{"id":52342,"date":"2023-06-15T00:51:00","date_gmt":"2023-06-15T00:51:00","guid":{"rendered":"https:\/\/www.darkreading.com\/edge\/cryptocurrency-attacks-quadrupled-cybercriminals-cash-in"},"modified":"2023-06-15T00:51:00","modified_gmt":"2023-06-15T00:51:00","slug":"cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/","title":{"rendered":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cryptocurrency continues to be a favorite target of attackers, with attacks targeting Bitcoin and other currencies growing at a robust pace.<\/p>\n<p>In the recently released 2023 Data Breach Investigations Report (DBIR), Verizon noted that attacks in its dataset that specifically target cryptocurrency data grew 300% over 2022 to 48 incidents reported, up from 12 the year before. Whether the trend continues this year remains to be seen, says David Hylender, senior manager of threat intelligence for Verizon.<\/p>\n<p>&#8220;The crypto boom presented many opportunities for attackers to gain access to many valuable crypto assets,&#8221; Hylender says. &#8220;However, the circumstances have changed somewhat over the past year, and they may result in corresponding changes in the degree that attackers will be targeting this type of data.&#8221;<\/p>\n<p>Of the attacks submitted to the Verizon DBIR, about half used an exploit, more than 40% used stolen credentials, and about a quarter incorporated a phishing attack, according to the report. While some of the attacks \u2014 more than 10% \u2014 used email as a vector, most <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/dos-attacks-dominate-but-system-intrusions-cause-most-pain\" target=\"_blank\" rel=\"noopener\">compromised the user&#8217;s account<\/a> through the Web application or an application programming interface, the report stated.<\/p>\n<p>Verizon&#8217;s Hylender cautioned that the company had received only dozens of reports, much smaller than the hundreds or thousands of other types of compromises the company analyzed from other sources.<\/p>\n<p>&#8220;We caveat in the report that although it has seen a fourfold increase, it is still a relatively small number compared to all other data types,&#8221; he says.<\/p>\n<h2 class=\"regular-text\">Volatile Markets, Stable Cybercrime<\/h2>\n<p>Over the past decade, cryptocurrency has become an integral part of the cybercriminal ecosystem, allowing would-be attackers to pay for <a href=\"https:\/\/www.darkreading.com\/risk\/cybercrime-ecosystem-spawns-lucrative-underground-gig-economy\" target=\"_blank\" rel=\"noopener\">a variety of offensive-security services<\/a> and receive payments from <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns\" target=\"_blank\" rel=\"noopener\">ransomware victims<\/a>. Increasingly, the potential for quick and substantial financial gains has attracted speculative investors, who are, in return, targeted by scammers aiming to exploit this enthusiasm for their own benefit, says Kurt Baumgartner, a principal security researcher with Kaspersky.<\/p>\n<p>&#8220;Cryptocurrency enables cybercrime in multiple ways,&#8221; Baumgartner says. &#8220;We&#8217;ve seen cryptocurrency exchanges pilfered, cryptocurrency trading apps trojanized and their related Web sites compromised for use as command and control, cryptocurrency used by cybercrime individuals and groups for employment and services payments, &#8230; and cryptocurrency used as an easily laundered method of sometimes massive payment by victims in the millions for ransomware and other extortion crimes.&#8221;<\/p>\n<p>Even as the value of cryptocurrency fluctuates wildly in the market, it remains a popular financial instrument for cybercriminals to use <em>and<\/em> abuse. Last year, the number of cryptocurrency-related phishing attacks targeting Kaspersky customers grew 40% to 5.0 million, up from 3.6 million in 2021, the company stated.<\/p>\n<p>One campaign used a trojanized Tor browser to steal cryptocurrency from more than 15,000 users in 52 countries, stealing at least $400,000, <a href=\"https:\/\/securelist.com\/it-threat-evolution-q1-2023\/109838\/\" target=\"_blank\" rel=\"noopener\">according to Kaspersky&#8217;s research<\/a>. In another campaign, cyber-thieves used a loader dubbed DoubleFinger to install a Trojan \u2014 dubbed GreetingGhoul \u2014 that replaces the login window of common cryptocurrency wallets with an information-collecting duplicate.<\/p>\n<p>&#8220;DoubleFinger, coupled with GreetingGhoul, is an advancement for crime elements both in terms of stealth technology and targeting when it comes to cryptocurrency theft,&#8221; Kaspersky&#8217;s Baumgartner says. &#8220;As cryptocurrency continues to be a highly valued object of online theft efforts, with individuals protecting themselves with cold wallets and the like, malware like these demonstrate serious advancement both in malicious technologies and techniques.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge\/cryptocurrency-attacks-quadrupled-cybercriminals-cash-in\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers continue to attempt to steal Bitcoin and other virtual coins, with a 40% increase in phishing attacks and fourfold increase in incidents.Read More <a href=\"https:\/\/www.darkreading.com\/edge\/cryptocurrency-attacks-quadrupled-cybercriminals-cash-in\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-52342","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-15T00:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In\",\"datePublished\":\"2023-06-15T00:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/\"},\"wordCount\":545,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt51342cd1b8c1b1b7\\\/648a5a51bb62924b57ec8ee5\\\/threat-monitor-dbir-edited14.JPG\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/\",\"name\":\"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt51342cd1b8c1b1b7\\\/648a5a51bb62924b57ec8ee5\\\/threat-monitor-dbir-edited14.JPG\",\"datePublished\":\"2023-06-15T00:51:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt51342cd1b8c1b1b7\\\/648a5a51bb62924b57ec8ee5\\\/threat-monitor-dbir-edited14.JPG\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt51342cd1b8c1b1b7\\\/648a5a51bb62924b57ec8ee5\\\/threat-monitor-dbir-edited14.JPG\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/","og_locale":"en_US","og_type":"article","og_title":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-15T00:51:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In","datePublished":"2023-06-15T00:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/"},"wordCount":545,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/","url":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/","name":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG","datePublished":"2023-06-15T00:51:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt51342cd1b8c1b1b7\/648a5a51bb62924b57ec8ee5\/threat-monitor-dbir-edited14.JPG"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cryptocurrency-attacks-quadrupled-as-cybercriminals-cash-in\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52342"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52342\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}