{"id":5470,"date":"2023-10-23T04:49:32","date_gmt":"2023-10-23T04:49:32","guid":{"rendered":"https:\/\/realacademy.io\/?p=5470"},"modified":"2023-10-23T05:07:03","modified_gmt":"2023-10-23T05:07:03","slug":"biggest-crypto-hacks-of-2022","status":"publish","type":"post","link":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/","title":{"rendered":"BIGGEST CRYPTO HACKS OF 2022"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5470\" class=\"elementor elementor-5470\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ba2e43a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ba2e43a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15dfd489\" data-id=\"15dfd489\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2943b87b elementor-widget elementor-widget-text-editor\" data-id=\"2943b87b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:html \/-->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7a1360 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d7a1360\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a0a11f\" data-id=\"4a0a11f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-860af75 elementor-widget elementor-widget-image\" data-id=\"860af75\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1020\" height=\"574\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322-1024x576.jpg\" class=\"attachment-large size-large wp-image-5473\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322-1024x576.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322-300x169.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322-768x432.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322-510x287.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1440x810_cmsv2_d1b69a80-e612-5065-a4df-c9d62b0ee6fc-6578322.jpg 1440w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18d72b1 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"18d72b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Each year, massive sums of money are lost due to crypto hacks and attacks. 2022 was termed the <span style=\"font-size: 14.4px;\">\u201cbiggest year ever for hacking activity&#8221;.\u00a0<\/span><span style=\"font-size: 14.4px;\">Below are some of the notable crypto hacks of 2022.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40eb7da blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"40eb7da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>RONIN NETWORK<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56a5243 elementor-widget elementor-widget-image\" data-id=\"56a5243\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/RoninKatanaDEX-1.jpg\" class=\"attachment-large size-large wp-image-5475\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/RoninKatanaDEX-1.jpg 800w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/RoninKatanaDEX-1-300x188.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/RoninKatanaDEX-1-768x480.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/RoninKatanaDEX-1-510x319.jpg 510w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71fbb3d blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"71fbb3d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 23rd March 2022<\/p>\n<p>Reported loss: $625 million<\/p>\n<div dir=\"ltr\">\n<div dir=\"auto\">\n<div dir=\"auto\">\n<div dir=\"auto\">\n<p class=\"MsoNormal\">According to Ronin Network, an attacker took over control of the validator nodes on the Ronin blockchain operated by Sky Mavis and Axie DAO. The validators play a crucial role in securing the chain by moderating activity. Unfortunately, the attacker gained entry through a backdoor.<\/p>\n<p class=\"MsoNormal\">To recognize a Deposit or Withdrawal event, five out of the nine validator signatures are necessary. However, the attacker gained control of four Ronin Validators operated by Sky Mavis and a third-party validator run by Axie DAO.<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83098f blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"c83098f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>WORMHOLE BRIDGE<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a14a11d elementor-widget elementor-widget-image\" data-id=\"a14a11d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/Wormhole-website-800x500-1.jpg\" class=\"attachment-large size-large wp-image-5476\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/Wormhole-website-800x500-1.jpg 800w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/Wormhole-website-800x500-1-300x188.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/Wormhole-website-800x500-1-768x480.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/Wormhole-website-800x500-1-510x319.jpg 510w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-def49c9 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"def49c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 2nd February 2022<\/p>\n<p>Reported loss: $320 million<\/p>\n<div dir=\"ltr\">\n<div dir=\"auto\">\n<div dir=\"auto\">The hacker bypassed the verification step by injecting a fake sysvar account and successfully generated a malicious message that specified for 120,000 wETH to be minted. By invoking the complete wrapped function with the malicious message, the attacker successfully minted 120,000 wETH.<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af80a71 blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"af80a71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>NOMAD BRIDGE<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d0f3b8 elementor-widget elementor-widget-image\" data-id=\"5d0f3b8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"618\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2-1024x620.png\" class=\"attachment-large size-large wp-image-5477\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2-1024x620.png 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2-300x182.png 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2-768x465.png 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2-510x309.png 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/meta-image-2.png 1041w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7e47ea blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"c7e47ea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 1st August 2022<\/p>\n<p>Reported loss:<span style=\"color: #333333; font-size: 14.4px;\"> $190 million<\/span><\/p>\n<div dir=\"ltr\">\n<div dir=\"auto\">\n<div dir=\"auto\">The original cause of the attack was that Nomad&#8217;s smart contract failed to properly validate the input of the transaction. What&#8217;s unique about this attack is that thousands of addresses looted Nomad&#8217;s account. It appears that they were able to copy &amp; paste the attacker&#8217;s original call data, adding their own addresses.<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-932565d blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"932565d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>BEANSTALK FARMS<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-703b898 elementor-widget elementor-widget-image\" data-id=\"703b898\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"825\" height=\"485\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/2022-ARTICLE-IMAGE-1-10.png\" class=\"attachment-large size-large wp-image-5478\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/2022-ARTICLE-IMAGE-1-10.png 825w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/2022-ARTICLE-IMAGE-1-10-300x176.png 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/2022-ARTICLE-IMAGE-1-10-768x451.png 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/2022-ARTICLE-IMAGE-1-10-510x300.png 510w\" sizes=\"(max-width: 825px) 100vw, 825px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20cef94 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"20cef94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 17th April 2022<\/p>\n<p>Reported loss: <span style=\"color: #333333; font-size: 14.4px;\">$182 million<\/span><\/p>\n<p><span style=\"color: #333333; font-size: 14.4px;\">According to analysis from blockchain security firm CertiK, the Beanstalk attacker used a flash loan obtained through the decentralized protocol Aave to borrow close to $1 billion in cryptocurrency assets and exchanged these for enough beans to gain a 67 percent voting stake in the project.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d3d204 blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"8d3d204\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>WINTERMUTE<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f33d77 elementor-widget elementor-widget-image\" data-id=\"3f33d77\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"536\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute-1024x538.jpg\" class=\"attachment-large size-large wp-image-5479\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute-1024x538.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute-300x158.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute-768x403.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute-510x268.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/wintermute.jpg 1200w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edea249 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"edea249\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 20th September<\/p>\n<p>Reported loss: $160 million<\/p>\n<p>The Wintermute attack was enabled by a defect in Profanity&#8217;s algorithm. In a departure from the usual smart contract exploits, this defect allowed an attacker to directly target compromised private keys of Wintermute users.<\/p>\n<p>Mudit Gupta, chief security officer at Polygon, guessed in a tweet that the hack was a result of a hot wallet compromise due to the Profanity bug uncovered by 1inch contributors a week ago. 1inch had warned that wallet addresses generated using the Profanity tool were at risk of compromise.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c80423d blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"c80423d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>ELROND NETWORK<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db54acf elementor-widget elementor-widget-image\" data-id=\"db54acf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/elrond-cryptoninjas-1.jpg\" class=\"attachment-large size-large wp-image-5481\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/elrond-cryptoninjas-1.jpg 750w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/elrond-cryptoninjas-1-300x150.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/elrond-cryptoninjas-1-510x255.jpg 510w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6fb753 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"b6fb753\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 5th June 2022<\/p>\n<p>Reported loss: $113 million<\/p>\n<p>Decentralized exchange Maiar was hacked in early June, with the hacker exploiting loopholes in a smart contract to steal 1.65 million EGLD (Elrond egold) worth an estimated $113 million. According to reports, the hacker managed to sell off 800,000 of the stolen tokens for a sum of $54 million. While the rest were either bridged to ETH or USDC, or being stored in a number of different wallets.<\/p>\n<p>However, founder and CEO of Elrond Network Beniamin Mincu claimed that a significant portion of stolen funds were recovered.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21476dc blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"21476dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>FTX\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03f84f9 elementor-widget elementor-widget-image\" data-id=\"03f84f9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"536\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo-1024x538.jpg\" class=\"attachment-large size-large wp-image-5482\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo-1024x538.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo-300x158.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo-768x403.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo-510x268.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/FTX_Logo.jpg 1354w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b38a0f blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"6b38a0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 11th November 2022<\/p>\n<p>Reported loss: <span style=\"color: #333333; font-size: 14.4px;\">$600 million<\/span><\/p>\n<p>On November 11, 2022, FTX experienced a security breach resulting in a reported loss of $600 million. According to Dyma Budorin, the co-founder and CEO of the blockchain security auditing firm Hacken, wallets on the platform were drained of over $663 million in tokens. It is suspected that $477 million of those funds were stolen, with the remaining amount moved into secure storage by FTX.<\/p>\n<p>\u00a0<\/p>\n<p>Hacken conducted an investigation of blockchain transactions related to the hack and discovered that the attacker had gained access to all of the cold wallet storages. The perpetrator attempted to send USDT stablecoin on the Tron blockchain multiple times, but these efforts were unsuccessful due to a lack of TRX, the Tron network\u2019s native token, in the wallet to pay transaction fees. Ultimately, the attacker used their verified personal account on Kraken, a cryptocurrency exchange, to send 500 TRX to the compromised wallet address in order to cover the transaction.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b882794 blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"b882794\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>BINANCE<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b2e0f5 elementor-widget elementor-widget-image\" data-id=\"0b2e0f5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"574\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-1024x576.jpg\" class=\"attachment-large size-large wp-image-5483\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-1024x576.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-300x169.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-768x432.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-1536x864.jpg 1536w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94-510x287.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/22aee16e43e33d890ee49cfcebbe3d94.jpg 1600w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-938eda4 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"938eda4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 6th October 2022<\/p>\n<p>Reported loss: $570 million<\/p>\n<p>The hack happened because of a bug in the smart contract where hackers could forge transactions and transfer funds into their wallets. The hacker transferred 1 million BNB tokens twice.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9139d55 blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"9139d55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>HARMONY BRIDGE<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f1c12 elementor-widget elementor-widget-image\" data-id=\"74f1c12\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"574\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1-1024x576.jpg\" class=\"attachment-large size-large wp-image-5485\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1-1024x576.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1-300x169.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1-768x432.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1-510x287.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1.jpg 1200w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7a36a1 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"b7a36a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 24th June 2022<\/p>\n<p>Reported loss: $100 million<\/p>\n<p>In June 2022, Harmony Horizon project fell victim to a malicious attack that saw them lose nearly $100 million. North Korean state-backed hacking group, Lazarus Group was closely linked to the attack.<\/p>\n<p>London-based blockchain analysis provider Elliptic linked the attack to Lazarus Group, alleging that the hack and the subsequent laundering of the stolen crypto assets were consistent with the activities of the North Korean hackers.<\/p>\n<p>The hacker(s) managed to siphon $100 million in crypto assets, including Ethereum, BNB, Tether, USDC, and Dai.<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36611e0 blog-heading elementor-widget elementor-widget-text-editor\" data-id=\"36611e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>MANGO MARKET<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0047c42 elementor-widget elementor-widget-image\" data-id=\"0047c42\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"533\" src=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO-1024x535.jpg\" class=\"attachment-large size-large wp-image-5486\" alt=\"\" srcset=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO-1024x535.jpg 1024w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO-300x157.jpg 300w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO-768x401.jpg 768w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO-510x266.jpg 510w, https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/MNGO.jpg 1200w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-845b0a8 blog-text-content elementor-widget elementor-widget-text-editor\" data-id=\"845b0a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Date of hack: 11th October 2022<\/p>\n<p>Reported loss: $100 million<\/p>\n<p>Solana-based DeFi trading platform Mango Markets lost over a hundred million dollars to hackers who manipulated the price of native MNGO token, temporarily increasing the value of their collateral and then taking out a loan from the Mango treasury.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Crypto hacks refer to unauthorized access to, or theft of cryptocurrency assets stored on digital exchanges, wallets, or other platforms. This can occur due to a variety of reasons, such as security vulnerabilities in the platform, phishing scams, malware attacks, or even insider theft. Cryptocurrency exchanges and wallets have become popular targets for hackers due to the large amounts of valuable digital assets they store.<\/p>\n","protected":false},"author":1,"featured_media":5472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy\" \/>\n<meta property=\"og:description\" content=\"Crypto hacks refer to unauthorized access to, or theft of cryptocurrency assets stored on digital exchanges, wallets, or other platforms. This can occur due to a variety of reasons, such as security vulnerabilities in the platform, phishing scams, malware attacks, or even insider theft. Cryptocurrency exchanges and wallets have become popular targets for hackers due to the large amounts of valuable digital assets they store.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Real Crypto Academy\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T04:49:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T05:07:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1_Rscwno8dVbaaovZ9VbowEg.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"asjad9529\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Im100XReal\" \/>\n<meta name=\"twitter:site\" content=\"@Im100XReal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"asjad9529\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\"},\"author\":{\"name\":\"asjad9529\",\"@id\":\"https:\/\/realacademy.io\/#\/schema\/person\/58eddc1519cba371f497073e514a92a8\"},\"headline\":\"BIGGEST CRYPTO HACKS OF 2022\",\"datePublished\":\"2023-10-23T04:49:32+00:00\",\"dateModified\":\"2023-10-23T05:07:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\"},\"wordCount\":817,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/realacademy.io\/#organization\"},\"articleSection\":[\"Bitcoin\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\",\"url\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\",\"name\":\"BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy\",\"isPartOf\":{\"@id\":\"https:\/\/realacademy.io\/#website\"},\"datePublished\":\"2023-10-23T04:49:32+00:00\",\"dateModified\":\"2023-10-23T05:07:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/realacademy.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BIGGEST CRYPTO HACKS OF 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/realacademy.io\/#website\",\"url\":\"https:\/\/realacademy.io\/\",\"name\":\"Real Crypto Academy\",\"description\":\"Cohort based courses\",\"publisher\":{\"@id\":\"https:\/\/realacademy.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/realacademy.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/realacademy.io\/#organization\",\"name\":\"Real Crypto Academy\",\"alternateName\":\"RCA\",\"url\":\"https:\/\/realacademy.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/realacademy.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/04\/cropped-Colored-Logo-Icon-for-Black-Background-Transparent-1.png\",\"contentUrl\":\"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/04\/cropped-Colored-Logo-Icon-for-Black-Background-Transparent-1.png\",\"width\":512,\"height\":512,\"caption\":\"Real Crypto Academy\"},\"image\":{\"@id\":\"https:\/\/realacademy.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/Im100XReal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/realacademy.io\/#\/schema\/person\/58eddc1519cba371f497073e514a92a8\",\"name\":\"asjad9529\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/realacademy.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/351eaaf73f074b19148a55fad9fa03f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/351eaaf73f074b19148a55fad9fa03f5?s=96&d=mm&r=g\",\"caption\":\"asjad9529\"},\"sameAs\":[\"https:\/\/realacademy.io\"],\"url\":\"https:\/\/realacademy.io\/index.php\/author\/asjad9529\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/","og_locale":"en_US","og_type":"article","og_title":"BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy","og_description":"Crypto hacks refer to unauthorized access to, or theft of cryptocurrency assets stored on digital exchanges, wallets, or other platforms. This can occur due to a variety of reasons, such as security vulnerabilities in the platform, phishing scams, malware attacks, or even insider theft. Cryptocurrency exchanges and wallets have become popular targets for hackers due to the large amounts of valuable digital assets they store.","og_url":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/","og_site_name":"Real Crypto Academy","article_published_time":"2023-10-23T04:49:32+00:00","article_modified_time":"2023-10-23T05:07:03+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/02\/1_Rscwno8dVbaaovZ9VbowEg.jpeg","type":"image\/jpeg"}],"author":"asjad9529","twitter_card":"summary_large_image","twitter_creator":"@Im100XReal","twitter_site":"@Im100XReal","twitter_misc":{"Written by":"asjad9529","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#article","isPartOf":{"@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/"},"author":{"name":"asjad9529","@id":"https:\/\/realacademy.io\/#\/schema\/person\/58eddc1519cba371f497073e514a92a8"},"headline":"BIGGEST CRYPTO HACKS OF 2022","datePublished":"2023-10-23T04:49:32+00:00","dateModified":"2023-10-23T05:07:03+00:00","mainEntityOfPage":{"@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/"},"wordCount":817,"commentCount":0,"publisher":{"@id":"https:\/\/realacademy.io\/#organization"},"articleSection":["Bitcoin"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/","url":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/","name":"BIGGEST CRYPTO HACKS OF 2022 - Real Crypto Academy","isPartOf":{"@id":"https:\/\/realacademy.io\/#website"},"datePublished":"2023-10-23T04:49:32+00:00","dateModified":"2023-10-23T05:07:03+00:00","breadcrumb":{"@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/realacademy.io\/index.php\/2023\/10\/23\/biggest-crypto-hacks-of-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/realacademy.io\/"},{"@type":"ListItem","position":2,"name":"BIGGEST CRYPTO HACKS OF 2022"}]},{"@type":"WebSite","@id":"https:\/\/realacademy.io\/#website","url":"https:\/\/realacademy.io\/","name":"Real Crypto Academy","description":"Cohort based courses","publisher":{"@id":"https:\/\/realacademy.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/realacademy.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/realacademy.io\/#organization","name":"Real Crypto Academy","alternateName":"RCA","url":"https:\/\/realacademy.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/realacademy.io\/#\/schema\/logo\/image\/","url":"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/04\/cropped-Colored-Logo-Icon-for-Black-Background-Transparent-1.png","contentUrl":"https:\/\/realacademy.io\/wp-content\/uploads\/2023\/04\/cropped-Colored-Logo-Icon-for-Black-Background-Transparent-1.png","width":512,"height":512,"caption":"Real Crypto Academy"},"image":{"@id":"https:\/\/realacademy.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/Im100XReal"]},{"@type":"Person","@id":"https:\/\/realacademy.io\/#\/schema\/person\/58eddc1519cba371f497073e514a92a8","name":"asjad9529","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/realacademy.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/351eaaf73f074b19148a55fad9fa03f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/351eaaf73f074b19148a55fad9fa03f5?s=96&d=mm&r=g","caption":"asjad9529"},"sameAs":["https:\/\/realacademy.io"],"url":"https:\/\/realacademy.io\/index.php\/author\/asjad9529\/"}]}},"_links":{"self":[{"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/posts\/5470"}],"collection":[{"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/comments?post=5470"}],"version-history":[{"count":17,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/posts\/5470\/revisions"}],"predecessor-version":[{"id":9212,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/posts\/5470\/revisions\/9212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/media\/5472"}],"wp:attachment":[{"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/media?parent=5470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/categories?post=5470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/realacademy.io\/index.php\/wp-json\/wp\/v2\/tags?post=5470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}