{"id":45174,"date":"2022-02-06T11:00:01","date_gmt":"2022-02-06T11:00:01","guid":{"rendered":"http:\/\/14771319-e491-41e0-a649-55ec24eeb26f"},"modified":"2022-02-06T11:00:01","modified_gmt":"2022-02-06T11:00:01","slug":"4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/","title":{"rendered":"$4.4 million stolen in attack on blockchain infrastructure Meter"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Blockchain infrastructure company Meter said $4.4 million was stolen during a cyberattack on the platform that started at around 9 am ET on Saturday morning.<\/p>\n<p>The company said it manages an infrastructure that allows smart contracts to scale and travel through heterogeneous blockchain networks. The Meter network as well as the Moonriver network were affected by the hack.&nbsp;<\/p>\n<p>Blockchain research company PeckShield <a href=\"https:\/\/twitter.com\/peckshield\/status\/1490121762847092736\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">confirmed<\/a> that <a href=\"https:\/\/moonriver.moonscan.io\/tx\/0x5a87c24d0665c8f67958099d1ad22e39a03aa08d47d00b7276b8d42294ee0591\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">1391 ETH and 2.74 BTC<\/a> were stolen during the incident.&nbsp;<\/p>\n<figure class=\"media-source\"> <\/figure>\n<p>Around 2 pm ET on Saturday, the company <a href=\"https:\/\/twitter.com\/Meter_IO\/status\/1490045486606139392\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">said<\/a> it was hacked and urged users not to trade unbacked meterBNB circulating on Moonriver.&nbsp;<\/p>\n<p>&#8220;We have identified the issue: Passport has a feature to automatically wrap and unwrap gas tokens like ETH and BNB for user convenience. However the contract did not block direct interaction of the wrapped ERC20 tokens for the native gas token and did not properly transfer and verify the correct number of WETH transferred from the callers&#8217; address. We are working on compensating funds to all affected users,&#8221; the company explained.&nbsp;<\/p>\n<p>By 6 pm, Meter <a href=\"https:\/\/twitter.com\/Meter_IO\/status\/1490103308421255168\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">wrote<\/a> that it stopped all bridge transactions and discovered that the issue related to a bug &#8220;introduced in the automatic wrap and wrap of native tokens like BNB and ETH extended by the Meter team.&#8221;<\/p>\n<p>According to Meter, its extended code &#8220;had a wrong trust assumption&#8221; that let the hacker fake BNB and ETH transfers by &#8220;calling the underlying ERC20 deposit function.&#8221;&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>They are working with authorities and said they found &#8220;some early traces of the hacker,&#8221; urging the culprit to return the stolen money.&nbsp;<\/p>\n<p>Compensation plans are allegedly being created for the users who held WETH and BNB as well as the &#8220;liquidity providers.&#8221;&nbsp;<\/p>\n<p>&#8220;We urge all the liquidity providers that provide liquidity involving WETH and BNB to remove liquidity from the pool and wait for an additional announcement from the Meter team. Please try avoid trading in these pairs as well,&#8221; the company explained.&nbsp;<\/p>\n<figure class=\"media-source\">\n<div class=\"twitterContainer\" readability=\"8.0891238670695\">\n<blockquote class=\"twitter-tweet\" readability=\"9.5166163141994\">\n<p lang=\"en\" dir=\"ltr\">We are working on taking a snapshot from before the attack &amp; will convert the original BNB &amp; WETH to 1:1 their values in MTRG, the rest inflated BNB &amp; WETH will be converted based on the hacker stolen value from the LP pools.<\/p>\n<p>We&#8217;ve set aside $4.4M of MTRG based on today&#8217;s price.<\/p>\n<p>\u2014 \u26a1\ufe0fMeter.io\u26a1\ufe0f (@Meter_IO) <a href=\"https:\/\/twitter.com\/Meter_IO\/status\/1490110423667929092?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">February 5, 2022<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>On Wednesday, <a href=\"https:\/\/www.zdnet.com\/article\/324-million-in-ether-stolen-from-blockchain-platform-wormhole\/\" target=\"_blank\" rel=\"noopener\">$324 million was stolen<\/a> through popular decentralized cross-chain message passing protocol Wormhole. Researchers found evidence of an&nbsp;<a href=\"https:\/\/etherscan.io\/tx\/0xacd309b02e4b533484d148de9ab0adf367ed4e70ed751d1ff036152dc3bc0479\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">80,000 ETH transfer<\/a>&nbsp;from Wormhole as well as another&nbsp;<a href=\"https:\/\/twitter.com\/0xB07DAD\/status\/1488982652174540802\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">40,000 of ETH<\/a>&nbsp;being sold by the hacker on Solana.&nbsp;<\/p>\n<p>They have <a href=\"https:\/\/wormholecrypto.medium.com\/wormhole-incident-report-02-02-22-ad9b8f21eec6\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">offered<\/a> $10 million to the hacker for the return of the funds and offered the same amount to anyone who can provide information &#8220;leading to the arrest and conviction of those responsible for the hack.&#8221;<\/p>\n<p>Just five days before the Wormhole incident, DeFi protocol Qubit Finance took to Twitter to beg hackers to return&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/qubit-finance-crypto-platform-begs-hacker-to-return-80-million-in-stolen-funds\/\" target=\"_blank\" rel=\"noopener\">more than $80 million<\/a>&nbsp;that was stolen from them.&nbsp;<\/p>\n<p>The recent hacks continue a run of attacks on DeFi and blockchain platforms that have occurred over the last year. Chainalysis said at least&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/22-billion-in-cryptocurrency-stolen-from-defi-platforms-in-2021-report\/\" target=\"_blank\" rel=\"noopener\">$2.2 billion was outright stolen<\/a>&nbsp;from DeFi protocols in 2021. Poly Network saw&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/poly-network-hackers-potentially-stole-610-million-is-bitcoin-still-safe\/\" target=\"_blank\" rel=\"noopener\">$611 million<\/a>&nbsp;stolen from their platform in August while&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/bitmart-breach-losses-reach-200-million\/\" target=\"_blank\" rel=\"noopener\">Bitmart lost $196 million<\/a>&nbsp;in early December.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Meter and Moonriver networks were affected by the cyberattack.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45174","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-06T11:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"$4.4 million stolen in attack on blockchain infrastructure Meter\",\"datePublished\":\"2022-02-06T11:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\\\/2019\\\/07\\\/15\\\/bc57c400-ec17-4fcf-968f-17314e68a653\\\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/\",\"name\":\"$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\\\/2019\\\/07\\\/15\\\/bc57c400-ec17-4fcf-968f-17314e68a653\\\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-02-06T11:00:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\\\/2019\\\/07\\\/15\\\/bc57c400-ec17-4fcf-968f-17314e68a653\\\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\\\/2019\\\/07\\\/15\\\/bc57c400-ec17-4fcf-968f-17314e68a653\\\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"$4.4 million stolen in attack on blockchain infrastructure Meter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/","og_locale":"en_US","og_type":"article","og_title":"$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-06T11:00:01+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"$4.4 million stolen in attack on blockchain infrastructure Meter","datePublished":"2022-02-06T11:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/"},"wordCount":552,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/","url":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/","name":"$4.4 million stolen in attack on blockchain infrastructure Meter 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-02-06T11:00:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/699a6b2877a9dd94b2ee7a1223ddffef0f94078c\/2019\/07\/15\/bc57c400-ec17-4fcf-968f-17314e68a653\/blockchain-566x372.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"$4.4 million stolen in attack on blockchain infrastructure Meter"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45174"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45174\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}