{"id":46235,"date":"2022-04-18T15:05:58","date_gmt":"2022-04-18T15:05:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33338\/Crypto-Stablecoin-Collapses-After-182M-Hack.html"},"modified":"2022-04-18T15:05:58","modified_gmt":"2022-04-18T15:05:58","slug":"crypto-stablecoin-collapses-after-182m-hack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/","title":{"rendered":"Crypto Stablecoin Collapses After $182M Hack"},"content":{"rendered":"<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Hackers stole $182 million from an Ethereum-based stablecoin protocol in what\u2019s yet another attack on a crypto project.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"24.219178082192\"><\/p>\n<p>On Sunday, <a href=\"https:\/\/twitter.com\/peckshield\/status\/1515680335769456640?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1515680335769456640%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.coindesk.com%2Ftech%2F2022%2F04%2F17%2Fattacker-drains-182m-from-beanstalk-stablecoin-protocol%2F\" target=\"_blank\" rel=\"noopener\"><span>cybersecurity firm PeckShield reported the attack<\/span><\/a> on Beanstalk Farms, saying hackers stole more than $80 million for themselves, but the protocol\u2019s losses appeared to be even higher. <a href=\"https:\/\/twitter.com\/peckshield\/status\/1515713013868814336?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1515713013868814336%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fcointelegraph.com%2Fnews%2Fbeanstalk-farms-loses-182m-in-defi-governance-exploit\" target=\"_blank\" rel=\"noopener\"><span>The company later said<\/span><\/a> its initial analysis showed the losses amounted to around $182 million.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"22.385964912281\"><\/p>\n<p>An hour after the hack was reported, Beanstalk <a href=\"https:\/\/twitter.com\/BeanstalkFarms\/status\/1515700678454390785\" target=\"_blank\" rel=\"noopener\"><span>confirmed it had been hacked in a tweet<\/span><\/a> saying it had \u201csuffered an exploit\u201d and it was \u201cinvestigating the attack.\u201d&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33.146953405018\"><\/p>\n<p>On Beanstalk\u2019s official Discord channel, <a href=\"https:\/\/mobile.twitter.com\/isthispublius\" target=\"_blank\" rel=\"noopener\">Publius<\/a>, one of the developers of the project, commented on the hack, saying: Honestly not sure what to type. We are fucked. This project has not had any venture backing, so it is highly unlikely there is any sort of bail out coming.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cReally a horrible day,\u201d he added. \u201cThere are no funds left. [&#8230;] they minted enough Beans to sell them and drain the liquidity on all pools.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33.463073852295\"><\/p>\n<p>Because crypto can be so volatile, numerous stablecoin projects have popped up to provide even-keeled refuge for traders in the complex world of decentralized finance, or DeFi. Beanstalk did not seek to back its peg with cash reserves, but rather constructed financial incentives for protocol participants, who loan the platform tokens in return for a yield. The hack has caused the stablecoin Bean to break its $1 peg dramatically, and <a href=\"https:\/\/www.coingecko.com\/en\/coins\/bean\" target=\"_blank\" rel=\"noopener\"><span>it currently trades at<\/span><\/a> $.156 according to data from CoinGecko.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>On Discord, the company shared more details of the hack. \u201cAn attacker was able to exploit Beanstalk and transfer all of the assets in the contract to their wallet,\u201d the company wrote.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.823734729494\"><\/p>\n<p>In short, the hackers did a \u201crogue update proposal\u201d that sent all the funds to the hackers\u2019 wallet, \u201cthat was passed with the power of a flash loan,\u201d according to Tal Be\u2019ery, a cybersecurity researcher and the chief technology officer of <a href=\"https:\/\/zengo.com\/\" target=\"_blank\" rel=\"noopener\"><span>ZenGo<\/span><\/a>. In other words, the hacker used a flash loan\u2014a buzzy tool in DeFi that lets users take out an instant uncollateralized loan\u2014and used those funds to buy enough voting power to push through a change that allowed them to steal from Beanstalk. Flash loans have been <a href=\"https:\/\/www.vice.com\/en\/article\/m7vjjy\/cryptocurrency-loan-platform-implodes-in-dollar130-million-hack\"><span>exploited in previous high-profile crypto hacks<\/span><\/a>.&nbsp;<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"8.3793103448276\">\n<p><em><strong>Do you have more information about the Beanstalk hack? Or other web3 and crypto hacks? We\u2019d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, Wickr\/Telegram\/Wire @lorenzofb, or email <a href=\"mailto:lorenzofb@vice.com\">lorenzofb@vice.com<\/a><\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>\u201cThe problem is that their voting system was not well protected against flash-loan attacks,\u201d Be\u2019ery told Motherboard in an online chat. \u201cIn theory, you get to vote proportionally to your holdings, assuming the bigger stake you have, you are more concerned about the protocol and take more time to validate the improvement proposal. However, with Flash loans you have an &#8220;artificial&#8221; stake , because the loans need to be immediately repaid and thus do not represent a genuine interest in the protocol.\u201d<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.04347826087\"><\/p>\n<p>Blockchain security firm Omniscia, which audited Beanstalk Farms\u2019 code in the past, <a href=\"https:\/\/medium.com\/@omniscia.io\/beanstalk-farms-post-mortem-analysis-a0667ee0ca9d\" target=\"_blank\" rel=\"noopener\"><span>analyzed the attack in a blog post<\/span><\/a>. According to the company, the hacker compromised the protocol\u2019s governance mechanism taking advantage of a flaw in a new service they launched, \u201cultimately permitting the attacker to conduct an emergency execution of a malicious proposal siphoning project funds.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>A Beanstalk spokesperson known as Publius did not immediately respond to a request for comment via email.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.036144578313\"><\/p>\n<p><a href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1515715931963801603\" target=\"_blank\" rel=\"noopener\"><span>According to PeckShield<\/span><\/a>, the hackers laundered all the stolen crypto through Tornado Cash, a well-known service that helps users mix and tumble crypto in order to obfuscate their funds\u2019 movements; and <a href=\"https:\/\/twitter.com\/peckshield\/status\/1515693348815790081\" target=\"_blank\" rel=\"noopener\"><span>they also donated $250,000<\/span><\/a> to the <a href=\"https:\/\/donate.thedigital.gov.ua\/\" target=\"_blank\" rel=\"noopener\"><span>Ukraine Crypto Fund<\/span><\/a>, a fund where people can donate cryptocurrency to Ukraine\u2019s government.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"26.594696969697\"><\/p>\n<p>This is the latest in a long string of hacks against crypto and decentralized finance (DeFi) projects. Earlier this month, <a href=\"https:\/\/www.vice.com\/en\/article\/3abwj3\/play-to-earn-game-token-collapses-after-hacker-cashes-out\"><span>hackers stole $300,000<\/span><\/a> from the blockchain-based game WonderHero. At the end of March, <a href=\"https:\/\/www.vice.com\/en\/article\/3abeeb\/hackers-steal-dollar600m-from-play-to-earn-game-axie-infinitys-ronin-network\"><span>hackers stole more than $600 million<\/span><\/a> from the play-to-earn game Axie Infinity. The US government <a href=\"https:\/\/www.vice.com\/en\/article\/m7vdg3\/us-adds-axie-infinity-hacker-to-north-korea-sanctions-list\"><span>attributed this attack to North Korean government hackers<\/span><\/a>, adding the wallet they used to transfer the stolen funds to a sanctions list in an attempt to make it harder for the hackers to move or spend the stolen crypto.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"10.617647058824\"><\/p>\n<p>In the last few months going back to last year, among several other hacks, hackers have stolen <a href=\"https:\/\/www.vice.com\/en\/article\/n7bmxd\/poly-network-hacker-returned-stolen-funds\"><span>$600 million from Poly Network<\/span><\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/xgd483\/dollar320-million-crypto-heist-rocks-decentralized-finance-world\"><span>$320 million from cross-chain bridge Wormhole<\/span><\/a>, <a href=\"https:\/\/www.vice.com\/en_us\/article\/g5qj9j\/cryptocom-says-incident-was-actually-dollar30-million-hack\"><span>$30 million from popular exchange Crypto.com<\/span><\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/v7dzd8\/people-are-still-getting-pwned-a-week-after-a-crypto-hack-was-contained\"><span>around $4 million from users of Multichain<\/span><\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/4awxep\/hackers-steal-dollar140-million-from-users-of-crypto-gaming-company\"><span>$140 million from a crypto gaming company<\/span><\/a>, <a href=\"https:\/\/www.vice.com\/en\/article\/v7dv4a\/hacked-cryptocurrency-platform-begs-hacker-to-please-return-dollar119-million\"><span>almost $120 million from visitors to the website of a DAO<\/span><\/a>, and<a href=\"https:\/\/www.vice.com\/en\/article\/akvewk\/hackers-steal-dollar150m-from-crypto-exchange-billed-as-most-trusted\"><span> $150 million from a crypto exchange<\/span><\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"18.89156626506\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast, <a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\"><span>CYBER<\/span><\/a>. Subscribe to <a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\"><span>our new Twitch channel<\/span><\/a>.<\/strong><\/em><\/p>\n<p><\/span>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33338\/Crypto-Stablecoin-Collapses-After-182M-Hack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46236,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8298],"class_list":["post-46235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerbankcybercrimedata-lossfraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T15:05:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Crypto Stablecoin Collapses After $182M Hack\",\"datePublished\":\"2022-04-18T15:05:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\"},\"wordCount\":813,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg\",\"keywords\":[\"headline,hacker,bank,cybercrime,data loss,fraud,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\",\"name\":\"Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg\",\"datePublished\":\"2022-04-18T15:05:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,bank,cybercrime,data loss,fraud,cryptography\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimedata-lossfraudcryptography\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Crypto Stablecoin Collapses After $182M Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/","og_locale":"en_US","og_type":"article","og_title":"Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-18T15:05:58+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Crypto Stablecoin Collapses After $182M Hack","datePublished":"2022-04-18T15:05:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/"},"wordCount":813,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg","keywords":["headline,hacker,bank,cybercrime,data loss,fraud,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/","url":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/","name":"Crypto Stablecoin Collapses After $182M Hack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg","datePublished":"2022-04-18T15:05:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/crypto-stablecoin-collapses-after-182m-hack.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/crypto-stablecoin-collapses-after-182m-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,bank,cybercrime,data loss,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimedata-lossfraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Crypto Stablecoin Collapses After $182M Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46235"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46236"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}