How SEPA Instant Credit Transfer is Reshaping the Future of Banking Services

Grigory Alekseev is a highly skilled back-end developer specializing in Java and Scala, with extensive experience in fintech and information security. He has successfully delivered complex, high-performance systems, including spearheading the integration of SEPA Instant Credit Transfer at Revolut, enabling instant money transfers for over 300K customers.

There is a fundamental change taking place in the European payments landscape. SEPA Instant Credit Transfer (SCT Inst) has changed from being an optional feature to a crucial part of the banking infrastructure as 2025 draws near. Working with various financial institutions during their instant payments journey, I have witnessed how this shift is changing the paradigm for banking services as a whole, not just payment processing.

Why SEPA Instant Is a Game-Changer for Banks

The appeal of SEPA Instant extends far beyond just facilitating quicker payments. The 10-second settlement window is impressive, but what’s really changed is how this capability is changing the competitive landscape and customer expectations in European banking.

Batch-processed traditional SEPA credit transfers are a thing of the past. Customers of today demand the same immediacy from their financial transactions because they are used to instant messaging and real-time notifications. SEPA Instant allows banks to provide services that were previously unattainable, such as real-time marketplace settlements and instant loan disbursements, by delivering payments in less than 10 seconds.

Perhaps more revolutionary than speed is availability. SEPA Instant is open 24/7. Because of this, banks are now able to provide genuinely continuous services, catering to the gig economy, global trade, and evolving lifestyles where financial demands don’t adhere to regular banking hours. This greatly increases customer retention and satisfaction while generating new revenue streams for banks.

The Challenges: Navigating the Real-Time Reality

SEPA Instant integration has advantages, but it also has drawbacks that call for careful preparation and implementation.

Real-time processing has significant technical requirements. Instant payments necessitate quick decision-making skills, in contrast to batch processing, where mistakes can be fixed overnight. To manage high-frequency, low-latency transactions while upholding the same reliability standards as conventional payments, banks must modernize their core systems. This frequently entails restoring the core infrastructure that banks have relied on for many years.

SEPA Instant operates under strict regulatory frameworks, such as the updated Payment Services Directive (PSD2) and several anti-money laundering (AML) regulations. In order to maintain thorough audit trails, banks must make sure their systems can conduct compliance checks within the allotted 10-second window. When taking into account the various regulatory interpretations among EU member states, the difficulty increases.

Predictable batch processing windows are the lifeblood of traditional liquidity management. As SEPA Instant allows money to flow around the clock, banks must essentially rethink their cash management strategies. Since the traditional end-of-day balancing is no longer adequate to achieve accurate financial reporting and risk management, real-time reconciliation becomes essential.

Even well-designed systems can be stressed by high transaction volumes. Banks must design their systems to withstand unexpected spikes (think Black Friday sales or emergencies) without sacrificing security or performance. This calls for thorough capacity planning, stress testing, and reliable technology.

The smooth integration of several systems, including payment processors, fraud detection systems, third-party service providers, and core banking platforms, is essential to SEPA Instant success. One of the biggest architectural challenges is making sure these systems function well together in real time.

SEPA Instant’s speed, which draws users in, also opens up new avenues for fraud. Conventional fraud detection systems may have trouble making decisions in real time because they are made for batch processing. Because instant payments are irreversible, it is very difficult to recover from a fraudulent transaction once it has been authorized.

Solutions and Best Practices: Building for the Real-Time Future

Successful SEPA Instant integration requires a multi-faceted approach combining technology innovation, process redesign, and strategic partnerships.

Modern fraud prevention for instant payments employs a sophisticated multi-tier approach that balances speed with security. The first tier provides immediate risk assessment, categorizing incoming payments as green (low risk), yellow (medium risk), or red (high risk) within milliseconds. This rapid initial screening allows banks to approve low-risk transactions instantly while adhering to the SEPA Instant protocol requirements.

In order to process yellow-category payments, the second tier conducts more in-depth analysis concurrently with payment processing. Even though the payment may have already been made, this more thorough examination may lead to post-settlement procedures like account monitoring, further verification requests, or, in the worst situations, fund freezing while an investigation is conducted. This strategy maintains strong fraud protection without sacrificing the customer experience.

Transactions that are red-flagged are instantly rejected, and the system gives the sending bank the relevant reason codes. These classifications are constantly improved by machine learning algorithms based on consumer behavior, transaction patterns, and new fraud trends.

Real-time payments are simply too fast for manual processes. End-to-end automation is being used by banks for routine tasks like handling exceptions and onboarding new customers. This includes intelligent routing based on transaction characteristics, real-time limit management, and automated compliance checking.

In the context of instant payments, handling exceptions becomes especially important. Banks are creating intelligent escalation systems that can swiftly route complex cases to human operators with all pertinent context pre-populated, while also making decisions on their own for common scenarios.

Successful banks are establishing strategic alliances with fintech firms, payment processors, and technology vendors rather than developing all of their capabilities internally. In addition to offering access to specialized knowledge in fields like fraud detection, regulatory compliance, or customer experience design, these collaborations can shorten time-to-market.

Many banks are also participating in instant payment schemes and industry initiatives that promote standardization and interoperability, reducing individual implementation burdens while ensuring broader ecosystem compatibility.

The Long-Term Outlook: Beyond Basic Instant Payments

SEPA Instant is only the start of a larger financial services revolution. Next-generation banking services are built on the infrastructure and capabilities created for instant payments.

Request-to-Pay services, which allow companies to send payment requests that clients can immediately approve, are made possible by the real-time infrastructure. By removing the hassle of conventional payment initiation procedures, this capability is revolutionizing business-to-business payments, subscription services, and e-commerce.

Cross-border instant payments are on the horizon, with initiatives to connect SEPA Instant with similar systems in other regions. The best-positioned banks to take advantage of this growing market will be those that have mastered domestic instant payments.

The embedded finance trend, which involves integrating financial services directly into non-financial applications, is well suited to SEPA Instant’s API-driven architecture. Banks can provide mobile applications, accounting software, and e-commerce platforms with instant payment capabilities, generating new revenue streams and strengthening client relationships.

As central bank digital currencies (CBDCs) move from concept to reality, the infrastructure developed for SEPA Instant provides a natural foundation for CBDC integration. Banks with mature real-time payment capabilities will be better positioned to participate in the digital currency ecosystem as it evolves.

The competitive landscape is clear: institutions that delay SEPA Instant integration risk falling behind in the customer experience race. Early adopters are already using instant payment capabilities to differentiate their services, attract new customers, and enter new markets.

How China’s Generative AI Advances Are Transforming Global Trade

Contributed by: Sharon Zheng, FinTech Expert

The evolving Chinese Generative AI technology is emerging as a distinct component of innovation that is set to transform China’s international trade. Given my background as an independent consultant on the intersection of technology, trade, and globalisation, I will discuss how China’s regulatory policy on generative AI is transforming global business from a qualitative perspective.

China’s Supremacy in Generative AI Patents

During the period of 2014 to 2023, China submitted around 38000 applications for patent on generative AI technology, which constitutes nearly 70% of that filed globally. The number is six times that of the United States which filed 6276 patents within the same time frame. Out of the top ten applicants of generative AI patents in the world, 6 are Chinese companies which include Tencent, Ping An Group, Baidu and the Chinese Academy of Sciences. 

This drastic increase in the number of patent applications demonstrates China’s relentless expansionist agenda in AI technology. China has been pursuing a dominant position in AI technology. Nevertheless, the enormous number of patents raises issues concerning their value and possible use. In the past, China’s strategy regarding patents leaned more toward quantity which came at the cost of quality. The most crucial issue remains whether these generative AI patents will be transformed into actual real world applications and to what extent will they hold relevance internationally as well as domestically.

Evaluating The Quality and Commercialization of Patents

Although China has an impressive number of patents, their strategic business value and quality are critical considerations. In the past, China’s patent policy focused on the quantity of patents filed over their quality, but the data shows increasing positive trends. The patent grant ratio for applicants from China improved to 55% in 2023 from 30% in 2019, and the rate of commercialisation in high-tech industries improved too. This implies a positive change in the rate of innovation for generative AI.

This trend can be illustrated with a few examples. For instance, research from China developed an AI powered algorithm that can make the process of drug development faster, which means cures for different diseases can be made available to patients in a timely manner. Another example is Ping An Insurance Group that has taken a leading role in AI patenting in China by applying for 101 generative AI patents in areas of application in banking and finance, which make up 6% of their portfolio. These results are a demonstration of China’s increasing willingness to improve the standard of quality and real-world impact of their generative AI innovations.

Challenges in patent quality 

An analysis on a country’s advancement in AI domestically and abroad can be seen through the lens of its patent filings. China’s enormous surge in patent registration is an indicator of its aggressive support in developing technology innovation. WIPO studies attribute 47% of patent applications globally to China in 2023, indicating that the country is looking to step ahead and dominate the technological arms race. At the same time, focussing on the influence China will have on the AI ecosystem internationally reveals multifaceted issues in patenting. 

Issues In Patent Quality

While one may focus on the sheer quantity of patents being applied for, WIPO attests that there persists a problem in the relevancy of these patents internationally. The grant ratio – a measure of how many patents are issued in proportion to how many are applied for – brings further granularity into this. In China, the grant ratio of new-generation AI patents is roughly 32%. Leading tech players like Huawei and Baidu have grant ratios of 24% and 45% respectively. In comparison, developed nations like Japan and Canada have much higher grant ratios sitting at 77% and 70% respectively. This shows that a large number of Chinese corporations are making patent applications but a large portion of these applications fail to pass the assessment requirements that come with them.

At the same time, Chinese patents do not have effective international reach. China only files 7.3% of its patent applications overseas, which indicates a concentration on the domestic market. This is in stark contrast to countries like Canada and Australia which file a large percentage of their patents overseas, which illustrates a proactive approach to fostering multiple jurisdictions for intellectual property protection. The lack of international Chinese patents can limit their relevance and use in other countries which undermines the possibility of commercially marketing Chinese AI technologies abroad. 

Impact on international Trade

Global competitiveness is determined by trade relations of a country suffering from lack of quality and scope of internationally imposed patents. Internationally enforced high-quality patents form the axis of competitive advantage provided to a specific firm enabling them to strategically license technologies, penetrate new markets, and consolidate globally with other firms. On the other hand, commercially unproductive patents without tangible attributes and unprotected in vital markets yield no benefit at all and stagnate business activities. 

China emphasizing the quantity of patents filed rather than their quality or international scope economically has some consequences: 

  • Local Emphasis: The high number of domestically filled famed patents demonstrates that Chinese inventions are designed primarily for domestic consumption. All these factor enhancements will arguably lead to the reduced global influence of China’s AI technologies and limit participation in the global value chain.
  • Lack of Market Defense: Without having a patent to secure their interests, Chinese companies face the risk of not being able to commercialize their technologies in foreign countries due to technology spoofing leading to loss of revenue.
  • Impression of Innovation Value: Limited international applications coupled with lower grant ratios may have an impact on the Chinese innovation value perception which may affect foreign investments and partnerships.

Strategic Approaches

China can consider the following approaches in order to boost the impact of its AI innovations globally:

  • Improving Patent Standards: Moving from quantity to quality focus increases grant ratios and more innovations are likely to pass international standards. Such a strategy is likely to require more rigorous internal review processes accompanied by more funding of research and development.
  • Increasing International Applications: It is important to motivate businesses and corporations to file for patents in various jurisdictions which promote global IP protection which in turn aids in commercialization and collaboration internationally.
  • Toughening Enforcement Frameworks: Enforcement of IP rights is one the most effective ways to increase the attractiveness of Chinese patents to foreign investors and/ or partners.

Global Competitiveness and Strategic Considerations

The global technology landscape has become significantly different because of the improvements of China in artificial intelligence (AI) in recent years. One of the most important transformations is the development of DeepSeek, a new Chinese AI model ready to compete with Western models in terms of price, and effectiveness with American tech behemoths. This shift indicates that China has set its sights on improving the grade and global Anglo-Saxon relevance of its AI technology to remain competitive internationally. 

DeepSeek: A Disruptive Force in AI 

DeepSeek burst onto the scene in December 2024 and received massive recognition for its capability to match the performance of the best Western AI models, particularly  OpenAI’s GPT-4, while being significantly cheaper to develop. This is impressive particularly because China doesn’t have access to advanced AI chips and many  extensive datasets which have always been barriers to China’s development of AI. The achievement of DeepSeek indicates that Chinese corporations are increasingly discovering novel ways to deal with these obstacles and change the scope of deep learning and artificial intelligence.

DeepSeek’s approach deeply altered conversations and business practices within the industry. NVIDIA and other dominant industry players’ stocks were subjected to huge fluctuations as capital interrogated the market regarding DeepSeek’s entry. This has been called an “AI Sputnik moment” and now serves as a marker in the significant change in the AI competition. 

Strategic Repercussions 

DeepSeek’s rise shifts the most critical perceptions following the scaling expectations of OpenAI. Active users increased to more than 400 mln weekly in February 2025, from 300 million in December 2024. This growth is another illustration of the already aggressive nature of AI competition and has proven to be even more dominant when it comes to innovation politics. 

Pressure competition stemming from DeepSeek’s calculated attacks equally shifted strategy among Western tech leaders, the most notable being Musk’s unbidden OpenAI stock buyout bid of 97 billion dollars when the AI company was valued at about 300 billion dollars. This best demonstrates the rush towards integrating AI to thwart unforeseen competitors. 

Improving Parenting Standards and Global Scope

It is well known that China leads in the amount of AI-related patent applications, however, there are serious concerns about the relevance and overall quality of these patents.

The achievement of DeepSeek demonstrates progress towards not just boosting the volume, but also the quality and usefulness of AI patents. This tactic assists in ensuring that such innovations are not only useful in the country, but are also competitive internationally. 

On the other hand, there are still gaps. The inability to access advanced AI chips, a staggering amount of quality data, and the complex algorithms required for large model training remain considerable obstacles. Such restrictions could prevent the effective deployment and international outreach of China’s AI technologies, which could make China’s generative AI patents less effective in contributing to the advancement of AI technology globally. 

DeepSeek’s creation serves as an example of China’s increasing competitiveness in the technology field. China’s innovation capabilities, in spite of constraints, was showcased when it developed a low-cost AI model that surpassed the efforts of the West. Subsequently, this change forces large technology companies around the world to revise their strategic plans in light of yet another strong competitor.

In order to maintain and improve its position within the global AI landscape, however, China will first need to overcome dire obstacles. Advanced technology access, enhanced data quality, innovation-friendly environments, and newly formulated patent strategies contingent on quality and international focus are all necessary. These changes would allow the technological advancements to be utilized and for China to gain global competitiveness.

Conclusion

AI technology advancements from China are changing the dynamics of international trade. China is improving AI technologies and automating trade functions to improve efficiency and set new trade standards. However, China’s long-term impact on AI will largely depend on the quality and scope of China’s generative AI patents and their relevance outside the country. With the constant evolution of these technologies, it’s easy to see their direct integration into global commerce, which makes it increasingly important for stakeholders worldwide to take notice and strategize accordingly.

What is finance transformation?

Finance transformation isn’t just one thing; it’s a blend of people, processes, and technology that comes together to help a business’s finance team work better, faster, and with greater purpose. When a company decides to move forward with a transformation, it usually starts by stepping back and asking how day-to-day finance tasks can better support the firm’s bigger goals. That fresh perspective then guides everything that follows.

At its core, finance transformation often means rethinking the way a finance department is organized and how it operates. This could involve redesigning the finance operating model, updating roles, or streamlining core processes so data flows with less friction. 

Companies might also choose to upgrade their accounting platforms or link existing systems in smarter ways, and that often calls for training staff so they can make the most of the new tools. The goal is to create a system where technology does the heavy lifting while talented people apply their expertise where it counts.

Elements of Finance Transformation

When people talk about digital finance transformation, they’re really describing a full upgrade of how finance teams think, work, and make decisions. It covers everything from strategy and day-to-day operations to tools, methods, and even the people behind the numbers. The goal is simple: deliver faster, cheaper, and more reliable outcomes that help the whole business move forward.  

That may sound like a lot of work all at once, and it is. Yet, in a world where rivals seem to be getting quicker and leaner every day, sitting still is not an option. A successful finance transformation is no longer a “nice to have”; it is a necessity if companies want to hold on to their competitive edge.  

Finance Strategy

A clearly defined finance transformation strategy acts like a road map, showing organizations where the weak spots are and what steps to take first. It also lays out a new operating model that aligns finance activities with broader business goals, ensuring that every dollar spent supports the right priorities. Modern strategies lean heavily on digital tools – cloud software for real-time access, automation to cut out repetitive tasks, and data analytics to sharpen planning and forecasting. By embracing these technologies, finance teams can respond faster to changing market conditions and keep pace with the rest of the organization.

Finance Operations  

At its core, the finance team exists to give clear advice and practical support whenever money is being spent or moved. This means helping departments buy what they need, making sure payments go out on time, and managing receipts that come in. Some jobs are easy to spot, like issuing a loan or deciding what to do with old company shares. Others happen behind the scenes every time someone orders a laptop or books a hotel room: we check the numbers, authorize the cost, and then arrange for the payment to travel safely from our account to theirs. In short, finance is the part of the business that moves cash while making sure it stays under control.  

 Finance Processes  

Every finance operation follows a step-by-step path, or process, that turns raw data into a “done deal.” Take the employee expense claim, for example. First, workers upload their receipts; next, the numbers land on a manager’s desk for a quick double-check; from there, they travel to the finance team, who do summary-checks against policy; and, finally, the approved amount shows up in the employee’s bank account. When each of these tasks is clearly lined up, the workflow hums along. However, when different departments use different tools or schedules, things can get bumpy fast. That’s where financial transformation steps in: it pulls every related process into a single, smooth system so everyone is looking at the same numbers, at the same time, and money moves exactly when it should.

Organizational Change and Talent

These days, a lot of companies are trying to grow or improve their skill sets, yet they still leave out the budget, tools, and step-by-step plans needed to make it happen. The finance department, in particular, must start building talent that goes beyond traditional number-crunching. That means training people in coding, machine learning, and other tech areas, so they can handle the wave of automation, AI, and robotics rolling onto the scene. We also need teams that can quickly turn fresh data into smart decisions, using real-time dashboards and easy-to-read analytics. With stronger skills in place, companies can finally keep up with the changes – and each other.

Rethinking How Finance Works Today

New tools and mountains of fresh data have changed the game for finance teams. Instead of treating numbers as just a monthly chore, companies can now weave financial insights into every corner of the business. The aim isn’t only to run reports faster, but to redesign the finance shop so it spots opportunities and solves problems along the way.

Because every firm is different, there’s no one-size-fits-all blueprint for what people call “autonomous finance.” Trying to copy another company’s model usually backfires. Still, a set of guiding ideas can steer almost any organization in the right direction. These ideas cover who makes decisions, what skills the team needs, how the department is structured, how it measures success, and where it gets outside help, to name a few.

Building a Roadmap for Finance Transformation

A successful finance transformation doesn’t just happen overnight. It follows a clear, step-by-step plan, or roadmap that sets actions and results in a logical order. Here’s how organizations can put one together.  

Start by taking a good look at the finance function as it stands today. Map out every key process, review the technology that runs them, and list the skills and workloads of the team members involved. This honest snapshot is your current-state picture and helps everyone agree on where the starting-line really is.  

Next, dream a little. Picture what you want the finance department to look like five to ten years from now. What new services should it offer? What tools will the team be using? Once that future vision is clear, compare it side by side with the current state you just documented. That exercise, called a gap analysis, shows exactly what skills, technologies, and processes need to change.  

From there, gather the goals, objectives, and desired outcomes, while keeping internal trade-offs and external risks in mind. Talk through a few different methods for getting from the present to the future, weigh the pros and cons of each, and choose the path that your project team feels most confident will deliver results.  

Typically, the finished transformation roadmap is organized by high-level work streams and phases so the project can roll out in manageable, bite-sized chunks. This makes it easier to measure progress along the way and adjust course if needed, step by step. 

Building a Roadmap for a Smooth Finance Transformation

If your organization is thinking about changing the way its finance department works, a clear roadmap is essential. Rather than rushing into new software or reorganizations, build the transformation step by step, checking off actions as you go.  

Start by taking a snapshot of your finance function as it exists today. Look closely at each process, the technology that runs it, and the skills and capacity of your people. Are employees struggling with outdated spreadsheets? Is your reporting tool giving you headaches? A frank assessment at this stage reveals the good, the bad, and the uncertain.  

Next, dream a little. Imagine where you want the finance team to be five or ten years from now. Write down what success looks like: faster month-ends, real-time dashboards, or upskilled staff who add strategic value. Once you have a vision, compare it to your current picture. This gap analysis shows exactly what needs to change.  

With the gaps identified, list all the goals and outcomes you want to reach. Keep both internal and external factors in mind. For instance, new regulations, customer expectations, or economic shifts can act as both risks and rewards. Explore different routes to each destination – hybrid cloud, robotic process automation, agile reporting systems – and weigh the pros and cons. The project team then recommends the path that balances ambition with practicality, finances, and available talent.  

Finally, stitch everything together into a high-level roadmap. Break the journey into phases and work streams so you can deliver results incrementally. Milestones help keep the team focused, funders informed, and skeptics quiet. After all, successful transformation is less about magic and more about methodical progress.

Benefits of Finance Transformation

When a company updates how its finance department works, everyone from the CFO to the front-line worker usually sees positive changes almost right away. A successful finance transformation can help cut costs, speed up daily tasks, improve overall efficiency, slash errors, and provide data that’s a lot easier to read and use.

 Lower Costs

One of the first places companies notice savings is in their budget. By automating invoices, payroll, and expense reports, finance teams find hidden cost-cutting chances in every department. Plus, the option to work remotely lets firms rethink wage structures and plan payroll more effectively, which can add up to significant annual savings.

Faster Processes

Speed is at the heart of modern finance transformation. By lining up people, processes, and the right technology, routine tasks start to flow smoothly. Fewer handoffs and automated approvals mean bottlenecks disappear, invoices get paid on time, and month-end close isn’t an all-nighter anymore. That newfound speed not only cuts internal frustration; it also translates to better customer service and fewer mistakes.

Error Reduction  

When finance processes and systems run on autopilot, mistakes tend to drop. Standardizing these steps allows everyone to follow the same playbook, meaning the same numbers get input and calculated the same way every time. Pair that consistency with a single dashboard or report that pulls from one clearly marked source of truth, and you’ve practically eliminated the old “I thought you had that updated” conversation. Stakeholders see the same data, read the same labels, and confusion gives way to clarity.  

Increased Productivity and Efficiency  

A centralized finance data hub is like a digital break room where all teams can quickly grab the information they need without hunting around. This setup makes remote work smoother, since consultants, sales staff, and accountants aren’t battling version conflicts or email chains. Better-organized information releases your team from printing reports and double-checking formulas, so they can tackle planning, forecasting, or strategic improvements that actually move the business forward.  

Data Reliability  

Data isn’t just getting bigger; it’s exploding—from internal ERP systems, website logs, sales platforms, and even social media chatter. Sorting that digital avalanche can feel overwhelming, but modern finance tools bring order to the chaos. Cloud computing, AI analyses, and smart validation rules give finance leaders clear snapshots of what the numbers mean and whether they can be trusted. When you know the story behind the data, decisions don’t just happen faster; they happen with confidence.

Technologies Driving Finance Transformation

One of the biggest headaches for finance teams today is wrestling with data that simply won’t stay in line. Business leaders often find themselves searching for numbers they know exist, only to discover either that the figures are scattered across a dozen spreadsheets or that they can’t trust what they see. As a quick fix, they resort to time-consuming hacks—think custom scripts or the dreaded “find and replace” on every column. Finance transformation looks to cure this data fatigue by giving these teams powerful new tools to work with.  

Robotic Process Automation (RPA)  

At its core, RPA lets computers tackle rule-based chores that used to eat up hours of a person’s day. Imagine a software “bot” that logs into payroll systems, pulls data, double-checks numbers, and even chases down the occasional invoice. In finance, these digital helpers can string together machine learning with automation, speeding up processes from month-end close to travel expense approvals. The result? Fewer errors, faster turnarounds, and people who can spend their time on real analysis instead of rote clicks.  

Artificial Intelligence (AI)  

Where RPA excels at repetitive tasks, AI swoops in when things get murkier. Machine learning models learn from past invoices, forecast cash flow spikes, or flag unusual spending patterns that a human may miss. By putting AI-powered dashboards in front of finance pros, companies give their teams sharper insight and more brain space for strategy. It’s not about replacing workers; it’s about giving them smarter, data-backed assistants that never sleep.  

Blockchain  

Picture a company-wide ledger that everyone can read but no one can change. That’s blockchain in a nutshell. Because entries are permanent and visible across departments and partners, finance can finally wrestle down the messy paper trail of accounts payable. Using blockchain, an approved invoice automatically triggers payment, cutting out the bottlenecks that usually slow things down. By streamlining this workflow, firms not only lower processing costs but also trim the number of disputes and late fees that chip away at the bottom line.  

These technologies aren’t just flashy buzzwords; together, they are rebuilding the finance department’s backbone so numbers flow freely, decisions get made faster, and teams can focus on what truly drives value.

Cloud  

Cloud computing is changing the way finance departments work by giving them a chance to set up systems that grow or shrink whenever they need to. Because today’s cloud tools were designed for the modern business, they cost less to run than older on-site servers, are quicker to put in place and already come with real-time reports built in. Finance teams no longer have to wait for IT to run monthly reports or worry that their system will crash during a big audit; they can get the numbers they need the moment they pop into their heads.  

Advanced analytics  

Companies that add advanced analytics to these cloud platforms are the ones that really start to see fresh answers to difficult questions. By sifting through past invoices, payment delays and customer trends, the software picks up patterns that the human eye might miss. This helps finance teams decide when to offer a discount for early payment, forecast cash flow more accurately, and even tailor communication so customers feel looked after rather than chased. The end result is a smoother invoice-to-cash process, smarter decisions and, ultimately, a better experience for everyone involved.

How AI Detects Fraud in Banking

What is AI fraud detection for banking?

AI in fraud detection focuses on using ML technologies to reduce fraudulent activities in the banking and financial services sector.

By leveraging data, AI models are trained to distinguish between concerning activities and normal transactions, which aids financial institutions in mitigating the chances of fraud – detecting patterns far earlier than any human agent could be capable of spotting.

To enhance decision-making processes as well as risk and fraud management, AI solutions are being integrated into new and legacy workflows within financial institutions. ML algorithms powered by AI and trained on past data are capable of recognizing and blocking transactions deemed suspicious automatically. Furthermore, AI technologies may need human agents to validate confirmed suspicious transactions by completing additional safety checks. Furthermore, AI can also employ predictive analytics to forecast the types of transactions individuals may carry out in the future and identify if the new behaviors are anomalous.

AI finance technology (fintech) can aid in safeguarding against phishing scams, identity theft, payment fraud, credit card fraud and other forms of banking fraud on an individual level. These systems mitigate losses from such fraudulent activities. 

Customer experience can be impacted with AI systems due to false positives. Regardless of the way fraudsters choose to commit financial crimes, be it through unauthorized charges or even more illicit activities like money laundering, ensuring client accounts are secure alongside abiding to regulatory compliance is the primary focus of financial institutions.

Both fintech and other financial institutions are depending on AI as a fraud mitigation tool. With constant improvement, AI mitigation service providers and leading institutions expect thwarting fraud attempts will be abetted on an unprecedented level through automation.

How AI Is Implemented For Financial Fraud Detection

AI technology provides systems the ability to perform activities such as learn, adapt, problem solve, and automate with human-like intelligence. Even though AI technologies lack human-like cognitive abilities, when dealing with well defined systems, an AI that is trained on distinct tasks can operate much quicker and at a far greater scale than humans. 

Supervised and Unsupervised Learning 

AI systems put into action for preventing banking fraud are automated to attend to well defined activities. These AI models go through a process of supervised learning whereby they are fed large amounts of specially selected data which refines the model to perform tasks. This approach helps forge models that are able to detect requisite patterns for predetermined tasks.

On the other end, unsupervised learning enables drawing inferences from past data without given training documents.

Unsupervised learning  

The gaps of supervised training models using anomaly detection techniques can be filled with unsupervised learning anomaly detection techniques. With the help of these technologies, AI models are capable of identifying previously unpredicted but still abnormal behavior patterns. AI systems that incorporate unsupervised learning capabilities can sift through data to identify potential fraud long before human analysts would consider such actions a possibility.

Both supervised and unsupervised learning enable banks to automate the verification process. AI can scan the database for known fraud patterns and trigger alerts when new and unknown patterns that suggest fraud are detected.

Various Uses Of AI Technology  

Social Media Chatbot serves as a powerful example of an application using AI technology. It is one of the most widely used bots since it uses AI technologies as customer service agents and gives basic information as per the user query. 

In the realm of customer service, there are multiple other applications which the banking sector use to incorporate AI technology for detecting and preventing fraud: 

  • Real time systems: Automated AI programs are tasked with processing vast volumes of transactions and determining account activities within different parameters in real time identification and flagging of account suspicious activities which is sometimes referred to as intelligent automated systems. 
  • Help desk operations: With the use of advanced AI algorithms, traditional human operators tasked with proactive fraud detection can now talk to LLM-based AI assistants and use natural language so they can analyze complicated policy documents and large data sets.
  • Compliance enforcement: Financial institutions are facing enormous scrutiny to remain compliant with regulations. AI technologies assist banks with policy implementation by enforcing KYC compliance through automated ID checking for errors or fraud. These technologies also assist in the enforcement of Anti Money Laundering (AML) policies by identifying and flagging accounts, behaviors, and transactions such as the transfer of the same monetary value between unrelated accounts which are linked to money laundering schemes.
  • Fraud Detection: AI technologies are beneficial for applications that involve recognition of complex patterns for anomaly detection. There are some differences in AI systems known as graph neural networks (GNN) that specialize in handling data that can be modeled in the form of graphs, such as data common in the banking sector. GNNs are capable of processing billions of records and detecting patterns within vast data sets to track and capture even the most intricate fraudulent activities.
  • Risk Evaluation: AI and machine learning models are created using risk-based data with assigned weights to estimate chances of an event occurring. They also evaluate what action to take with the highest probable outcomes. In this regard, these models can make evaluations based on transaction amounts and history, frequency, location and behavioral tendencies, making them ideal for measuring risk. AI systems are capable of estimating risk associated with specific transactions as well as the exposure involved with issuing a loan or a line of credit to fraud-prone applicants.
  • Fraud Network Identification: Suspicious relationships between entities or clusters can be analyzed through machine learning techniques like graph analysis to identify fraud networks.

Differences between AI-Powered Fraud Detection and Traditional Methods  

AI technologies are transforming how fraud is detected and secured in banking, significantly enhancing efficiencies over older techniques. Where modern systems are leaps ahead of their predecessors, they trace some of their foundations from traditional models.  

Pros of Traditional Fraud Detection Systems  

Implementation simplicity: Traditional methods rely on heuristics, making them easier to execute. For example, automatically flagging any new transactions that exceed a certain predetermined and stagnant threshold based on the account’s historical data.  

Domain Intuition: An experienced fraud analyst brings useful domain knowledge and hunches to problem-solving. There are cases where only a traditionally trained person can adjudicate the validity of certain transactions or identify a fraud attempt.

Problems Encountered in Traditional Fraud Detection Systems

Scope Problem: Traditional fraud detection systems which use heuristics tend to be static and rely on fixed patterns (if X then Y relationships). While there is some merit to heuristics, in this case, the lack of efficiency results from ignoring the many interactions within a set of complex data.

Processed Transaction Problem: The ever-increasing volume of transactions from users leads to problems in systems that were built and manually controlled by a fraud detection expert. With a rising set of every minute of everyday systems, there is an increase in unattended data that needs to be processed. You could throw money at the problem, but hiring additional staff is inefficient, both cost-wise and output-wise.

High error rate: The traditional systems used rely heavily on rules which are arbitrary, leading to very low fraud detection rates. Because the rules are so harsh and agnostic to context, even ambiguous signals of potential fraud tend to over-trigger non-responsive systems. If an account configured for zero tolerance withdrawals tries to increase its drawdown by attempting to withdraw $200, which is not more than double the “allowed limit”, this will almost certainly trigger a blockage. Although such behavior is certainly unusual, it is only unusual from the perspective of a faulty rule-based system that attempts to operate under the guise of fraud detection. In reality, such actions cannot be labeled as “suspicious and unprecedented.” If anything, a customer will only want to make a large withdrawal instead of the normal one. The end result of all this is extreme low detection rates but massive resource waste in unproductive investigations.

Fraud Detection Using AI Technology: Benefits

Recognizing patterns better: AI technology uses sophisticated algorithms to process highly detailed and intricate data. When AI systems analyze data, they spot anomalies that would otherwise go unnoticed.

Unprecedented expansion: AI systems automated transaction monitoring far beyond human capabilities. Automated AI fraud detection systems offer transaction analysis and verification on-the-go, responding instantly unlike traditional systems.

Flexibility: Adaptable Algorithms Artificial Intelligence systems are trained to execute specific tasks. Their learning does not stop after training. An active AI algorithm retrains itself to improve techniques to intercept different forms of fraud as its systems keep working.

Drawbacks of AI-based fraud detection 

Fraud detection powered by AI systems has its downfalls. First off, the model needs adequate data to draw assumptions from. In order to successfully train an AI model, vast amounts of data suffices. The data needs to be collected, made through a thorough process (synthetic data), and finally filtered. The accuracy of an AI model is successful due to well trained data.

Tougher system applicability: Integrating AI systems into pre-existing structures could pose a challenge and become a burden to work with. Initially, these systems do seem to possess a high level of complexity and are hard to deal with, while in the end, prove to respond to positive ROI in long durations.

Applications of AI for fraud detection in the banking sector  

The adoption of AI-based fraud detection systems has proven beneficial for many banks and other financial institutions. LSTM based AI models, for example, improved American Express’s fraud detection systems by 6%. PayPal AI systems also enhanced their real-time fraud detection by 10% through round-the-clock global surveillance.  

In the banking sector, practical applications of AI for fraud detection are growing rapidly. Below are some of these applications.

Crypto tracing

The anonymity of cryptocurrency makes it an easy fraudster’s target. However, the sophisticated AI tools designed to combat fraud can monitor blockchains for abnormal behaviors such as unidirectional, streamlined fund transfers and trace misplaced or illicit payments. 

Verification chatbot

Bots equipped with AI can provide customer service and conduct verification processes as well. Phishing as well as identity theft because of an obvious tell in a particular interaction can easily be picked by chatbots, hence bots can be used to fish out scammers through language and user behavior analysis.  

Ecommerce fraud detection

To protect their clients from ecommerce fraud, banks can scan the client’s activities and purchase history and cross-check that with device information such as location to note unconventional transactions and block them from going through. Moreover, algorithms and purchase history can help identify dishonest ecommerce websites so that users can be warned in advance before making purchases through disreputable stores.

Problems Encountered with AI Fraud Detection Systems in Banking

AI fraud detection technology, an innovation in itself, is now actively and dramatically changing the banking industry. What’s more, there is even greater room for further improvement. However, with AI comes the challenges that this technology may bring.

Mistakes and AI ‘hallucinations’

We know that AI algorithms are improving their efficacy daily. But like every other technology, they are imperfect. An AI model is capable of generating ‘hallucinatory’ results, results that are false or inaccurate in nature. Within banks, the damages that can arise from such inaccuracies can be solved by creating very hyper-specialized models – models aimed at performing very specific tasks. However, such models also stifle the potential value that AI brings. Hallucinations, although not common, are highly prevalent, thus turning accuracy in AI banking fraud protection critical. 

Bias in Data Set

The issue of bias has persisted even before technology was involved with science, dating long back to the earliest days of data analysis. As much work as has been done to eliminate bias and discrimination from governing lending and account protection, the issue still remains. But just as critical, creating AI models by biased designers and engineers adds risks of discrimination, making the AI prone to disabilities based on gender, race, religion or even disability.

Compliance

The considerations concerning data privacy are crucial in the banking sector. AI models need considerable data which has to be collected and handled ethically. Compliance with data privacy regulations is equally critical when it comes to the application of AI. Indeed, the pace of technological development is extremely fast which means that lawmakers and regulators will have to revisit the question of whether our legal framework is suitable for the protection of customer privacy.

The Future of Blockchain Efficiency: Maximising Throughput Using Rollups

Author: Asutosh Mourya is Engineering Manager at Trili Tech – a blockchain research and development hub focused on the open-source Tezos blockchain.

Blockchain technologies are already part of our daily lives, even if we’re not consciously aware of them. They are applied in such areas as secure online transactions, supply chain management, identity verification, and even in creating and trading digital assets like non-fungible tokens (NFTs). Understanding how exactly blockchain works can shed light on its practical implications for enhancing efficiency and transparency in different aspects of our daily interactions.

In the article, I will share my views on how to maximise blockchain efficiency using rollups. Join me on this journey.

What is Blockchain

In terms of functionality, blockchain can be described as a series of data blocks linked in an uneditable digital chain. These blocks are stored in a decentralised environment, where each block’s information is verifiable by all participating computers. The decentralised structure ensures trust, validity, and usability, departing from traditional hierarchical systems.

Simply put you can think of a blockchain as a digital necklace made up of individual beads, with each bead representing a piece of information. These beads are linked together to form the necklace, just like blocks are linked to form the chain. Each bead holds details about transactions, who sent money and when it was sent.

In a blockchain, blocks not only contain transaction data but also a crucial element known as a hash. These cryptographic hash functions are fundamental to the blockchain’s operation. Hashes are represented by a unique series of characters like:

X23G9K1H4P8Q6L2V5

They act as the digital signature for a block, generated from its data. A key feature is that each block includes the hash of the previous block, forming a linked chain. This interconnectedness through hashes ensures the integrity of the blockchain network. Any attempt to modify the content within a block would alter the hash, signalling potential tampering to the network.

The incorporation of hashes creates a self-regulated network in the blockchain, eliminating the need for intermediaries. This design prevents third parties from monitoring or interfering with transactions, bolstering the security and reliability of the system.

What Makes Blockchain Special

Blockchains set themselves apart from other digital databases in distinct ways. Firstly, they operate as distributed databases, spreading data across multiple servers situated in various physical locations. This decentralisation enhances reliability, performance, and transparency compared to traditional databases. 

What is more, blockchains employ open-source software, allowing the entire network community to scrutinise the underlying code collaboratively. This transparency facilitates the detection and resolution of bugs, glitches, or flaws. 

Notably, once verified, new information can only be added to the blockchain; it cannot be altered. Security and trustworthiness are upheld by requiring majority consensus from network participants, promoting a shared responsibility model instead of relying on a single, central entity.

Current Limitations 

Though blockchain is getting widely adopted, it faces some challenges. One of them is scalability. In blockchain, it means handling more transactions without making things slower or less secure. To understand the grounds of this problem we need to get acquainted with the following concepts.

Block Time

This term refers to the average time it takes for a new block to be added to the blockchain. Different blockchain networks have varying block times. For example, Bitcoin has a block time of around 10 minutes, while Ethereum aims for a shorter block time of around 15 seconds. The challenge is to strike a balance: a shorter block time can lead to faster transactions, but it may also increase the likelihood of forks (divergent branches in the blockchain) and reduce security.

Transactions per Second

This metric indicates the number of transactions a blockchain can process in one second. The TPS varies widely among different blockchain networks. Traditional payment systems like Visa can handle thousands of transactions per second, whereas many blockchain networks, especially those focused on decentralisation and security, may have lower TPS.

For Bitcoin, the most used blockchain, the problem is its small 1MB block size, limiting the number of transactions and making fees higher. They suggested a solution called Segregated Witness (SegWit), but it’s not widely adopted yet. Ethereum, another big blockchain, has a 15-second block time, which is faster but also limits transactions per block. They plan to fix this with Ethereum 2.0, using Proof of Stake (PoS) and sharding. Other blockchains explore ideas like side chains or off-chain methods (like Lightning Network) to handle more transactions without slowing down the main blockchain. Solving scalability is crucial for making blockchains work better.

What are Rollups

Blockchain rollups are a Layer 2 solution for scaling cryptocurrencies, involving the consolidation of multiple transactions on a secondary blockchain (Layer 2). These transactions are then bundled into a unified piece of data, broadcasted onto the primary blockchain (Layer 1). 

In simpler terms, rollups extract transactions from the main blockchain, process them off-chain, compile them into a single data unit, and reintegrate them onto the primary chain. This process is why rollups are often referred to as ‘off-chain scaling solutions.’

At the most fundamental level, layer 1 scaling involves enhancing the scalability of the primary blockchain. On the other hand, layer 2 scaling entails relocating transactions from the main blockchain layer to a distinct layer that can interact with the primary chain.

Why Blockchain Rollups

Typical blockchain blocks have limited space, causing delays and increased costs as networks grow busier. Blockchain rollups solve this by consolidating transactions into one data piece off-chain, making processing more efficient.

How Do Blockchain Rollups Work?

Blockchain can store two types of information: transactions and data. While processing transactions on-chain is heavy, data resulting from transactions is lighter. Rollups merge transactions off-chain, submitting consolidated data to the mainnet, reducing the burden and enabling multiple transactions in one data piece. This enhances blockchain scalability.

A Step-by-Step Rollups Mechanics 

  1. Conducting Off-Chain Transactions

   – Engage in transactions directly on the rollup chain, acting as a blockchain platform.

   – Transaction processing occurs on the rollup chain, overseen by the “sequencer,” who validates, constructs L2 blocks, and submits transaction data with proofs to the primary L1 chain.

  1. Aggregating Batched Transactions

   – The sequencer organises multiple transactions into batches, collectively presenting them to the main L1 chain.

   – Batched transactions not only streamline processing but also reduce gas fees, providing a cost-effective experience for end-users.

  1. Ensuring On-Chain Security

   – Post-batching, the rollup chain delivers transaction data to a dedicated smart contract on the L1 chain.

   – Upon finalisation of the L1 block containing rollup transactions, the data becomes immutable, safeguarded against modification or censorship, ensuring constant data availability for verification.

  1. Generating Verifiable Proofs

   – Some rollups enhance transaction data with cryptographic “summaries” or “proofs.”

   – These proofs, serving as cryptographic assurances, are deposited on the L1 chain, validating the successful execution of the designated batch of transactions by the rollup.

Types of Blockchain Rollups

1. ZK Rollups (Zero-Knowledge)

 – ZK-SNARK: Uses short proofs for quick transaction processing and enhanced security but has vulnerabilities to certain hacks.

 – ZK-STARK: More scalable and transparent than ZK-SNARK, with larger proof sizes, providing improved security.

2. Optimistic Rollups

 – Assume all transactions are valid by default, approving them to the mainnet without extensive validation.

 – Use fraud-proving mechanisms to identify illegitimate transactions and penalise validators accordingly.

 – Depend on Ethereum mainnet for security, making them easier to implement and cost-effective compared to ZK-rollups.

Here are examples of operational rollup blockchains that simplify complex blockchain technology:

  • Optimism: an Ethereum optimistic rollup with a TVL of $700 million in November 2023. Optimism stands out for its standardised and open-source development stack, the OP Stack. Developers use it to launch their blockchains, and the native token is known as OP.
  • Base: An Ethereum optimistic rollup developed by Coinbase, one of the world’s largest crypto exchanges. Base does not have its own native token.
  • StarkNet: An Ethereum ZK-rollup leveraging zero-knowledge technology (STARK) for transaction computation and verification. The native token is called STRK.
  • Polygon Hermez: Polygon provides a suite of ZK-rollup solutions, Polygon Hermez is one of them, it employs Proof of Efficiency (PoE) consensus, allowing anyone to be a sequencer or aggregator.  Sequencers compile transactions, while aggregators validate and provide proofs to Ethereum. Polygon Hermez incentivizes honest behaviour and boasts decentralisation.

Benefits of Rollups

High Throughput

As can be seen from above, rollups, as a scaling solution for blockchains, deliver a remarkable boost in throughput. By efficiently processing and bundling multiple transactions together, they significantly enhance the overall capacity of the network. This surge in throughput ensures that a more extensive volume of transactions can be seamlessly handled, contributing to a smoother and more efficient blockchain experience.

Reduced Wait Time

Another prominent benefit ushered in by rollups is the substantial reduction in transaction wait times. Through the aggregation of transactions into batches, users experience quicker confirmation and processing.

Limitations of Rollups

Layer 2 blockchain solutions, while improving transaction speed and lowering costs, still face some important limitations. One concern is the risk of fraud by validators in Layer 2. Additionally, these solutions often sacrifice a bit of decentralisation for efficiency. Withdrawing from Layer 2 can be slow, as seen in plasma chains, and might involve added costs. 

Moreover, implementing Layer 2 solutions demands substantial computational power, making certain options less cost-effective for scenarios with lower activity. Despite these challenges, ongoing development in Layer 2 solutions remains vital for addressing blockchain scalability issues, playing an important role in the blockchain ecosystem’s future growth.

Hyperliquid: The Cost of Popularity – A Cautionary Tale for DeFi

A Complete Breakdown of the March 2025 Attack on Hyperliquid DEX

After its headline-making airdrop in November 2024, Hyperliquid quickly surged to the top ranks of decentralised exchanges (DEXs), overtaking heavyweights like Jupiter and dYdX. With blazing-fast transactions, zero KYC requirements, and deep liquidity pools, it became the go-to platform for crypto traders.

But in March 2025, the platform faced its biggest test yet.

On March 26, high-risk positions worth nearly $8 million were opened on Hyperliquid – positions that not only threatened the stability of the exchange but also put client assets in the Hyperliquidity Provider Vault (HLP) at risk. Behind the scenes, a series of suspicious trades and price manipulations hinted at a coordinated attack, leveraging vulnerabilities in both Hyperliquid and third-party platforms.

ExpertStack investigated the full timeline of events—analysing the attack, competitor responses, and the controversial decisions by Hyperliquid’s leadership that raised questions about decentralisation.

The Day of the Attack

Hyperliquid’s risk management relies on its HLP Treasury liquidity pools. Whenever a user opens a position, the system auto-executes a hedge. If a position is liquidated, the platform gradually buys back the asset—sometimes triggering a cascade.

On March 26, this mechanism was exploited to dramatic effect.

Attackers manipulated the price of JELLYJELLY, a low-liquidity token, on external platforms, creating a domino effect inside Hyperliquid’s system. At the time, HLP had around $290 million in its vault.

Key Timeline of Events:

⏱ Phase 0: “Market Preparation”
From 10:50 to 12:15 UTC, JELLYJELLY price rose by 13%, then sharply crashed by 93%-a stress test before the main strike. The drop, from $0.1287 to $0.00831, aimed to liquidate long positions and destabilise the HLP.

⏱ Phase 1: Building a Delta-Neutral Position
At 12:53 UTC, attackers opened large short positions ($4.08M) via address 0xde95…c91, while simultaneously placing long orders ($4.06M) through addresses 0x67fe…CA2 and 0x20e8…808 to hedge losses.

⏱ Phase 2: Triggering Liquidations
Minutes later, they withdrew available margins and partially closed shorts to prompt liquidations. One short of ~$254K closed at $0.073978. Shortly after, a short position of nearly 400 million JELLYJELLY was dumped into HLP. The attackers swiftly moved ~2.76M USDC to Arbitrum – locking in a manipulated short price of $0.011282.

⏱ Phase 3: Final Blow – The Pump and Dump
From 13:00 to 14:00 UTC, they aggressively bought JELLYJELLY across external exchanges, causing a 400% price surge to $0.05. Because Hyperliquid’s oracle relied on external spot prices, this manipulation immediately impacted derivatives and triggered massive unrealised losses.

JELLYJELLY price manipulation. Source: Lookonchain, Raydium.

Earlier transactions from March 15-25, flagged by Hyperliquid analysts, appeared to be dry runs – testing liquidation triggers and order types.

The Fallout

One attacker (a “whale”) successfully withdrew about $6.2 million, while another attempt to extract an additional ~$900K failed – leading to a net loss of ~$4K.

Hyperliquid halted trading, froze the price at $0.0095, and even ended with a slight gain of ~$700K. The team pledged full reimbursements to affected users.

Yet, this damage control sparked intense criticism. Influencers and Centralised Exchange (CEX) executives accused Hyperliquid of betraying the ideals of decentralisation and acting negligently.

Could CEXs Have Handled It Differently?

By April 8, 2025, Hyperliquid was handling ~$13B in daily perpetual trading volume – over 50% of the global DEX market share, per DeFi Llama. CoinGecko listed its open interest at $2.7B, beating major players like Deribit and even CEX arms like KuCoin and Crypto.com.

Hyperliquid accepts both USDC (via Arbitrum) and Bitcoin as collateral, giving users a rare ability to trade digital gold directly from their Web3 wallets.

On March 15, it captured 21% of Binance’s and 50% of Bybit’s volume in BTC futures – remarkable for a DEX.

But Hyperliquid’s team pointed fingers. Analysis suggested Bybit played a key role in the attack:

  • Oracle manipulation: Bybit’s spot data heavily influenced Hyperliquid’s margin price calculations.
  • Liquidity: Bybit’s deep order books allowed significant trades without slippage.
  • Market domination: With Binance not listing JELLYJELLY, Bybit’s pricing had outsized influence.

In short, attackers gamed Bybit’s data to distort Hyperliquid’s oracle.

Strategic Silence – or Not?

While manipulation happened through Bybit, other CEXs didn’t remain idle.

At 15:30 UTC, OKX listed JELLYJELLY perpetuals with 50x leverage. Binance followed at 16:00. The timing was… convenient.

Arthur Hayes, former BitMEX CEO, hinted at collusion. He cryptically framed OKX CEO Star Xu and ex-Binance chief CZ as having pounced on a weakened rival.

Hyperliquid’s Next Chapter

Despite the chaos, Hyperliquid’s core infrastructure remains strong. Built for scalability, it plans to integrate SVM and MoveVM, and leverages its custom HyperBFT consensus for potential L1 and L2 DeFi use cases.

In a March 31 interview with Wu Blockchain, LSD protocol developer Sean offered his perspective:

Binance and OKX feel threatened. They’re trying to recreate Solana-like dynamics by pushing meme tokens and onboarding users aggressively via BNB Chain.”

He also criticised influencers for disproportionately promoting CEXs and demonising Hyperliquid.

It’s fair to compete, but this narrative war is toxic. Centralised platforms aren’t saints – they have their own flaws. Their job is to enable fair trading, not run smear campaigns via influencers.”

Sean also acknowledged Hyperliquid’s shortcomings:

  • Closed-source limitations raise concerns about internal manipulation (e.g., MEV).
  • Insufficient blockchain transparency, such as lacking detailed account histories.
  • Dutch auction listings for low-cap tokens enabled overly large short positions.
  • Passive market maker design, if exploited, can lead to serious HLP losses.

The Bottom Line

The JELLYJELLY attack exposed real vulnerabilities – not just in Hyperliquid’s architecture, but in how DeFi interacts with centralised infrastructure.

More than just an isolated exploit, it was a wake-up call. It reignited debates around oracle reliance, systemic risk, and the blurry lines between CEXs and DEXs.

While Hyperliquid took swift corrective action and recovered financially, it now faces a trust battle—and a renewed mission to evolve its ecosystem without compromising its decentralised vision.

What’s next?
That’s a question the entire crypto world should be asking.

Crypto’s Quiet Takeover: How Lobbyists Infiltrated the White House

In the aftermath of the FTX collapse, the American crypto industry found itself at a crossroads. Disillusioned with the Democratic Party, many key players shifted their focus – and funding – toward Donald Trump’s inner circle. What we’re witnessing is the dawn of a new era: one where idealism takes a backseat to strategic alignment with traditional power structures.

At Expert Stack, we’ve unraveled the complex web linking major crypto entities to top officials in the new U.S. administration – and what they stand to gain.

The PayPal Powerhouse

Few figures are as influential in the American crypto lobbying landscape as Peter Thiel, PayPal co-founder and long-time venture capitalist. Thiel’s firm, Founders Fund, made a bold bet on Bitcoin back in 2014, exiting just before the 2022 crash with an estimated $1.8 billion in profit. By late 2023, the fund was back in the crypto game, investing $200 million ahead of the long-anticipated approval of Bitcoin ETFs.

Thiel’s influence doesn’t end with investments. His close associate and fellow venture capitalist, J.D. Vance – now the U.S. Vice President – benefited from a $15 million donation by Thiel during his 2022 Senate campaign. Vance later launched his own venture firm, Narya Capital, raising $93 million with backing from Thiel and Marc Andreessen, the co-founder of a16z.

Andreessen Horowitz (a16z) has been a key player in shaping crypto policy, funding the pro-crypto political action committee Fairshake with $140 million in support of Congressional candidates in 2024. Brian Quintenz, formerly a crypto policy director at a16z, was appointed chair of the Commodity Futures Trading Commission (CFTC) – a move that raised a few eyebrows in a now-familiar revolving door environment.

These players are closely tied to Elon Musk. In 2022, a16z, Binance, and Sequoia Capital were key investors in Musk’s Twitter acquisition. By 2024, they were advising Trump on key administration hires, per The New York Times. Notable figures include:

  • Marc Andreessen, a16z founder
  • Jared Birchall, Musk’s family office head and Dogecoin Foundation advisor
  • Sean Maguire, Sequoia Capital partner
  • Trey Stevens, Anduril co-founder
  • Shyam Sankar, Palantir CTO
  • David Marcus, Lightspark CEO and former Meta blockchain head

Musk himself leads the newly created Department of Government Effectiveness (DOGE), while David Sacks, former PayPal COO, was named the administration’s “crypto czar.”

But there’s another major player worth noting.

Tether’s Treasury Ties

One of the most strategic players in the crypto-political nexus is Tether, now among the top 20 buyers of U.S. government debt. The acquisition and custody of these bonds is managed by Cantor Fitzgerald, led by Commerce Secretary Howard Lutnick. The firm also reportedly owns 5% of Tether.

Digging deeper into Tether’s origins reveals billionaire Brock Pierce – co-founder of EOS, director of the Bitcoin Foundation, and an early pioneer in crypto’s grey areas, including the infamous Mt. Gox debacle. Pierce is only one degree removed from Trump via Steve Bannon, the former White House Chief Strategist. In the early 2000s, Pierce founded Internet Gaming Entertainment (IGE), a trailblazer in digital currency trading for online games. Bannon joined IGE as CEO in 2006.

Although Bannon later claimed that Pierce’s support for Trump in 2016 hindered their crypto collaboration, their shared past is telling.

In 2019, EOS purchased a domain from MicroStrategy for $30 million to launch the social platform Voice, with investors like Thiel, Bitmain, and Galaxy Digital’s Mike Novogratz backing the project.

A year later, Michael Saylor, CEO of MicroStrategy, made headlines by investing $250 million of the company’s capital in Bitcoin. By March 2021, institutional giants like BlackRock, Morgan Stanley, Vanguard, and Citadel held over 40% of MicroStrategy’s shares – suggesting broad financial sector approval.

Latecomers to the Power Game

More recently, firms like Coinbase, Grayscale, and its parent company Digital Currency Group (DCG) – led by Barry Silbert, a key early investor in Ripple, Coinbase, and CoinDesk- have entered the lobbying arena with renewed force.

DCG’s influence crosses party lines. Lawrence Summers, a former Treasury Secretary under Bill Clinton and Obama’s National Economic Council Director, serves as an advisor to the firm – highlighting bipartisan lobbying efforts.

The fall of FTX in 2022 dramatically shifted the political balance. The Democratic Party’s perceived mishandling of crypto regulation, personified by former SEC Chair Gary Gensler, alienated many in the industry – especially after revelations about his connections to Sam Bankman-Fried’s family.

As the landscape evolves, the new market consensus favours U.S.-based crypto ventures and dollar-backed stablecoins under more centralised oversight. Even previously neutral entities are now joining the political fray: Coinbase pledged $25 million to Fairshake for the 2026 midterms, while Ripple contributed $5 million to Trump’s inauguration fund.

Meanwhile, Saylor has taken a provocative stance, calling for the demise of gold as an asset class to weaken U.S. adversaries and tighten America’s grip on global capital reserves.

Conclusion

What began as a decentralised, anti-establishment movement has morphed into a sophisticated lobbying machine. Today’s crypto leaders are not challenging the state – they’re becoming part of it. And on social media, the revolutionary spirit of early crypto seems to be fading, replaced by a new wave of corporatised, state-aligned ambition.

How AI is Revolutionising Behavioural Biometrics For Authentication

Advanced technology like AI is completely changing the world of behavioural biometrics. A new and much better era of secure authentication procedures is being developed. For instance, monitoring the individual characteristic traits of a user like their writing tempo, movement of the mouse, and pressing on touchscreens makes possible AI powered behavioural biometrics and gives verification continuously and without interruption, thus making the experience better for the user and securing it more efficiently.

The History of Behavioural Biometrics

From the very beginning, every authentication system that utilises passwords and biometrics like fingerprints have been vulnerable to bypassing. On the other hand, behavioural biometrics employ dynamic interactions and actions performed by users which are nearly impossible to imitate, strengthening the security framework. Here, AI plays a critical role by examining massive amounts of user interactions in real-time by detecting small deviations that conventional systems would miss.

AI’s Role in Enhancing Behavioural Biometrics

With AI, relevant traits can be extracted from user interactions, and behavioural data may be turned into measurable metrics. User validation allows the application of intrinsic pattern recognition and the more advanced methods like neural networks and support vector machines. Continuous monitoring enables instant detection of anomalies, which aids in responding rapidly to security risks and unauthorised access.

Real-World Applications and Metrics

  1. Fraud Detection in Financial Services: A leading European insurer implemented behavioural biometrics to analyse how claimants interacted with online forms, detecting unnatural typing patterns and navigation behaviours indicative of fraud. This led to a 40% reduction in fraudulent claims within six months.
  2. Enhanced Customer Experience: An American health insurance company used behavioural biometrics for customer authentication, recognising users based on their interaction patterns with the company’s app. This approach reduced average customer service call times by 30%, significantly improving customer satisfaction.
  3. Risk Assessment Accuracy: A life insurance provider in Asia incorporated behavioural biometrics to refine risk assessment models by analysing lifestyle patterns affecting health and longevity. This led to more accurate premium calculations and personalised insurance packages.

Privacy and Needed Ethics

The application of AI in behavioural biometrics comes with notable ethical and data privacy issues. Even though these systems increase security, they need to be applied with care and responsibility, given the nature of the data. Security, user privacy, and inclusivity need to be balanced very carefully. Approaches like federated learning and edge computing provide the means for AI models to be trained on the user’s device, which greatly minimises the danger of breaches and strengthens compliance with privacy laws such as the GDPR.

Challenges and Future Outlook

Though promising, behavioural biometrics struggle with privacy and accuracy, as well as general user acceptance. Businesses in the field need to fortify protections and gain consent from users to avoid oversharing sensitive information. Usability and security have to be balanced because excessive false acceptances or rejections can undermine user trust in the system. Building trust requires addressing cultural differences along with the need for openness. Incorporating ethics focused on privacy, consent, and robust security makes the system more reliable.

With the advancement of technology, the integration of AI with behavioral biometrics will enhance authentication systems across numerous industries, providing users the ideal security and convenience.

Wallets of darknet marketplace Nemesis hit by US sanctions

The US Treasury Department’s Office of Foreign Assets Control (OFAC) has added 44 Bitcoin and five Monero addresses associated with the closed darknet marketplace Nemesis Market to the SDN.

The press release says they were controlled by Iranian citizen Behrouz Parsarad, who was allegedly the platform’s administrator.

On March 20, 2024, BKA seized Nemesis Market infrastructure in Germany and Lithuania, disrupting its operations. In the process, police confiscated digital assets worth €94,000.

The investigation began in October 2022.

The platform, created in 2021, sold drugs, stolen data and credit cards, as well as cybercriminal services, including ransomware, phishing, and DDoS.

Before the shutdown, Nemesis had an active audience of 30,000 users who carried out ~$30 million in drug transactions.

Parsarad received millions of dollars in commissions from the transactions and facilitated the laundering of digital assets, according to OFAC.

The administrator remains at large. According to the agency, Parsarad may have “discussed the creation of a new darknet market” with former suppliers.

Recall that in April 2022, German police confiscated the servers of the darknet marketplace Hydra and seized 543 BTC, and the US Treasury imposed sanctions on the platform.

That same month, an American court indicted Russian Dmitry Pavlov in absentia for administering Hydra, providing it with hosting services, conspiring to launder money, and distributing drugs. At the same time, the Meshchansky District Court of Moscow arrested Pavlov on another charge.

In December 2024, the Moscow Regional Court sentenced Hydra founder Stanislav Moiseev to life imprisonment and a fine of 4 million rubles.

The Billion-Dollar Heist: How Bybit Survived the Largest Crypto Hack in History

On February 21, the cryptocurrency world was shaken when Bybit, one of the largest Bitcoin exchanges, fell victim to a staggering $1.5 billion hack – marking it as the biggest cyber heist in crypto history. Despite the massive breach, the platform continued operating, thanks in part to swift crisis management and the backing of industry heavyweights.

How the Hack Unfolded

On February 21, on-chain detective ZachXBT reported suspicious ETH outflows from Bybit. We are talking about 499,395 ETH (about $1.46 billion at the time). The assumptions about the hack were confirmed by the company’s CEO Ben Zhou, and his employees almost immediately published a statement according to which the incident occurred when transferring ETH from cold multisig storage to a hot wallet.

The attackers replaced the transaction signing interface so that all participants in the procedure saw the correct address. At the same time, the logic of the smart contract was changed, and the hackers gained control of the ETH wallet and withdrew all the funds.

Zhou hastened to reassure clients and emphasized that the platform remains solvent and continues to process withdrawal requests, albeit with a delay: within about 10 hours after the hack, the exchange recorded a record number of withdrawal requests – more than 350,000. At that time, about 2,100 requests remained pending, while 99.994% of transactions were completed.

Nevertheless, the platform’s CEO still asked partners to provide a loan in ETH – the funds were needed to cover liquidity during the crisis period. As a result, more than 10 companies supported the exchange.

Huobi co-founder Du Jun contributed 10,000 ETH and promised not to withdraw it for a month. The co-founders of Conflux and Mask Network also announced the deposit of Ether to the exchange’s cold wallets. Coinbase Head of Product Conor Grogan wrote that Binance and Bitget sent >50,000 ETH there too.

According to reporter Colin Wu, 12,652 stETH (around $33.75 million) were transferred from MEXC to Bybit’s cold wallet.

The ETH price responded to the Bybit hack by falling to $2,625 (Binance), but recovered fairly quickly. By the evening of February 23, the quotes momentarily exceeded $2,850, after which they corrected to $2,690 (as of February 24).

Bybit representatives said that information about the incident has been “reported to the relevant authorities.” In addition, cooperation with on-chain analytics providers has allowed them to identify and isolate the associated addresses, limiting the attackers’ ability to “withdraw ETH through legitimate markets.”

As of February 24, Bybit has fully restored its Ethereum reserves (~444,870 ETH).

Who Was Behind the Attack?

According to ZachXBT, unknown individuals quickly exchanged some of the stolen mETH and stETH tokens for ETH via decentralized exchanges. 10,000 ETH were divided between 36 wallets.

The founder of DeFi Llama, 0xngmi, noted that the methods in this attack are similar to the incident with the Indian exchange WazirX in July 2024. At that time, Elliptic analysts concluded that North Korean hackers were behind the attack.

0xngmi’s assumption was confirmed by Arkham Intelligence. According to them, on the day of the Bybit hack, ZachXBT investigator “provided irrefutable evidence of Lazarus Group’s involvement in the hack”:

Its analysis contains a detailed analysis of test transactions and associated wallets used before the attack, as well as a number of graphs and timestamps. This data has been transferred to the exchange team to assist with the investigation.”

The founder of the AML service BitOK and crypto investor Dmitry Machikhin noted that the stolen cryptocurrency is actively being withdrawn from the Ethereum network to other blockchains. According to his observations, immediately after the hack, the assets were distributed to 48 different addresses.

At the second stage:

  • crypto assets from these addresses were gradually split into even smaller parts (50 ETH each);
  • funds were sent through bridges (eXch and Chainflip) to other networks.

The image shows how one of the 48 addresses splits the transactions into 50 ETH and goes to Chainflip.

According to Taproot Wizards co-founder Eric Wall, the North Korean hackers are likely to convert all ERC-20 tokens to ETH, then exchange the resulting ETH for BTC, and then gradually transfer the bitcoins to yuan through Asian exchanges. In his opinion, the process could take years.

ZachXBT reported that Lazarus transferred 5,000 ETH to a new address and began laundering the funds through the centralized mixer eXch, and then transferred them to bitcoin through Chainflip. The latter said that they have recorded attempts by the attackers to withdraw the stolen funds from Bybit in bitcoin through their platform. They disabled some front-end services, but it is impossible to completely stop the protocol, given its decentralized structure with 150 nodes.

The mETH Protocol team reported that they blocked the withdrawal of 15,000 cmETH (~$43.5 million) and redirected the assets from the attacker’s address to a recovery account. Tether CEO Paolo Ardoino said that the company froze 181,000 USDT related to the attack.

In a comment to ForkLog, Bitget CEO Gracie Chen emphasized that “the exchange’s systems have already blacklisted the attackers’ wallets.”

As of February 23, the attackers had exchanged 37,900 ETH (about $106 million) for bitcoin and other assets through Chainflip, THORChain, LiFi, DLN, and eXch. The hackers’ address still had 461,491 ETH of the 499,395 ETH stolen.

What to do?

After the hack, some community members started talking about rolling back the state of the Ethereum network to return the stolen funds. Thus, former BitMEX CEO Arthur Hayes noted that as an investor with large ETH reserves, he would support the community’s decision in the event of a chain rollback to an earlier state – as after the hack of The DAO in 2016.

Bitcoin maximalist Samson Mow also spoke out in support of restoring the blockchain, but leading Ethereum developer Tim Beiko criticized the idea. According to him, the Bybit incident involved an incorrect presentation of transaction data in the hacked interface, and not technical problems.

In addition, after the hack, the funds quickly spread across the complex ecosystem of the second-largest cryptocurrency by capitalization. “Rolling back” the network would mean canceling many legitimate transactions, some of which are related to actions outside the Ethereum network. The Vice President of Yuga Labs, nicknamed Quit, also drew attention to this. He added that many ordinary users would lose money, and the accounting systems of large players like Circle and Tether would collapse.

What’s the bottom line

The Bybit hack turned out to be the largest in the crypto industry so far. However, the head of Bitget did not find any reason to panic: according to her, the losses are equivalent to Bybit’s annual profit ($1.5 billion), and clients’ funds are completely safe.

The incident did not affect market sentiment either. According to Glassnode, the implied volatility of the first cryptocurrency is close to record lows. Price fluctuations against the backdrop of the hacker attack decreased after Strategy founder Michael Saylor published a chart of the company’s coin purchases.

This time, there was no platform crash or market panic, and a quick response and community participation helped restore liquidity and partially block the stolen assets. However, the incident highlighted a persistent problem – even large centralized platforms are still susceptible to attacks and vulnerable to hackers.