Share this article

Bitcoin Miner Marathon Digital Misses Q1 Revenue Expectation On Operational Challenges

The shares of the miner dipped about 1.5% in after hours trading on Thursday afternoon.

Updated May 9, 2024, 8:43 p.m. Published May 9, 2024, 8:40 p.m.
Marathon Digital CEO Fred Thiel (CoinDesk)
Marathon Digital CEO Fred Thiel (CoinDesk)

Marathon Digital (MARA), one of the largest bitcoin miners, missed consensus first-quarter revenue expectations due to operational challenges it faced during the quarter.

The company mined just 2,811 bitcoin during the year's first three months, down 34% from the previous quarter.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters

"Bitcoin production, and therefore revenues, generated during the quarter was negatively impacted by unexpected equipment failures, transmission line maintenance, and higher than anticipated weather-related curtailments at Garden City and other sites during the quarter," the company said in a statement on Thursday.

Marathon reported first quarter earnings per share of $1.26, at first glance easily topping Wall Street estimates of $0.02, but not comparable to forecasts as the company adopted newly-approved FASB fair value accounting rules. The mark-to-market adjustment was a very favorable one given the big run higher in bitcoin prices.

The miner is sticking to its 2024 guidance of ramping up to 50 exahash per second (EH/s) and sees additional growth in 2025.

Marathon's stock fell roughly 1.5% in post-market trading on Thursday. Shares have declined 26% this year while peer Riot Platforms (RIOT) has seen its stock price fall 40%.


Больше для вас

Specialized AI detects 92% of real-world DeFi exploits

hackers (Modified by CoinDesk)

New research claims specialized AI dramatically outperforms general-purpose models at detecting exploited DeFi vulnerabilities.

Что нужно знать:

  • A purpose-built AI security agent detected vulnerabilities in 92% of 90 exploited DeFi contracts ($96.8 million in exploit value), compared with 34% and $7.5 million for a baseline GPT-5.1-based coding agent running on the same underlying model.
  • The gap came from domain-specific security methodology layered on top of the model, not differences in core AI capability, according to the report.
  • The findings come as prior research from Anthropic and OpenAI shows AI agents can execute end-to-end smart contract exploits at low cost, accelerating concerns that offensive AI capabilities are scaling faster than defensive adoption.