Reading view

There are new articles available, click to refresh the page.

From Boom To Goodbye: NFT Marketplace Nifty Gateway To End Operations

Nifty Gateway, the marketplace that once helped bring NFT drops to a wider audience, will stop running its marketplace on February 23, 2026. The company put the site into a withdrawal-only mode the same day it made the announcement, and users were told they must move any remaining funds and NFTs off the platform before that date.

Withdrawal Window Opens

According to the company, withdrawal tools are available now. Reports note users can pull USD or ETH balances through a linked Gemini Exchange account or send funds to their bank via Stripe.

Emails with step-by-step instructions will be sent to account holders, and a shutdown notice already appears on the Nifty Gateway homepage. The aim, as described by the owner, is to let people retrieve what they own before the platform goes dark.

Today, we are announcing that the Nifty Gateway platform will be closing on February 23, 2026. Starting today, Nifty Gateway is in withdrawal-only mode.

Nifty Gateway was launched in 2020 with the vision of revolutionizing digital art. Since launching, Nifty supported dozens of…

— Nifty Gateway Studio (@niftygateway) January 24, 2026

A Decision To Reassign Resources

Based on reports from Gemini, the closure is meant to let the parent firm concentrate on building one bigger app for customers. The move highlights how interest and trading activity in many NFT markets have cooled from the highs seen in earlier years.

Some collectors and artists are left scrambling to rehome items they once sold or stored on Nifty Gateway.

End Of An Early Player

Nifty Gateway helped make buying NFTs easier for people who preferred credit cards and familiar checkout flows. It launched as a high-profile marketplace and hosted major drops from well-known creators.

The platform supported hundreds of millions in sales at its peak and played a clear part in bringing NFT art into mainstream headlines. Its exit marks the end of an important chapter for that wave of marketplaces.

What Owners Must Do Now

Owners should check their inboxes for the official instructions, confirm where their tokens are stored, and move assets before the deadline. If NFTs are stored in custodial wallets on the site, they will need to be transferred out.

USD and ETH balances should be withdrawn or moved into a connected Gemini account if that option suits the owner. Waiting past the closure date will reduce options.

A Quiet Turning Point

For many collectors, this will feel like another sign that the early boom years have passed. For creators, the change raises questions about where drops and secondary sales will happen next.

Gemini says it will keep supporting NFTs through its other products, including the Gemini Wallet, but the specific ways that creators and buyers reconnect with those audiences will depend on new tools and services that arrive in the next months.

Featured image from Unsplash, chart from TradingView

Choosing the Best Cryptocurrency Exchange Development Company: Why ITIO.in Leads the Way

Cryptocurrency exchanges are the backbone of the digital asset economy. They enable users to buy, sell, and trade cryptocurrencies securely while supporting liquidity, price discovery, and market growth.

As the crypto market continues to mature, businesses entering this space or scaling existing platforms must make one critical decision early on:

Choosing the right cryptocurrency exchange development company.

Image is created by ChatGPT

The wrong partner can lead to security gaps, scalability issues, regulatory trouble, and delayed launches. The right one accelerates time-to-market, ensures compliance, and builds long-term competitive advantage.

This guide explores what to look for in a crypto exchange development company and why ITIO Innovex is a preferred choice for businesses worldwide.

Understanding Cryptocurrency Exchange Development Services

Cryptocurrency exchange development services involve building, customizing, and deploying secure platforms that allow users to trade digital assets efficiently.

These services typically include:

Core Features of Cryptocurrency Exchange Development

1. Scalable Platform Architecture

A well-designed exchange must handle high transaction volumes while maintaining performance, uptime, and data integrity. Scalability is critical for future growth.

2. User Interface (UI) & User Experience (UX)

An intuitive, trader-friendly interface improves adoption, reduces friction, and enhances retention especially for first-time users.

3. High-Performance Trading Engine

The trading engine is the heart of the exchange. It must support:

  • Fast order matching
  • Multiple order types
  • Real-time price updates
  • High concurrency

Security & Compliance: Non-Negotiables in Crypto Exchange Development

1. Advanced Security Measures

A reliable exchange integrates:

  • Multi-factor authentication (MFA)
  • End-to-end encryption
  • Cold and hot wallet architecture
  • DDoS protection and monitoring

2. Regulatory Compliance

Adherence to global standards such as:

  • AML (Anti-Money Laundering)
  • KYC (Know Your Customer)

is essential for legal operation and long-term trust.

🔔 Thinking of Launching a Crypto Exchange? Pause Here

Before investing heavily, a short technical review can save months of rework and costly mistakes.

👉 DM us directly or book a free consultation with ITIO Innovex
🌐 https://itio.in/
📩 Message us on LinkedIn or request a callback

https://cal.com/alok01/30min

No sales pressure- just clarity.

Additional Cryptocurrency Exchange Development Services

  • Wallet Integration: Secure hot and cold wallet implementation
  • API Integration: Liquidity providers, algorithmic trading, third-party tools
  • Multi-Currency & Multi-Pair Support
  • Admin Dashboards & Risk Management Tools

How to Choose the Best Cryptocurrency Exchange Development Company

When evaluating development partners, consider the following critical factors:

Industry Experience & Reputation

Choose a company with a proven track record in blockchain and crypto exchange development, backed by real-world deployments.

Customization & Scalability

Your exchange should evolve with market demands. A flexible architecture enables feature expansion and regional adaptation.

Security & Compliance Focus

Security breaches can destroy trust overnight. Your development partner must prioritize security and regulatory readiness from day one.

Technology Stack & Features

Ensure access to:

  • High-performance trading engines
  • Liquidity management solutions
  • Support for multiple cryptocurrencies and networks

Support & Maintenance

24/7 technical support and proactive maintenance are essential for uninterrupted operations.

Why Businesses Choose ITIO for Cryptocurrency Exchange Development

ITIO Innovex stands out as a trusted cryptocurrency exchange development company delivering secure, scalable, and fully customized solutions.

Proven Expertise

With deep experience in blockchain and fintech, ITIO has delivered exchange platforms across diverse business models and global markets.

Customization & Innovation

Every exchange is tailored to your branding, workflows, and growth strategy no rigid templates, no limitations.

Enterprise-Grade Security & Compliance

ITIO integrates advanced encryption, secure wallet systems, and AML/KYC compliance to protect user funds and platform integrity.

Global Reach & Market Readiness

Support for:

  • Multi-currency trading
  • Global payment systems
  • Region-specific compliance requirements

End-to-End Technical Support

From ideation to deployment and ongoing optimization, ITIO’s blockchain experts ensure your exchange operates smoothly and scales confidently.

🚀 Ready to Build or Upgrade Your Crypto Exchange?

Whether you’re launching a new exchange or enhancing an existing one, the right technology partner makes all the difference.

👉 Visit: https://itio.in/
📩 DM us for a quick discussion
📞 Request a callback to explore your exchange strategy

https://cal.com/alok01/30min

Let’s build a secure, scalable, and future-ready crypto trading platform together.

Conclusion

Choosing the best cryptocurrency exchange development company is a strategic decision that directly impacts security, scalability, and long-term success.

By evaluating experience, customization capabilities, compliance readiness, and technical support, businesses can avoid costly missteps. ITIO Innovex delivers all of this making it a reliable partner for cryptocurrency exchange development in today’s fast-evolving digital asset landscape.


Choosing the Best Cryptocurrency Exchange Development Company: Why ITIO.in Leads the Way was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

Why PCI DSS Remains Crucial in Today’s World (2026 Perspective)

In an era where digital payments dominate everyday transactions — from online shopping and mobile wallets to contactless in-store purchases — the security of cardholder data has never been more critical. The Payment Card Industry Data Security Standard (PCI DSS) stands as the global benchmark for protecting sensitive payment information. Developed by the PCI Security Standards Council (PCI SSC), it applies to any organization that processes, stores, or transmits credit or debit card data.

Generative AI

1. Exploding Cyber Threats and Data Breaches

Cyberattacks targeting payment systems have surged. Ransomware, phishing, supply-chain exploits, and advanced persistent threats (APTs) are common. Non-compliant businesses face higher breach risks — studies show compliant organizations experience up to 50% fewer incidents. A single breach can expose thousands of card records, leading to massive fraud and identity theft. PCI DSS enforces controls like encryption, access restrictions, and vulnerability management to minimize these risks.

2. Building and Maintaining Customer Trust

Consumers now prioritize security when choosing where to shop. A visible commitment to PCI DSS signals reliability — think “Your card details are safe with us.” In contrast, a breach erodes trust overnight, resulting in lost customers, negative reviews, and long-term reputational damage. Compliant businesses often see higher conversion rates and loyalty because customers feel protected.

3. Avoiding Severe Financial and Legal Penalties

Non-compliance carries heavy costs:

  • Fines from card brands (up to $100,000+ per month in severe cases)
  • Increased transaction fees
  • Liability for fraud losses and breach-related expenses (legal fees, notifications, credit monitoring)
  • Potential loss of payment processing privileges

With stricter enforcement under v4.0.1 — including mandatory MFA for admin access, enhanced password policies, anti-phishing measures, and continuous monitoring — regulators and acquirers are less tolerant of lapses.

4. Enabling Secure Digital Innovation

Modern businesses rely on cloud services, APIs, e-commerce platforms, and third-party processors. PCI DSS v4.0.1 introduces flexibility (e.g., customized approaches and targeted risk analysis) while raising the bar on emerging risks like payment page skimming and insecure authentication. Compliance helps organizations innovate safely — adopting new tech without exposing card data.

5. A Foundation for Broader Cybersecurity Maturity

PCI DSS isn’t just about cards — its 12 core requirements (build and maintain secure networks, protect cardholder data, maintain vulnerability management, etc.) strengthen overall security posture. Many organizations use it as a baseline for GDPR, HIPAA, or ISO 27001 alignment.

Bottom Line in 2026

In a world of nonstop digital transactions and sophisticated cybercriminals, PCI DSS compliance protects customers, safeguards revenue, and demonstrates responsibility. It’s no longer a “checkbox” — it’s a strategic imperative for any business handling payments.

If your organization processes card data, assess your current status against v4.0.1 requirements today. Non-compliance risks far outweigh the effort of achieving it.

What challenges have you faced with PCI DSS? Share in the comments — I’d love to discuss real-world tips!


Why PCI DSS Remains Crucial in Today’s World (2026 Perspective) was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

The Payment Stack Nobody Draws: Why KYB → Settlement Isn’t a Flow-It’s a System

I work in payment infrastructure, and I keep seeing the same pattern across startups, marketplaces, and PSP-style builds.

Teams spend weeks perfecting checkout.

Then they get blindsided by payouts, disputes, mismatched balances, and “why didn’t I get paid?” emails.

Not because the payment gateway failed.
But because KYB → risk → routing → settlement → reconciliation was treated like a straight line.

It isn’t.

It’s a system one that has to stay consistent when real money, real merchants, refunds, chargebacks, delayed webhooks, and regulatory scrutiny enter the picture.

If you’re building any of the following, this applies directly to you:

  • A marketplace (split payouts, vendor settlements)
  • A SaaS product (subscriptions, prorations, refunds)
  • A PSP or payment product
  • Crypto rails (fiat ↔ crypto, compliance + settlement mapping)

The Hidden Failure Point: “Operational Truth” vs. “Money Movement”

Your dashboard can look perfect while your operation is quietly breaking.

In production, the real question becomes:

Can you explain, in one sentence, why a merchant got paid this exact amount today?

If the answer is “we’ll check logs,” you’re already accumulating risk.

That’s how teams end up with:

  • Payout disputes and support chaos
  • Manual reconciliation marathons
  • Frozen settlements when risk flags trigger
  • Messy chargeback handling
  • Merchant churn (the quiet, dangerous kind)

Below are the five choke points where payment products usually break — even when checkout works flawlessly.

1. KYB Isn’t Paperwork. It’s Segmentation.

KYB is often treated as:

Documents in → approval out.

In reality, KYB is how you decide:

  • Who gets approved instantly vs reviewed
  • Who has limits or rolling reserves
  • Who requires ongoing monitoring
  • Who can be paid out and when

A simple starting point that works:

  • Create three risk tiers: low / medium / high
  • Define per tier:
  • Limits
  • Reserve rules
  • Payout schedules
  • Monitoring triggers

If everyone is approved the same way, you’re deferring risk- not managing it.

2. Chargebacks Aren’t Support Tickets. They’re Deadlines.

Disputes come with strict evidence requirements and time windows.

If your workflow is “handle manually,” you will eventually:

  • Miss deadlines
  • Lose disputes you could have won
  • Watch ratios quietly creep upward

A minimum viable dispute workflow:

  • Evidence checklist by business type
  • Clear ownership (who prepares, who submits)
  • Automated reminders before deadlines
  • Standardized evidence folders per transaction

This isn’t about perfection. It’s about not relying on memory during pressure.

3. Settlement Is Where Trust Is Earned

Merchants don’t judge you by UI.

They judge you by one thing:

Did I get paid correctly and on time?

Most settlement issues come from:

  • Unclear fee logic
  • Partial refunds and netting
  • Rolling reserves and holds
  • Multiple PSP settlement formats
  • Currency conversion differences

The fix that prevents most pain:

Write payout rules in plain English.

Spell out:

  • Fees
  • Reserve / hold logic
  • Refund and chargeback impact
  • Payout schedule

If you can’t explain it simply, it won’t scale cleanly.

4. Reconciliation Is Your Real Source of Truth

In the real world:

  • “Success” at checkout ≠ settled money
  • Settlement files lag
  • Webhooks arrive late or out of order
  • Refunds don’t always net how you expect

A minimum viable reconciliation mindset:

  • Clear internal transaction states
  • Idempotency rules (no duplicates)
  • Settlement mapping logic (PSP file → your ledger)
  • An exception queue for human review

Even a spreadsheet-driven exception queue is better than

“We’ll figure it out later.”

Later is expensive.

5. Routing Without Monitoring Becomes Expensive

Routing can improve approvals and reduce cost- but only if you monitor it.

Every week, you should be able to answer:

  • Which route is degrading?
  • Where are declines increasing?
  • Which region or MCC is risky?
  • What changed after the last release?

Track these weekly (even in Google Sheets):

  • Approval rate
  • Decline reason distribution
  • Dispute rate
  • Refund rate
  • Settlement delay rate
  • Reconciliation exception rate

Ten minutes of review here saves months of cleanup later.

A 10-Minute Sanity Check for Your KYB → Settlement System

If you’re building payouts or payment rails, answer these honestly:

  • Do we have merchant tiers with rules per tier?
  • Can we pause or hold payouts based on risk triggers?
  • Do we have a dispute workflow (evidence, deadlines, owner)?
  • Are payout rules clearly documented?
  • Can we reconcile settlement files to internal states?
  • Do we review approvals, declines, and disputes weekly?

If you answered “no” to two or more, your product may work today- but you’re likely accumulating operational debt that becomes very expensive later.

Why I’m Sharing This

Most payment content focuses on APIs and integrations.

But the hard part is keeping money movement and operational truth aligned- consistently, under pressure, at scale.

These are the lessons teams usually learn after a painful incident. I’m sharing them so fewer teams have to.

I keep a one-page KYB → Settlement scorecard I use to sanity-check payment setups.

If you want it, comment with:

  1. What you’re building (marketplace / SaaS / PSP / crypto rails)
  2. Your biggest headache (onboarding, disputes, payout delays, reconciliation, declines)

I’ll reply with the scorecard and the top 2–3 gaps to fix first for your model.

If enough people ask, I’ll publish the scorecard as a follow-up post.

Image created by ChatGPT

The Payment Stack Nobody Draws: Why KYB → Settlement Isn’t a Flow-It’s a System was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

We’re Building Payment Infrastructure for Nigerian Businesses. Here’s Why We Need Your Help

The Problem We Keep Hearing

Over the past three weeks, I’ve sent 50+ emails to Nigerian businesses — fashion designers in Lagos, freelance developers, gadget retailers, drone wholesalers, and crowdfunding platforms.

The feedback has been surprisingly consistent.

These aren’t isolated complaints. They’re systemic infrastructure gaps.

The pattern is clear:

  • Businesses are losing 10–15% to international payment fees
  • Freelancers are watching Naira devaluation eat their savings in real-time
  • E-commerce businesses are dealing with failed cross-border transactions
  • Operations teams face manual reconciliation nightmares
  • There’s constant fear of frozen accounts when accepting international payments

Traditional payment rails weren’t built for this moment. Banks can’t solve it. Payment processors won’t solve it. Someone has to create the alternative.

That’s why we’re building BillingBase.

BillingBase | Non-Custodial Billing Layer for Stablecoins

What We’re Building (And Why It’s Different)

BillingBase is non-custodial crypto billing infrastructure for global businesses.

Let me break down what that actually means:

  1. Non-custodial means payments go directly to YOUR wallet. We never hold your funds. We don’t control your money. We don’t have the ability to freeze your account. You maintain complete custody while we handle the infrastructure.
  2. Crypto billing infrastructure means we provide the payment primitives you’re already familiar with — checkout links, subscriptions, refunds, webhooks, invoicing — except they work with stablecoins instead of traditional payment rails.
  3. For Nigerian businesses, this means we understand the specific problems you face: Naira devaluation, international payment friction, high platform fees, and the need for dollar-denominated earnings that hold their value.

Here’s what you can do with BillingBase:

  • Accept stablecoin payments: USDT, USDC, DAI, and CNGN (Naira-pegged)
  • Use familiar tools: Payment links, recurring subscriptions, one-time payments, refunds, webhooks, and a dashboard to track everything
  • Get built-in protection: Chainalysis wallet screening, transaction-level risk checks, KYB verification, and audit trails for compliance

Why We’re Starting with a Beta

We don’t have all the answers yet.

What we know:

Nigerian businesses need better cross-border payments. Naira devaluation makes dollar earnings critical. Platform fees (Upwork’s 15%, Stripe’s 3.9%, PayPal’s conversion markups) are too high. International customers increasingly pay with stablecoins. Operations teams need reconciliation tools that traditional banks don’t provide.

What we need to validate:

  1. Core features: Which payment primitives matter most? Do fashion designers prioritize deposit handling or subscription billing? Do freelancers want simple payment links or full API integration? Where’s the acceptable onboarding friction threshold?
  2. Compliance: What documentation feels reasonable versus invasive? KYB is necessary, but where’s the line between thorough and annoying?
  3. Infrastructure: Which blockchains — Base (lowest fees), Polygon (widely supported), Arbitrum (fast settlement)? Do businesses care, or just want “cheapest and fastest”? USDC (dollar-pegged) or CNGN (Naira-pegged)?
  4. Integrations: QuickBooks? Xero? Google Sheets? Slack notifications when payments arrive?

Questions only real usage can answer:

  • How do designers handle deposits versus final payments?
  • Do freelancers prefer shareable links or automated invoicing? What reporting do finance teams need?
  • How often do merchants convert stablecoins to Naira?
  • What’s the right balance between automated risk controls and merchant control?

We can’t answer these in a vacuum. We need real businesses using BillingBase with real customers.

That’s why we’re opening a beta.

Sign up here!

Who We’re Looking For

We’re looking for specific businesses where stablecoin payments solve real problems.

1. SME Businesses with Global Clients Fashion designers, bridal boutiques, custom clothiers, bespoke service providers with international clients who ship worldwide or provide remote services.

Your pain: 3–7 day payment delays, high cross-border fees, difficult deposit handling, currency conversion losses.

What you get: Instant stablecoin settlement, payment links for deposits/finals, dollar-denominated earnings, free integrated website during beta.

2. Freelancers & Service Providers Developers, designers, consultants, educators working directly with clients or through Upwork/Fiverr/Toptal.

Your pain: 10–15% platform fees, poor PayPal conversion rates, dollar invoices settled in devalued Naira, no professional low-cost direct payment option.

What you get: 0.5% transaction fees, payment link dashboard, dollar earnings protected from devaluation, automatic receipts and audit trails.

3. E-commerce & Retail Gadget stores, tech retailers, drone wholesalers, online merchants (B2B/B2C).

Your pain: Failed international transactions, 3–5% gateway fees, chargebacks, fraud, reconciliation headaches.

What you get: API integration, payment links, 0.5% fees, no chargebacks (crypto is final), and clean transaction records.

4. Content Creators & Educators: Web3 educators, course creators, online tutors, digital content producers.

Your pain: Platform fees (Gumroad, Teachable, Patreon), platform dependency, limited international payment options, and expensive recurring billing.

What you get: Subscription billing, one-time payment links, direct payments (no middleman), and automatic invoicing.

5. Fundraising Platforms: Crowdfunding platforms, donation platforms, NGOs raising money locally and internationally.

Your pain: Slow, expensive wire transfers, high cross-border fees, poor reporting, and difficulty tracking recurring contributions.

What you get: Donation links (one-time/recurring), lower fees, instant international contributions via stablecoins, and clean reporting for finance teams and donors.

What we’re NOT looking for (yet):

High-volume enterprises: If you’re processing 10,000 transactions per day, we’re not ready for you. We’re optimizing for businesses with 10–500 transactions per month during beta.

Businesses requiring instant Naira conversion: We don’t provide off-ramp services yet. You’ll need your own method to convert stablecoins to Naira if needed (P2P platforms like Binance, Bybit, or local exchanges work well).

Companies needing white-label solutions: If you want to rebrand BillingBase as your own product, that’s not our focus right now.

Anyone expecting zero bugs: This is a beta. There will be rough edges. If you need production-perfect software on day one, wait for our public launch later this year.

What Beta Participants Get

1. Free Integration & Setup

  • No setup fees: Most payment platforms charge $500-$2,000 for integration. We don’t.
  • No monthly subscription during beta: Use BillingBase for free while we’re testing.
  • Transaction fees waived for first 90 days (or first 100 transactions): Whichever comes first. After that, standard fees apply (0.5% or lower depending on volume).
  • One-on-one onboarding support: We’ll walk you through wallet setup, dashboard usage, and first transactions. No “figure it out yourself” documentation dumps.

2. Custom Solutions Based on Your Business Type

For fashion designers: We’ll build you a one-pager website with integrated payment links. Free during beta. Professional design. Consultation booking system if needed.

For e-commerce businesses: We’ll integrate BillingBase API directly with your existing website. Custom checkout flow. Webhook setup. Testing support.

For freelancers: Payment link dashboard optimized for invoicing. Easy sharing via email, WhatsApp, or social media. Automatic receipt generation.

For educators: Subscription billing for courses or memberships. Payment links for one-time consultations or content. Recurring payment automation.

3. Direct Access to the Team

  • Weekly feedback calls (optional): Tell us what’s working and what’s broken.
  • Slack/WhatsApp channel with founders: Direct line to Ngozi and the team. No support ticket black holes.
  • Priority bug fixes: If something breaks, we fix it fast. Beta participants get priority.
  • Your input shapes the product roadmap: We’re not building in isolation. If you need a feature, we’ll consider adding it based on beta feedback.

4. Early Mover Advantage

  • Lifetime discounted pricing after beta: When we launch publicly, you’ll pay less than new customers — forever.
  • Featured case studies (with permission): If you’re willing, we’ll showcase how you’re using BillingBase. Good for your brand, good for ours.
  • First access to new features: New integrations, reporting tools, or blockchain support? Beta participants see it first.
  • Referral program with revenue share: Refer other businesses to BillingBase and earn a percentage of their transaction fees.

What We’re Asking From You

This isn’t passive testing. If you just want to “try it out and see,” that’s not what we need.

Time Commitment:

  • 30–60 minutes: Initial setup (wallet, KYB verification, dashboard walkthrough, first test transaction)
  • 15–30 minutes periodically: Feedback calls (every 2 weeks to monthly, depending on usage)
  • 24–48 hour response time: When we ask “Can you try this again and tell us what happened?”
  • 5–10 minutes monthly: Survey on feature usage and pain points

Honesty Requirement:

We need brutal feedback, not polite validation.

Tell us what’s confusing, broken, or doesn’t fit your workflow. Share what your customers say — positive and negative. If onboarding felt complicated, the dashboard doesn’t make sense, or a feature exists but you don’t understand why you’d use it, tell us. Screenshots help. Screen recordings are better.

We’re not looking for cheerleaders. We’re looking for honest partners who’ll tell us when we’re wrong.

Real Usage:

Use this with real customers. Test transactions catch bugs, but real revenue matters more. We can’t improve what we don’t see in production.

Send a payment link to a real client. Use BillingBase for a real deposit. Integrate it and see if customers choose the crypto option. We’re not asking you to bet your entire business on this, but we need real scenarios to see what happens when money is on the line.

Patience:

There will be bugs — we’ll fix them fast. Some features won’t exist yet — we’re prioritizing based on feedback. Documentation might be incomplete — we’re improving it weekly.

Beta means “we’re still learning.” If you need production-perfect software on day one, wait for our public launch.

How to Apply to BillingBase Beta

Step 1: Visit the Waitlist Page and Sign Up

Go to billingbase.io/waitlist and fill out the form:

  • Input your email

Step 2: Quick Call (15 Minutes)

If your business is a good fit, we’ll schedule a short call:

  • We learn about your workflow and payment challenges
  • You ask questions about BillingBase
  • We determine if it’s a mutual fit

This isn’t a sales call. It’s a conversation. If we don’t think BillingBase solves your specific problems, we’ll tell you honestly.

Step 3: Onboarding

Once approved:

KYB verification (1–2 business days):

  • Business registration documents
  • Owner/founder identification
  • Basic compliance screening

We know this feels bureaucratic, but it’s necessary. Compliance protects everyone in the ecosystem — including you.

Wallet setup assistance:

  • We’ll help you set up a non-custodial wallet if you don’t have one
  • Connect your wallet to BillingBase
  • Fund it with a small amount for testing

Dashboard walkthrough:

  • How to create payment links
  • How to track transactions
  • How to generate invoices and receipts
  • How to set up webhooks (if needed)

First test transaction:

  • You’ll make a test payment to yourself
  • We’ll verify everything works
  • Then you’re ready for real customers

And that’s all.


We’re Building Payment Infrastructure for Nigerian Businesses. Here’s Why We Need Your Help was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

Hack The Box: Eureka Machine Walkthrough – Hard Dificulty

By: darknite
Reading Time: 12 minutes

Introduction to Eureka:

In this writeup, we will explore the “Eureka” machine from Hack The Box, categorised as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag.

Objective:

The goal of this walkthrough is to complete the “Eureka” machine from Hack The Box by achieving the following objectives:

User Flag:

During enumeration, we discovered Spring Boot Actuator endpoints, including /actuator/heapdump, which revealed plaintext credentials for oscar190. We logged in to SSH as oscar190, but found the home directory empty. The application.properties file revealed Eureka credentials (EurekaSrvr:0scarPWDisTheB3st), which allowed us to access the Eureka dashboard on port 8761. By registering a malicious microservice, we retrieved miranda.wise credentials and captured the user flag from user.txt.

Root Flag:

For privilege escalation, the vulnerable log_analyse.sh script allowed command injection, enabling creation of a SUID bash shell in /tmp/bash. Execution of this shell provided root access, and the root flag was obtained from /root/root.txt.

Enumerating the Eureka Machine

Reconnaissance:

Nmap Scan:

Begin with a network scan to identify open ports and running services on the target machine.

nmap -sC -sV -oA initial 10.10.11.66

Nmap Output:

┌─[dark@parrot]─[~/Documents/htb/eureka]
└──╼ $nmap -sC -sV -oA initial 10.10.11.66 
# Nmap 7.94SVN scan initiated Sun Aug 24 03:30:10 2025 as: nmap -sC -sV -oA initial 10.10.11.66
Nmap scan report for 10.10.11.66
Host is up (0.046s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 d6:b2:10:42:32:35:4d:c9:ae:bd:3f:1f:58:65:ce:49 (RSA)
|   256 90:11:9d:67:b6:f6:64:d4:df:7f:ed:4a:90:2e:6d:7b (ECDSA)
|_  256 94:37:d3:42:95:5d:ad:f7:79:73:a6:37:94:45:ad:47 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://furni.htb/
|_http-server-header: nginx/1.18.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Aug 24 03:30:21 2025 -- 1 IP address (1 host up) scanned in 10.99 seconds

Analysis:

  • Port 22 (SSH): Secure Shell service (OpenSSH 8.2p1) for remote access.
  • Port 80 (HTTP): Web server (nginx 1.18.0) hosting furni.htb.

Web Enumeration:

Perform web enumeration to discover potentially exploitable directories and files.

gobuster dir -u http://furni.htb/ -w /opt/quickhits.txt

Gobuster Output:

┌─[dark@parrot]─[~/Documents/htb/eureka]
└──╼ $gobuster dir -u http://furni.htb/ -w /opt/quickhits.txt 
/actuator             (Status: 200) [Size: 2129]
/actuator/caches      (Status: 200) [Size: 20]
/actuator/features    (Status: 200) [Size: 467]
/actuator/info        (Status: 200) [Size: 2]
/actuator/health      (Status: 200) [Size: 15]
/actuator/env         (Status: 200) [Size: 6307]
/actuator/metrics     (Status: 200) [Size: 3319]
/actuator/refresh     (Status: 405) [Size: 114]
/actuator/sessions    (Status: 400) [Size: 108]
/actuator/scheduledtasks (Status: 200) [Size: 54]
/actuator/mappings    (Status: 200) [Size: 35560]
/actuator/loggers     (Status: 200) [Size: 98261]
/actuator/beans       (Status: 200) [Size: 202254]
/actuator/configprops (Status: 200) [Size: 37195]
/actuator/conditions  (Status: 200) [Size: 184221]
/actuator/threaddump  (Status: 200) [Size: 176397]

Analysis:

Spring Boot Actuator endpoints provide insights:

  • /actuator shows system details,
  • /caches shows cache info,
  • /features lists features,
  • /info gives metadata,
  • /health shows status,
  • /env shows variables,
  • /metrics shows performance,
  • /refresh returns 405,
  • /sessions returns 400,
  • /scheduledtasks shows tasks,
  • /mappings lists routes,
  • /loggers shows logs,
  • /beans lists beans,
  • /configprops shows config,
  • /conditions shows auto-config,
  • /threaddump shows threads.

Feroxbuster directory enumeration identified the following endpoints:

Analysis:

  • /actuator/heapdump: Full application heap dump (very sensitive, ~76MB).

The heapdump is usually the biggest goldmine here—it can contain hardcoded credentials, JWT secrets, API keys, or session tokens.

Web Application Exploration:

The website interface appears to be a standard design showcasing a Modern Interior Design Studio.

Create a new user account

Therefore, proceed with creating a new account using the credentials mentioned above.

The password must contain a minimum of 10 characters.

Attempted to log in with the previously created credentials, but the response only returned bad credentials with no further action.

Extracting Eureka Service Credentials from Heapdump as oscar190

Proceed to download the heapdump by directly accessing the /actuator/heapdump endpoint through the web browser

To analyze the downloaded heapdump, run the strings command and pipe the output into grep to look for potential credentials. For example, using strings heapdump.hprof | grep -i "password=" will filter for any occurrences of the keyword password= within the dump. If no useful results are found, the search can be expanded with broader patterns such as pass, user, token, secret, or key to uncover sensitive information like database passwords, API keys, or authentication tokens stored in memory. This approach provides a quick way to extract valuable data from the heapdump before performing deeper analysis with tools like Eclipse MAT.

Heapdump analysis revealed valid plaintext credentials:

  • Username: oscar190
  • Password: 0sc@r190_S0l!dP@sswd

Failed Authentication Attempts with Extracted Credentials

┌─[dark@parrot]─[~/Documents/htb/eureka]
└──╼ $nmap -sC -sV -p- -oA fullport 10.10.11.66
8761/tcp open  unknown
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 401 
|     Vary: Origin
|     Vary: Access-Control-Request-Method
|     Vary: Access-Control-Request-Headers
|     Set-Cookie: JSESSIONID=052BB32927ACF7E3EC6D4104D8933C61; Path=/; HttpOnly
|     WWW-Authenticate: Basic realm="Realm"
|     X-Content-Type-Options: nosniff
|     X-XSS-Protection: 0
|     Cache-Control: no-cache, no-store, max-age=0, must-revalidate
|     Pragma: no-cache
|     Expires: 0
|     X-Frame-Options: DENY
|     Content-Length: 0
|     Date: Sun, 24 Aug 2025 04:16:36 GMT
|     Connection: close
|   HTTPOptions: 
|     HTTP/1.1 401 
|     Vary: Origin
|     Vary: Access-Control-Request-Method
|     Vary: Access-Control-Request-Headers
|     Set-Cookie: JSESSIONID=F7494079A8B84CF8089636498980649E; Path=/; HttpOnly
|     WWW-Authenticate: Basic realm="Realm"
|     X-Content-Type-Options: nosniff
|     X-XSS-Protection: 0
|     Cache-Control: no-cache, no-store, max-age=0, must-revalidate
|     Pragma: no-cache
|     Expires: 0
|     X-Frame-Options: DENY
|     Content-Length: 0
|     Date: Sun, 24 Aug 2025 04:16:36 GMT
|     Connection: close

As a result, a full port scan will identify any additional services accessible on the target system.

Attempting Access to oscar190 via Eureka Dashboard and SSH

An attempt to use the previously discovered credentials for authentication failed, with all login attempts unsuccessful.

We used pwncat-cs to test the recovered credentials against SSH. The login was successful, and we gained remote access to the target system.

Enumeration as oscar190

After gaining access, we inspected the oscar190 directory. It was empty and contained no useful files for further exploitation.

We also checked for SUID binaries on the system, but found no unusual or exploitable ones.

During enumeration, we found a notable file at ./web/Funi/src/main/resource/application.properties containing sensitive information, including credentials that revealed the password for the oscar190 user.

Most importantly, under the Eureka section you discovered:

eureka.client.service-url.defaultZone= http://EurekaSrvr:0scarPWDisTheB3st@localhost:8761/eureka/

This line shows the Eureka service uses embedded credentials:

  • Username: EurekaSrvr
  • Password: 0scarPWDisTheB3st

These new credentials are different from oscar190. They may be valid for the Eureka dashboard (port 8761) or other services like SSH, MySQL, or the web portal.

Accessing Spring Eureka Dashboard on Port 8761 Using Discovered Credentials

The newly discovered credentials (EurekaSrvr:0scarPWDisTheB3st) were tested against the Eureka service endpoint. Authentication was successful, confirming valid access to the Eureka configuration interface.

Surprisingly, the credentials worked and granted access to the Spring Eureka application dashboard, confirming control over the service.

Monitoring System Activity and Command Execution with pspy64

The pspy64 output revealed that a scheduled task is being executed by the root user, which uses curl to send a POST request to http://furni.htb/login. The request is crafted to resemble a normal browser login, with headers such as Accept, Content-Type, User-Agent, and a session cookie included. Most importantly, the POST data is not hardcoded in the command but instead read from the temporary file /tmp/tmp.hJ3yAWDvEW. the file is writable or replaceable by a lower-privileged user, it may be possible to inject malicious data or commands into it, allowing code execution under root’s context whenever the automated task runs.

Cloud-Gateway Enumeration and Insight

During enumeration, a directory named cloud-gateway was discovered, which stands out as it is not typically present in standard web application structures. Given its uncommon presence, this directory warrants deeper inspection to determine whether it contains exploitable configurations or hidden endpoints.

Source: Cloud management gateway overview

The cloud-gateway directory was identified within the application files, which is uncommon in typical setups and indicates the use of Spring Cloud Gateway for routing and service communication. Such directories often contain sensitive configuration files, route definitions, or embedded credentials, making it an important target for closer inspection during enumeration.

Analysing the application.yaml Configuration File

It appears that the request is being passed to the user-management-service component, located under the path /var/www/web, specifically beneath the /login functionality. This suggests that authentication requests from /login are routed internally to the user-management-service, which likely handles user validation and credential processing.

HTTP Login Endpoint Hijacking via User-Management-Service

Inside the user-management-service directory, several files and subdirectories were identified, indicating this component is likely responsible for handling authentication and account-related functionality within the application. Since it sits directly under /var/www/web, its contents may include configuration files, source code, or compiled application resources that could expose sensitive information such as database credentials, API keys, or logic flaws.

The files discovered within the user-management-service directory were copied over to the attacker’s machine for further offline analysis. This allows deeper inspection of configuration details, source code, and potential hardcoded secrets without the risk of altering the target environment.

The application.properties and Eureka-related configuration files contain fields such as <instanceId>, <hostName>, <ipAddr>, <port>, <homePageUrl>, <statusPageUrl>, and <healthCheckUrl>. By modifying these values to match the attacker’s controlled IP address and port, it is possible to redirect the service registration in Eureka to point toward a malicious service instead of the legitimate one.

Retrieving miranda.wise Credentials and Capturing User Flag

The first command performs a POST request to register a new instance of the USER-MANAGEMENT-SERVICE application, where the configuration details (such as instance ID, host, IP address, and port) are provided in an external instance.xml file. By modifying this XML file with the attacker’s own machine details, it is possible to make Eureka believe that the legitimate service now points to the attacker-controlled host. The second command issues a DELETE request targeting the existing service entry localhost:USER-MANAGEMENT-SERVICE:9009, which corresponds to the genuine application running locally on port 9009.

A successful callback was received, which revealed system details tied to the user miranda.wise. This indicates that the malicious service registration worked as intended, and the compromised microservice forwarded traffic to the attacker-controlled host, exposing valuable information about another valid user account in the environment.

The user flag was captured by reading the user.txt file with the cat command.

Escalate to Root Privileges Access

Privilege Escalation:

We did not identify any unusual or exploitable SUID binaries on the system.

A script named log_analyse.sh was discovered on the system, which stands out as a potential target for further analysis to determine if it contains insecure commands, misconfigurations, or privilege escalation opportunities.

Analysis of log_analyse.sh Script

This script is a log analyser that examines server logs to track three key aspects: who’s logging in (successfully or not), what HTTP errors are occurring, and any system errors worth noting. It’s got some nice touches – colour-coded outputs for quick scanning and a clean report saved to log_analysis.txt.

grep "HTTP.*Status: " "$LOG_FILE" | while read line; do
    code=$(echo "$line" | grep -oP 'Status: \K.*')

if [[ "$existing_code" -eq "$code" ]]; then
new_count=$((existing_count + 1))
STATUS_CODES[$i]="${existing_code}:${new_count}"

This Bash script analyzes log files, extracting login attempts, HTTP status codes, and errors, then saves results to log_analysis.txt. A key function, analyze_http_statuses(), parses HTTP status codes using grep -oP 'Status: \K.*'. However, it’s vulnerable to command injection—if logs contain malicious strings like $(malicious_command), Bash will execute them when processing the file.

The output demonstrates the behavior of the log_analyse.sh script when executed, showing that it processes and reads the contents of application.log. This indicates that the script’s purpose is related to log handling, and analyzing its execution flow could reveal opportunities for manipulation or privilege escalation.

The original file was copied, then deleted, and after restoring it, the file ownership changed from www-data to miranda-wise.

Exploiting Bash SUID for Privilege Escalation

The bash script does not run with root privileges.

A computer screen with text on it

AI-generated content may be incorrect.

It defines two target log files located in the user-management-service and cloud-gateway directories, then injects a malicious payload into them. The payload attempts to execute a command substitution by copying /bin/bash to /tmp/bash and setting the SUID bit, effectively creating a root-privileged shell. To achieve this, the script removes the original log files and replaces them with the crafted payload. Once the vulnerable process or script that parses these logs executes the injected content, the attacker gains elevated privileges via the SUID-enabled /tmp/bash.

A computer screen with text

AI-generated content may be incorrect.

We then executed the crafted bash file, which replaced the targeted log files with the injected payload, preparing for privilege escalation once the vulnerable service processes the modified logs.

A screenshot of a computer

AI-generated content may be incorrect.

Running the script produced no immediate effect, suggesting the logs remained unprocessed or required additional conditions.

A black screen with green and yellow text

AI-generated content may be incorrect.

After some time, the injected payload successfully executed and resulted in the creation of a SUID bash binary inside the /tmp directory, allowing privilege escalation. By running ls -l /tmp/bash, the SUID bit could be confirmed, and executing /tmp/bash -p provided a root shell since the binary retains elevated privileges. From there, commands like id could be used to verify root access, and the final step was reading the root.txt file located in the /root directory to obtain the root flag and complete the exploitation.

A black background with green and blue text

AI-generated content may be incorrect.

The root flag was retrieved by executing the cat root.txt command.

The post Hack The Box: Eureka Machine Walkthrough – Hard Dificulty appeared first on Threatninja.net.

❌