA Team.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

The post Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues appeared on BitcoinEthereumNews.com. The U.S. Spot XRP ETFs is now near the $1 billion mark of assets under management in less than a month since their launch. This follows from the product maintaining consistent inflows with no single outflow recorded yet. XRP ETFs See Continuous Inflows Since Launch Since its first launch on November 14, spot XRP funds have seen continued inflows. According to data from SoSoValue, the total inflows into these funds have now risen to $881.25 million. The funds attracted $12.84 million of new money yesterday. The daily trading volumes remained stable at $26.74 million. Source: SoSoValue Reaching nearly $1 billion in less than 30 days makes the product among the fastest growing crypto investment products in the United States. Notably, Spot Solana ETFs also accumulated over $600 million since their launch. On the other hand, Bitcoin and Ethereum ETFs are holding about $58 billion and about $13 billion in assets under management respectively. Much of the early growth traces back to the first Canary Capital’s XRP ETF. Its opening on November 13 brought one of the strongest crypto ETF openings to date. It saw more than $59 million in first-day trading volume and $245 million in net inflows. Shortly after Canary’s launch, firms like Grayscale, Bitwise, and Franklin Templeton introduced their own XRP products. Bitwise’s fund also did well on its launch, recording over $105 million in early inflows. Meanwhile, the market is getting ready for yet another addition. 21Shares’ U.S. spot XRP fund also got the green light from the SEC. It will trade under the ticker TOXR on the Cboe BZX Exchange. XRP Products Keep Gaining Momentum in the Market The token’s funds continued to expand this week. REX Shares and Tuttle Capital have launched the T-REX 2X Long XRP Daily Target ETF. This new ETF allows traders…
Share
BitcoinEthereumNews2025/12/05 14:11
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27