Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Three Fronts in Urgent Danger: Nodes, Hackers, and AI

CN
智者解密
Follow
1 hour ago
AI summarizes in 5 seconds.

By April 22, 2026, three seemingly disparate events were concurrently presenting themselves in the crypto industry: Everstake announced its exit from the Celestia validator network, requiring TIA holders currently delegated to its nodes to complete redelegation or unstaking by April 28; Lazarus was revealed to be launching a targeted attack campaign named “Mach-O Man,” directly aimed at executives of crypto and fintech companies; on another front, Google publicly stated that about 75% of all its new code has been generated by artificial intelligence, with over half of its machine learning investments directed towards cloud services. When viewed together, the question shifts from who triggered another round of short-term volatility, to who controls the infrastructure, who exposes new risks, and who is rewriting the next phase of production processes.

What is truly alarming is not the impact of isolated incidents but that the industry is simultaneously entering a period of transition: at the node operation level, the exit of validators has brought the supply, delegation migration, and trust distribution back into focus; at the management equipment level, threats are extending from systems and platforms to critical personal endpoints; at the software production line level, AI-driven coding acceleration means that the power of development, pressure for review, and logic of efficiency are all changing. These three events are actually one event—ranging from on-chain nodes, to devices in the hands of executives, to code repositories of engineering teams, the crypto industry is reanswering the same question: who truly holds the key entry points.

Countdown to exit pushing towards April 28

First, let’s clarify the established facts: Everstake, a well-known staking service provider, has announced its exit from the Celestia validator network. For external observers, the most pressing part of this issue is not speculation surrounding the motives but that TIA holders currently delegated to Everstake nodes must complete redelegation or unstaking before April 28, 2026. The time anchor arrives on April 22, 2026, which means the pressure is no longer an abstract discussion but has clearly escalated to an operational level.

The real disruption is therefore quite specific: who will take over the original delegations, how holders will choose new nodes, and how services will transition smoothly in the short term. For a modular blockchain network like Celestia, the departure of a validator first rewrites the flow of delegation and selection structure, which may subsequently affect validator diversity and the range of choices for stakers. The market will certainly exhibit emotional reactions, but at this stage, the more realistic questions are whether the migration is timely, whether the nodes are suitable, and whether the delegations can be processed within the window period.

Information boundaries also need to be clarified. The briefing did not disclose the public reason for Everstake's exit, so any interpretation of this departure as a commercial dispute, technical issue, or the so-called "internal strategic adjustment" or "optimization" should not be taken as established facts. Especially regarding "internal strategic adjustment/optimization," it is currently only unverifiable information and insufficient for conclusions.

In other words, this is not an event that has been thoroughly explained but a departure that occurred first, awaiting clarification. The most important thing right now is not to complete the story for the market but to closely monitor the progress of delegation migration before April 28, and how the Celestia network will handle the transition after this round of node replacement.

Who will fill the gap after a major node exits?

If the previous section discussed an exit announcement that has not been clearly explained, then this section truly requires focus on the ecological reactions external to the announcement. For a modular blockchain network like Celestia, the exit of Everstake means more than just "losing a service provider"; it indicates that the pressure test on the validator ecosystem has begun: when a top node departs, whether the network can smoothly disperse the delegations determines the resilience of validator distribution, not public sentiment regarding a company's retention.

In the short term, the most direct observation window has already been provided. TIA holders currently delegated to Everstake nodes need to complete redelegation or unstaking by April 28, 2026. This timeline is critical not just because the operational deadline is approaching, but because it quickly concretizes an otherwise abstract question: where will the delegations originally tied to a single large node flow next?

The core conflict here is the tension between the narrative of decentralization and the actual concentration of service. On-chain networks can emphasize openness, substitutability, and permissionlessness, but in practice, stakers’ choices are often guided by brand, operational capabilities, historical knowledge, and usage inertia. Hence, after a major node exits, the theoretical “decentralized migration” may not occur naturally, and delegations may continue to converge towards a few more familiar large nodes. If this happens, Everstake's exit will not only leave a vacancy on the list but also further compress the diversity of the Celestia validator set and the options available to stakers.

Therefore, this situation is better seen as the beginning of a reshuffle in the validator market. The validator network has never been a static list but a continuously competitive supply network: when someone exits, it means someone else is stepping in; nodes capable of taking over will attract more attention, and platforms with clearer paths to take over will draw more delegations, while hesitant stakers will recalibrate their risk preferences during this migration. Some will place greater emphasis on decentralized allocations, while others will tend to give their chips to fewer service providers that appear more "stable." Choices themselves are rewriting the market structure.

At this stage, the most important constraint is still the urge to explain. Public materials have not disclosed the specific reasons for Everstake's exit, and this information gap cannot be filled arbitrarily. What is truly worth tracking is not to find a seemingly complete motive for the event but to observe whether Celestia can prove one thing through this migration before April 28: when a significant node exits, the network can still rely on a broader capability of validators to achieve self-repair, rather than pushing more weight back towards other larger centers.

Macs no longer secure: hackers targeting executives

If the previous line of inquiry tests whether the network layer can maintain resilience after node exits, then another risk line that emerged at the same time has directly pushed the focus onto individuals’ desktops. The Lazarus group, revealed to be initiating the "Mach-O Man" operation, is not doing generalized dissemination aimed at regular users; this more glaring change lies in the clear targeting of executives in the cryptocurrency and fintech industries.

This pointed focus changes the nature of the event entirely. In the past, industry discussions on security often concentrated on protocols, infrastructure, and trading platforms, focusing on these systemic aspects; however, Lazarus, as a state-supported organization that has long targeted entities connected to the crypto industry, now sharpening its focus on management-level devices means that attackers are bypassing the visible “walls” and directly entering the devices, communication, and workflow channels used every day by decision-makers. The defense line is no longer just a set of system permissions or a group of multi-signature processes, but rather has been pulled into the personal workflow itself.

The more subtle impact lies in the psychological layer. For a long time, macOS has carried an inherent image of being "more secure" among many industry professionals, especially in positions that frequently handle sensitive communications, documents, and account operations, this trust has nearly become the default setting. The reason “Mach-O Man” is concerning is not merely the amount of fully verified technical details it provides, but because it is breaking through this habitual trust: when an attack clearly targets executives, the platform's preference itself no longer serves as a source of security but may instead become a prerequisite condition in the attack design.

This also signals a shift in the industry safety landscape. The attack targets extending from protocols to exchanges, then to management-level devices, indicates that the actual point of contention has shifted from “are there vulnerabilities in the system” to “at which stage will key individuals be exposed.” As of now, the briefing has not confirmed the specific platform used for the so-called fraudulent meeting invitations in these attacks, and these details cannot be written into conclusions; yet, even aside from the technically unverifiable paths, the very upgrade in target selection is sufficiently telling: at the point of April 22, 2026, the external threats facing the industry are not only direct impacts on on-chain assets and institutional systems but also include directed infiltration into the entry points for high-level judgment, communication, and execution.

Behind the poisoned apple is a national-level patient hunt

If the previous layer of risks was still at the level of “a specific sample, a phishing link, a meeting invitation,” then a deeper layer is actually about the adversary’s strategy. The signals provided in the briefing on April 22, 2026, are clear: Lazarus remains one of the major external threats faced by industry security, and its long-standing focus includes not just visible financial and system entry points like exchanges and DeFi protocols but also the enterprises, management, and critical endpoints connected to them.

What makes this threat most concerning is not whether the name is fresh but its patience. State-sponsored APT organizations tend not to be content with a one-time credential dumping or broad net-style dissemination; rather, they excel at long-term observation, repeated probing, and specifically targeting the most valuable people and devices. The recently disclosed "Mach-O Man" operation has drawn alerts not merely because of how special a sample code name it is but because it points to a more dangerous fact: executives are being individually managed as breakthrough points.

Therefore, what the industry really needs to review is not merely the names of malicious programs, what languages were used, or which ports were exploited. The briefing also clearly reminds that discussions around malware stealing credentials, browser data, keychains, utilizing LaunchAgent for persistence, or transmitting data with Telegram bots, and the specifics of “Mach-O Man” employing multi-stage Go binaries with disclosed C2 ports and forensic indicators are all currently classified as unverifiable information and should not be taken as established facts; the direct evidence connecting Lazarus to recent hacking incidents was also not confirmed in the briefing. In other words, what we should pay attention to now is how attackers approach individuals, how they gain trust, and how they slowly pry one endpoint's permissions into internal institutional permissions.

For institutions, this means that defenses must advance. Are executives' social links overly reliant on single points? Are meeting invitations and external collaborations generally trusted? Do terminal devices bear excessive access rights? Are internal permission boundaries sufficiently detailed and short? These questions are more important than simply remembering a sample name. Because what national-level adversaries truly exploit often lies not in any particular technical trick but in those long-neglected default settings within organizations: who can directly access core decision-makers, whose devices can access critical backends, and who possesses the permissions in cross-departmental processes to “see more easily.”

From this perspective, the "poisoned apple" is not just a scenario where a terminal gets infected but a more sophisticated hunting logic: first approaching the most valuable people, then getting close to their most frequently used devices, and finally testing how many institutional-level entry points this device connects to. Sample names may change, delivery methods may change, and external pathways may also change, but this patient, sustained, and targeted approach is precisely the aspect of this round of risks that should not be underestimated.

Google writes AI into the main code pipeline

If the previous two lines are about contesting entry points and control, then this line signifies that production itself is being rewritten. Google recently stated that about 75% of all its new code is generated by artificial intelligence; at the same time, over half of its machine learning investments are directed toward cloud services. Both figures in the briefing were marked as being from a single source, but even if treated as a signal released by a single company, their implications are already quite clear: AI is no longer just a tool for efficiency attached to engineering processes but is being pushed into the main code pipeline, beginning to approach a "main driver" position.

This is also where this timeline poses a true cause for concern. While 75% can certainly be interpreted as a leap in efficiency, its deeper significance is that the production relationships of software are being redistributed. As code generation increasingly falls to models, the focus of engineers is likely shifting away from line-by-line production towards reviewing results, setting constraints, monitoring system boundaries, and taking responsibility for final outputs. In other words, the human role hasn’t disappeared but has shifted back, while responsibilities have moved upward: from direct producers to process supervisors and system gatekeepers.

The problem is that capacity enhancement and increased dependence have always been two sides of the same coin. The more code generated by machines, the more organizations need to trust and rely on those models, and the more they need to accept the pressures that come with interpretability, division of responsibilities, and process restructuring. On the surface, this appears to be an upgrade of the engineering toolchain; in substance, it is altering who can dictate the pace of development, who can control quality thresholds, and who holds the most critical entry points to production. At this stage, AI-generated coding has ceased to be a mere localized experiment of a team but is pressuring the main processes of the industry.

Notably, the fact that over half of Google's machine learning investments flow into cloud services also reveals the changing commercial focus of this shift. This means that AI's deepening involvement in code generation is not just a natural extension of technical ideals but is also serving new narratives and income logics for infrastructure. The rewriting of production methods is advancing in sync with the platformed commercial focus. For the industry, this indicates that future competition will not only be about who can use AI to code but also about who can still maintain review authority, constraint authority, and system-level judgment under stronger model dependencies.

Nodes, computers, and code are all shifting gears

When these three lines are placed back within the same picture, the changes point to the same issue: the industry is reevaluating its trust base. On the node side, Everstake's exit from the Celestia validator network has pushed the previously relatively static supply structure into a reshuffling phase; on the security side, Lazarus’s “Mach-O Man” operation indicates that what is truly exposed on the front lines is not only systems and protocols but also the individuals who hold key permissions and information; on the production side, Google has publicly disclosed that about 75% of its new code is generated by AI, with over half of its machine learning investments directed towards cloud services, signifying that AI is no longer just an efficiency tool but is now entering core production processes and commercialization pathways.

The next key points to monitor are not emotions but several clear observation points. The most immediate is how the positions originally allocated to Everstake on Celestia will migrate after April 28: will they flow towards more decentralized validators or further concentrate around a few nodes? This decision will determine how this reshuffling of supply will ultimately rewrite the choice structure within the network. The second observation point is whether more comprehensive evidence chains will be disclosed following "Mach-O Man." So far, victims, loss scales, and complete technical linkages have not been confirmed in the briefing; the truly important thing is not to jump to conclusions but to see which information can be continually verified. The third observation point is whether the Google-style AI coding pathway will expand from a single company’s statement to a more widespread industry benchmark; if the answer is affirmative, production, review divisions, and boundary responsibilities will all be redefined.

Thus, this round of changes should not merely be understood as a simultaneous outbreak of crises. A more accurate phrasing would be that the industry is entering a new phase: with the quality of infrastructure becoming more important than the speed of narratives, operational discipline becoming more important than the quantity of tools, and the ability to retain review capacity becoming more crucial than automation itself. Nodes, endpoints, and code are all shifting gears, and what will truly dictate the next phase of differentiation is which participants continue to prove themselves worthy of trust amidst this transition.

Join our community to discuss and become stronger together!
Official Telegram community: https://t.me/aicoincn
AiCoin Chinese Twitter: https://x.com/AiCoinzh
OKX welfare group: https://aicoin.com/link/chat?cid=l61eM4owQ
Binance welfare group: https://aicoin.com/link/chat?cid=ynr7d1P6Z

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by 智者解密

3 minutes ago
BlackRock's holdings reach a new high, Bitcoin surpasses 79,000.
36 minutes ago
UK raids 8 off-site trading locations, Wall Street in the US urges for deregulation.
55 minutes ago
Why is there a repeat of the $430 million shorting of oil prices?
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatar智者解密
3 minutes ago
BlackRock's holdings reach a new high, Bitcoin surpasses 79,000.
avatar
avatar智者解密
36 minutes ago
UK raids 8 off-site trading locations, Wall Street in the US urges for deregulation.
avatar
avatar泡沫追逐者
49 minutes ago
The Great Immortal said about coins: The interest rate cut expectation on April 22, combined with the extension of the ceasefire! Bitcoin strongly broke through the 78,000 level!
avatar
avatar智者解密
55 minutes ago
Why is there a repeat of the $430 million shorting of oil prices?
avatar
avatar智者解密
1 hour ago
The mystery surrounding Satoshi Nakamoto has not dissipated, and Wall Street miners have already taken the lead.
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink