{"id":159511,"date":"2022-09-20T10:05:17","date_gmt":"2022-09-20T17:05:17","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=159511"},"modified":"2025-03-26T22:44:48","modified_gmt":"2025-03-27T05:44:48","slug":"cryptohacking-is-cryptocurrency-losing-its-credibility","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/","title":{"rendered":"Cryptohacking: Is Cryptocurrency Losing Its Credibility?"},"content":{"rendered":"<p><span data-contrast=\"auto\">In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online currencies from experts, hobbyists and newbies alike \u2026 and in cybercriminals seeking huge paydays. Since then, cryptocurrency value has cooled, as has the public\u2019s opinion about whether it\u2019s worth the risk. Huge cryptohacking events dominate the headlines, leaving us to wonder: Is cryptocurrency losing its credibility?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In this article, you\u2019ll learn about recent unfortunate crypto hacks and a few <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/3-tips-to-boost-your-crypto-confidence\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">cryptocurrency security tips<\/span><\/a><span data-contrast=\"auto\"> to help you avoid a similar misfortune.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Secure Your Crypto Wallet<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-a-crypto-wallet-and-how-to-keep-your-wallet-secure\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">crypto wallet<\/span><\/a><span data-contrast=\"auto\"> is the software or the physical device that stores the public and private keys to your cryptocurrency. A public key is the string of letters and numbers that people swap with each other in crypto transactions. It\u2019s ok to share a public key with someone you trust. Your private key, however, must remain private \u2014 think of it like the password that secures your online bank account. Just like your actual wallet, if it falls into the wrong hands, you can lose a lot of money.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">What happened in the Mars Stealer malware attack on crypto wallets?\u00a0<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">A malware called Mars Stealer infiltrated several crypto wallet browser extensions, including the popular MetaMask. The malware stole private keys and then erased its tracks to mask that it had ever gained entry to the wallet.<\/span><span data-contrast=\"auto\">1<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">How can you ensure a secure wallet? <\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">One way to completely avoid a breach to your software crypto wallet is to opt for a hardware wallet. A hardware wallet is a physical device that can only be opened with a PIN. But there is some risk involved with a hardware wallet: if you drop it down the drain, all your crypto is gone. If you forget your wallet PIN, there is no customer service chatbot that can help you remember it. You are solely responsible for keeping track of it. For those who are confident in their hardware\u2019s hiding spot and their personal organizational skills, they can benefit from its added security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For anyone less sure of their ability to keep track of a hardware wallet, a software wallet is a fine alternative, though always been on alert of software wallet hacks. Keep an eye on crypto news and be ready to secure your software at a moment\u2019s notice. Measures include un-downloading browser extensions, changing passwords, or transferring your crypto assets to another software wallet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the case of the Mars Stealer malware that affected MetaMask, being careful about visiting secure sites and only clicking on trustworthy links could\u2019ve helped prevent it. Mars Stealer made its way onto people\u2019s devices after they clicked on an infected link or visited a risky website. Stick to websites you know you can trust and consider springing for well-known streaming services and paying for software instead of torrenting from free sources.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Only Trust Secure Bridges and Be Prepared to Act Quickly<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Cryptocurrency enthusiasts often spread their crypto investments across various currency types and blockchain environments. Software known as a bridge can link numerous accounts and types, making it easier to send currency.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">What happened in the Horizon bridge hack?<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">The cross-chain bridge Horizon experienced was on its Harmony blockchain, where a hacker stole about $100 million in Ethereum and tokens. The hacker stole two private keys, with which they could then validate this huge transaction into their own wallet. To hopefully prevent this from happening in the future, Horizon now requires more than just two validators.<\/span><span data-contrast=\"auto\">2<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">How can you avoid crumbling bridges?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">According to one report, in 2022, 69% of all cryptocurrency losses have occurred in bridge attacks.<\/span><span data-contrast=\"auto\">3<\/span><span data-contrast=\"auto\"> If you exchange cryptocurrencies with other users and have various accounts, it\u2019s almost inevitable that you\u2019ll use bridge software. To keep your assets safe, make sure to extensively research any bridge before trusting it. Take a look at their security protocols and how they\u2019ve responded to past breaches, if applicable.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the case of Horizon, the stolen private keys were encrypted with a passphrase and with a key management service, which follows best practices. Make sure that you always defend your private keys and all your cryptocurrency-related accounts with multi-factor authentication. Even though it may not 100% protect your assets, it\u2019ll foil a less persistent cybercriminal.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Phishing attacks on bridge companies in conjunction with software hacks are also common. In this scenario, there\u2019s unfortunately not much you can control. What you can control is how quickly and completely you respond to the cybercrime event. Remove the bridge software from your devices, transfer all your assets to a hardware wallet, and await further instructions from the bridge company on how to proceed.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Never Trade Security for Convenience<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Decentralized finance, or DeFi, is now one of the riskiest aspects of cryptocurrency. DeFi is a system without governing bodies. Some crypto traders like the anonymity and autonomy of being able to make transactions without a bank or institution tracking their assets. The drawback is that the code used in smart contracts isn\u2019t bulletproof and has been at the center of several costly cybercrimes. Smart contracts are agreed upon by crypto buyers and sellers, and they contain code that programs crypto to perform certain financial transactions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">What happened in recent smart contract hacks?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Three multi-million-dollar heists \u2013 Wormhole, Beanstalk Farms and Ronin bridge \u2013 occurred in quick succession, and smart contracts were at the center of each.<\/span><span data-contrast=\"auto\">4<\/span><span data-contrast=\"auto\"> In the case of <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/3-tips-to-boost-your-crypto-confidence\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">Wormhole<\/span><\/a><span data-contrast=\"auto\">, a cybercriminal minted 120,000 in one currency and then traded them for Ethereum without putting up the necessary collateral. In the end, the hacker cashed out with $320 million. Beanstalk Farms lost $182 million when a hacker discovered a loophole in the stablecoin\u2019s flash loan smart contract. Axie Infinity\u2019s <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/625-million-stolen-in-latest-crypto-attack-5-tips-on-how-to-use-digital-currency-safely\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">Ronin bridge<\/span><\/a><span data-contrast=\"auto\"> was hit for $625 million when a hacker took control over and signed five of the nine validator nodes through a smart contract hole.<\/span><span data-contrast=\"auto\">4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">How can you avoid smart contract failures <\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">To be safe, conduct all crypto transactions on well-known and trustworthy software, applications, bridges, and wallets that are backed by a governing body. What you lose in anonymity you gain in security by way of regulated protocols. Hackers are targeting smart contracts because they do not have to depend on large-scale phishing schemes to get the information they need. Instead, they can infiltrate the code themselves and steal assets from the smartest and most careful crypto users. Because there\u2019s almost no way you can predict the next smart contract hack, the best path forward is to always remain on your toes and be ready to react should one occur.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Enjoy Cryptocurrency but Keep Your Eyes Peeled<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Don\u2019t let these costly hacks be what stops you from exploring crypto! Crypto is great as a side hustle if you\u2019re committed to security and are strategic in your investments. Make sure you follow the best practices outlined and arm all your devices (mobile included!) with top-notch security, such as antivirus software, a VPN, and a password manager, all of which are included in <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"auto\">McAfee +<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Privacy, excellent security habits, and an eagle eye can help you enjoy the most out of cryptocurrency and sidestep its costly pitfalls. Now, go forth confidently and prosper in the crypto realm!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">1<\/span><span data-contrast=\"auto\">Cointelegraph, \u201c<\/span><a href=\"https:\/\/cointelegraph.com\/news\/hodlers-beware-new-malware-targets-metamask-and-40-other-crypto-wallets\"><span data-contrast=\"auto\">Hodlers, beware! New malware targets MetaMask and 40 other crypto wallets<\/span><\/a><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">2<\/span><span data-contrast=\"auto\">Halborn, \u201c<\/span><a href=\"https:\/\/halborn.com\/explained-the-harmony-horizon-bridge-hack\/\"><span data-contrast=\"auto\">Explained: The Harmony Horizon Bridge Hack<\/span><\/a><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">3<\/span><span data-contrast=\"auto\">Chainalysis, \u201c<\/span><a href=\"https:\/\/blog.chainalysis.com\/reports\/cross-chain-bridge-hacks-2022\/\"><span data-contrast=\"auto\">Vulnerabilities in Cross-chain Bridge Protocols Emerge as Top Security Risk<\/span><\/a><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">4<\/span><span data-contrast=\"auto\">Cointelegraph, \u201c<\/span><a href=\"https:\/\/cointelegraph.com\/news\/beanstalk-farms-loses-182m-in-defi-governance-exploit\"><span data-contrast=\"auto\">Beanstalk Farms loses $182M in DeFi governance exploit<\/span><\/a><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir&#8230;<\/p>\n","protected":false},"author":1228,"featured_media":159698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[15504,5220,15505,15503,15507,15506],"coauthors":[7231],"class_list":["post-159511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-crypto-wallet-security","tag-cryptocurrency","tag-cryptohacking","tag-smart-contract","tag-smart-contract-hack","tag-software-bridge"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T17:05:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T05:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"308\" \/>\n\t<meta property=\"og:image:height\" content=\"208\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vishnu Varadaraj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vishnu Varadaraj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\"},\"author\":{\"name\":\"Vishnu Varadaraj\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\"},\"headline\":\"Cryptohacking: Is Cryptocurrency Losing Its Credibility?\",\"datePublished\":\"2022-09-20T17:05:17+00:00\",\"dateModified\":\"2025-03-27T05:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\"},\"wordCount\":1250,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png\",\"keywords\":[\"Crypto wallet security\",\"cryptocurrency\",\"Cryptohacking\",\"Smart contract\",\"Smart contract hack\",\"Software bridge\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\",\"name\":\"Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png\",\"datePublished\":\"2022-09-20T17:05:17+00:00\",\"dateModified\":\"2025-03-27T05:44:48+00:00\",\"description\":\"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png\",\"width\":308,\"height\":208},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cryptohacking: Is Cryptocurrency Losing Its Credibility?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\",\"name\":\"Vishnu Varadaraj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"caption\":\"Vishnu Varadaraj\"},\"description\":\"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog","description":"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog","og_description":"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-09-20T17:05:17+00:00","article_modified_time":"2025-03-27T05:44:48+00:00","og_image":[{"width":308,"height":208,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png","type":"image\/png"}],"author":"Vishnu Varadaraj","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Vishnu Varadaraj","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/"},"author":{"name":"Vishnu Varadaraj","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a"},"headline":"Cryptohacking: Is Cryptocurrency Losing Its Credibility?","datePublished":"2022-09-20T17:05:17+00:00","dateModified":"2025-03-27T05:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/"},"wordCount":1250,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png","keywords":["Crypto wallet security","cryptocurrency","Cryptohacking","Smart contract","Smart contract hack","Software bridge"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/","name":"Cryptohacking: Is Cryptocurrency Losing Its Credibility? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png","datePublished":"2022-09-20T17:05:17+00:00","dateModified":"2025-03-27T05:44:48+00:00","description":"In the fall of 2021, cryptocurrency value skyrocketed. Ethereum and Bitcoin had their highest values ever, causing a huge stir in interest in online","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_092322-1.png","width":308,"height":208},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cryptohacking-is-cryptocurrency-losing-its-credibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Cryptohacking: Is Cryptocurrency Losing Its Credibility?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a","name":"Vishnu Varadaraj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","caption":"Vishnu Varadaraj"},"description":"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.","sameAs":["https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/159511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=159511"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/159511\/revisions"}],"predecessor-version":[{"id":211544,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/159511\/revisions\/211544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/159698"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=159511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=159511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=159511"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=159511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}