nav-close
float feedback icon livechat

RM SOCIAL: COPY TRADING, арилжаа хуулбарлах боломжтой боллоо!

ТАНЫ АРИЛЖАА ХИЙХ БРОКЕР

MetaTrader 4/5 платформоор Forex, CFD, индекс, металл зэрэг 1000 гаруй бүтээгдэхүүнд нэвтрэх боломжтой.

ШУУД СПРЕД

EUR / USD

SPREAD

0.00

ЗАРАХ ХАНШ

-----

АВАХ ХАНШ

-----

XAU / USD

SPREAD

0.90

ЗАРАХ ХАНШ

-----

АВАХ ХАНШ

-----

EUR / JPY

SPREAD

0.10

ЗАРАХ ХАНШ

-----

АВАХ ХАНШ

-----

USD / JPY

SPREAD

0.00

ЗАРАХ ХАНШ

-----

АВАХ ХАНШ

-----

GBP / USD

SPREAD

0.20

ЗАРАХ ХАНШ

-----

АВАХ ХАНШ

-----

Шууд үнэ нь зөвхөн үзүүлэлт юм.

БИДЭНТЭЙ ХАМТ АРИЛЖААНЫ АЯЛАЛАА НЭГ АЛХАМ АХИУЛААРАЙ

Бидний санал болгож буй оновчтой шинэлэг шийдлүүдийг өөрийн арилжаандаа нэвтрүүлэн урьд өмнө хэзээ ч байгаагүй арилжааг хийцгээе. Манай хэрэглэгчдэд ээлтэй платформ нь зах зээлийг хялбархан удирдах боломжийг танд олгоно.

an icon says 0.0 pips, a feature of radex markets

#01

0 -ээс эхлэдэг

an icon says 0.0 pips, a feature of radex markets

#02

350+ Боломжтой бүтээгдэхүүн

up to 1:500 leverage

#03

1:500 хүртэлх хөшүүрэг

3 base currency icon

#04

3 үндсэн валют

your account manager icon

#05

Өөрийн дансны менежер

live support icon

#06

Шууд дэмжлэг 24/7

a PC for using MetaTrader, a forex platform

a Pad for using MetaTrader, a forex platform

a cellphone for using MetaTrader, a forex platform

ТАНЫ ХЭРЭГЦЭЭНД ТААРСАН АРИЛЖААНЫ
АРГА БАРИЛ ПЛАТФОРМУУД

RADEX MARKETS
таны хэрэгцээнд нийцсэн олон төрлийн платформуудыг санал болгож байна.

MARKET WATCH

Precious metals stabilise

Аравдугаар сар 2025

  ●  Gold and silver remain flat   ●  US inflation data scheduled for later today   ●  Intel surprises with strong earnings Inflation data later today Markets will receive a long-awaited economic update later today, in the form the latest CPI report, courtesy of the US Bureau of Labor Statistics. While not the most thrilling of updates, traders have had almost nothing else to chew on over the past three weeks and are starved for information. The US government shutdown is now the second-longest in history at 24 days and counting, with no resolution in sight. The longest shutdown totalled 35 days, so a new record is looking increasingly likely. Headline and core inflation are forecast to come in at 3.1% – a significant step above the Fed’s 2% target. The Federal Reserve is also in the dark regarding inflation and labour data, making next week’s rate decision more complicated. For now however, interest rate traders are locked on to another 25-bps cut on the 29th of October. Precious metals stabilise after crash Precious metals have remained relatively stable since the brutal selloff on Tuesday. Gold is hovering just above $4,100 per ounce at the time of writing, while silver lingers below $49. The softening of trade tensions between the US and China is set to continue, with President Trump and Xi Jinping agreeing to meet in South Korea next week. The two leaders have not met face-to-face since 2019 and while nothing of substance has emerged as of yet, the mere confirmation of a meeting has prompted a degree of cautious optimism. Any ensuing resolution would further dent the safe-haven narrative, potentially affecting precious metal flows in the coming weeks. Strong earnings from Intel US futures are holding steady ahead of today’s CPI report, with all three major indices hovering near all-time highs before the final session of the week. Intel Corporation (INTC) smashed expectations with its third-quarter earnings report yesterday, leading to an 8% jump in after-market trading. The chipmaker saw a change in fortune this summer with investments from SoftBank, Nvidia and even the US government, which has secured a 10% stake in the company. The dark cloud looming over Intel remains the question of its foundry, which makes custom chips for customers. The business has floundered from inception and has seen large numbers of layoffs in recent months. Whether profitable or not, judging by the ongoing injections of capital into the company, the business appears to be of strong strategic importance to American actors. #CPI #Metals #INTC

ЦААШ УНШИХ
RM Rooms Icon

RM МЭДЭЭНИЙ ӨРӨӨ

RADEX MARKETS appoints Ahmad Aljebouri as chief technology officer

22 аравдугаар сар, 2025

RADEX MARKETS, an internationally regulated Forex and CFD broker, is pleased to announce the appointment of Ahmad Aljebouri as Chief Technology Officer (CTO). Ahmad brings over 12 years of extensive experience in financial technology, trading systems, and infrastructure development to this pivotal role. Throughout his distinguished career, Ahmad has successfully led high-performing technology teams at top-tier brokerages and fintech companies, demonstrating exceptional expertise in building robust, scalable systems that meet the demanding requirements of modern financial markets. In his role as CTO, Ahmad will oversee our global technology strategy, with a primary focus on strengthening the company's system architecture, enhancing security frameworks, and driving digital innovation initiatives. "I'm excited to join RADEX MARKETS at such a pivotal time in the company's growth," said Ahmad Aljebouri. "The firm has built a strong foundation, and my focus will be on creating robust, scalable solutions that keep us ahead in this rapidly evolving industry." "We are thrilled to welcome Ahmad to the RADEX MARKETS leadership team," said Henry Huang, Director / Head of Marketing at RADEX MARKETS. "His proven track record in financial technology and his deep understanding of trading systems make him the ideal leader to guide our technology vision forward. Ahmad's expertise will be invaluable as we continue to innovate and expand our technological capabilities." Ahmad's appointment reflects RADEX MARKETS' ongoing commitment to investing in world-class talent and a leading position in financial technology innovation. About RADEX MARKETS: RADEX MARKETS, a Seychelles-based Financial Broker, is a trading name under GO Markets International Ltd Co (No. 8425985-1, Securities Dealer Licence No SD043). It provides a platform to trade financial products, such as Forex, Metals, CFD/Indices and Share CFDs. For PR requests, please contact Henry Huang [email protected] +44 20 8610 1608 Disclaimer: This press release is for informational purposes only. The information provided does not constitute investment advice or an endorsement of any products or services.

ЦААШ УНШИХ

ЭДИЙН ЗАСГИЙН ХУАНЛИ

( GMT +03:00 13:06 )
March 26, 2024
2025-10-27 07:00:00+00:00DKRetail Sales YoY Sep
2025-10-27 07:00:00+00:00DKRetail Sales MoM Sep
2025-10-27 07:00:00+00:00TRUnemployment Rate Sep

TRADER'S PICK

Dust attacks

аравдугаар сар 15, 2025

From record highs to harrowing crashes, cryptocurrencies have had an interesting start to the month, to put it mildly. Whether crypto markets continue to flourish or not, now is as good a time as any to remind our readers of some basic OPSEC regarding self-custody of crypto assets. For many people, keeping crypto assets on Coinbase, Binance or any other centralised platform is good enough. For those in this camp, the following article is of no practical use. However, for those electing self-custody, the following may serve as a crucial reminder of what to avoid. Being in full control of one’s assets certainly has its advantages, but it comes with a much greater degree of responsibility. The burden of understanding concepts such as network congestion, the hassle of private key storage, and how to use swaps and bridges is substantial enough, but self-custody presents the additional problem of so-called “dust attacks”. Those who have been in the crypto game long enough may have noticed a few odd tokens sitting in their wallets of which they have absolutely no recollection. Tokens with strange names, or indeed tokens with eerily similar names to legitimate cryptocurrencies. Typically, these tokens are present in extremely small quantities and are worth next to nothing – hence the “dust” description. How did it get there? How strange. Dust attacks are the new email spam, and they present some very similar characteristics. Firstly, just as with email spam, most dust attacks are a numbers game. They are very cheap to carry out. The scammer has nothing to lose by casting a wide net and trying to ensnare as many victims as possible. It does not matter if 99.99% of their targets escape unscathed; the 0.01% makes the attack worth it. Dust attacks can be broadly grouped into three different categories: wallet de-anonymising, phishing scams and address poisoning. 1. Wallet de-anonymising This type of attack only works on Bitcoin, Cardano, Dogecoin and other UTXO-based blockchains. UTXO (unspent transaction output) chains differ from account-based chains such as Ethereum in that transactions can combine inputs from different sources, grouping them together into a single operation. This means a user can sweep up a bunch of small sums from different addresses and collectively send them to a new wallet. This is where the danger of a dust attack comes in. If a user accidentally combines the balance from a dusted address with the balance from another address under their control, the user is essentially proving that they own both, thereby linking the addresses together and potentially de-anonymising them. In extreme cases, addresses may be linked to someone’s real-world identity, opening the door to coercion, extortion and worse. The best cryptographic security in the world counts for very little when faced with a knife-wielding psychopath. 2. Phishing scams Dust attacks have largely moved away from the case described above in favour of more aggressive tactics. This second type of attack works on Ethereum, Solana and other smart contract-based blockchains. As opposed to linking different addresses together to find patterns, the goal here is much more direct, aiming to drain a user’s wallet by getting them to interact with malicious smart contracts. The process typically works along the following lines: 1. The attacker airdrops a junk token or NFT that looks like a legitimate project or collectible 2. Months may go by before the user even notices the strange token in their wallet 3. Eventually the user notices the token and gets curious enough to investigate 4. A quick search points to a cool-sounding crypto project with a shiny new DEX 5. Once on the website, the user is given the chance to sell or swap their airdrop 6. The DEX prompts the user’s wallet for an approval or signature to initiate the exchange 7. If signed, the attacker gains permission to transfer and spend other tokens from that wallet 8. The user’s wallet is now compromised The attack vector centres on getting the user to grant permissions far beyond those necessary for a simple transaction. The case above is one example, but some dust attacks do not involve other websites or DEXs at all, remaining confined to the user’s wallet. If the attacker really knows what they are doing, they may craft truly devilish contracts that exploit some of the more esoteric smart contract functions. On the Ethereum network, a simple ERC-20 token with no privileges will typically only affect the transfer and holding of that particular token. However, even here we advise caution, particularly if the contract in question has not been thoroughly audited. The real danger lies in other token standards, such as ERC-777 and ERC-1363. These tokens have more advanced capabilities; therefore, with the right permissions, they can do far more damage. A greater arsenal of weapons to choose from, so to speak. Depending on the complexity of the smart contract in question, merely trying to sell or swap the token from a user’s own wallet may prove problematic. The user may have to approve the token for trading and, by doing so, inadvertently grant other, unrelated permissions to the malicious smart contract. Even technical users can be caught out in this way because it is sometimes possible to disguise the true purpose of an operation. At first glance, a contract may look like it performs a certain mundane task, while in fact it does something else entirely. Wallet UIs and dApps can easily be exploited to hide the real intent behind such smart contracts, with disastrous consequences. Even people smart enough to use a hardware wallet can be caught out if they approve the transaction without thoroughly examining the required permissions beforehand. Rather than cover every dangerous function likely to appear in a malicious smart contract, we simply advise against interacting with such contracts altogether. As complicated and technical as this topic can get, the answer is extremely simple: Do not touch the dust in your wallet. Do not touch any token that you do not recognise. Do not interact with them under any circumstance. Do not try to get rid of them. Do not try to send them to a burn address. It is a trap. Walk away. 3. Address poisoning Address poisoning is a very different beast from the attacks discussed above. Firstly, because such attacks work on both UTXO and account-based chains, and secondly, because address poisoning targets singular, unique wallets. Poisoning scams involve real, legitimate cryptocurrencies and require a certain level of finesse to pull off successfully. The attack works as follows: 1. The attacker identifies a high-net-worth target (a whale) 2. The whale must actively move around their assets between different wallets 3. The attacker creates new wallets with addresses similar to the whale’s 4. The attacker sends a small amount of dust from the new wallet to the whale 5. The whale, mistaking the attacker’s wallet for their own, sends a transaction to the wrong address For example, the whale may regularly send tokens to the following address: 0x32Be343B94f860124dC4fEe278FDCBD38C102D88 Because of the way blockchain technology works, with specialised tools, it is possible to find an address that matches the beginning and end characters, for example: 0x32Be3477e6c13b6A6B25aBcAA29B393777102D88 When people check addresses, this is often how they do it. Check the start. Check the end. Looks good. Send. Wait a minute… Oh ####! The whale is speared. An interesting example of such an attack happened in May 2024, and unfolded exactly along the lines described above. The whale in question sent $68 million worth of wrapped Bitcoin to the wrong address. Over the next few days, the whale sent a number of messages to the scammer, embedded in smaller transactions, in an attempt to negotiate. The first message read as follows: “You won bro. Keep 10% to yourself and get 90% back. Then we'll forget about that. We both know that 7m will definetely make your life better, but 70m won't let you sleep well.” Swiftly followed by: “We both know there's no way to clean this funds. You will be traced. We also both understand the "sleep well" phrase wasn't about your moral and ethical qualities.” Astonishingly, the scammer sent everything back to the whale, even foregoing their 10%. Although the attacker did make a tidy $3 million profit from the token appreciation over the course the event. Address poisoning is typically reserved for high-net-worth crypto holders, but for wallets great and small, the advice remains the same: double-check that address. When dealing with matters relating to cryptocurrencies, the conclusion is usually the same. The entire point of crypto, from day one, was to offer people an alternative form of money that was not beholden to other actors. The direct result of this mind-set is that the user assumes full responsibility for their assets. Some people accept the burden; some people do not. Those who do face a far less forgiving path.

ЦААШ УНШИХ
LiveChat
livechat

Эрсдлийн дохио : Худалдааны дериватив ба хөшүүрэг бүтээгдэхүүн нь өндөр түвшний эрсдэлтэй байдаг.

ДАНС НЭЭХ
to top icon