{"id":30671,"date":"2024-03-26T23:37:26","date_gmt":"2024-03-26T23:37:26","guid":{"rendered":"https:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/"},"modified":"2024-03-26T23:37:26","modified_gmt":"2024-03-26T23:37:26","slug":"apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/","title":{"rendered":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know"},"content":{"rendered":"


\n
<\/p>\n

\n

Apple Mac computers and iPad tablets are potentially susceptible to a serious vulnerability that could expose cryptographic keys and passwords on certain devices.<\/span><\/p>\n

A flaw in Apple\u2019s M-series chips can be used by hackers via a malware attack to steal cryptographic keys, including those that secure cryptocurrency wallets, according to researchers from various universities.\u00a0<\/span><\/p>\n

And while the real-world risks of the exploit might be low, it\u2019s not something you\u2019ll want to ignore if you hold a large amount of crypto in a software wallet on a potentially vulnerable Mac. Here\u2019s a quick primer on the situation, based on what\u2019s been reported and disclosed to date.<\/span><\/p>\n

What\u2019s the issue?<\/h2>\n

Researchers <\/span>announced last week<\/span> that they discovered a critical vulnerability within Apple\u2019s M-series chips used in Macs and iPads that can potentially allow an attacker to gain access to cryptographically secure keys and codes.<\/span><\/p>\n

The issue boils down to a technique called \u201cprefetching,\u201d which Apple\u2019s own M-series chips enable to speed up your interactions with your device. With prefetching, the device aims to speed up interactions by keeping tabs on your most common activities and keeping data close at hand. But that technique can apparently now be exploited.<\/span><\/p>\n

Researchers say they were able to create an app that successfully \u201ctricked\u201d the processor into putting some of that prefetched data into the cache, which the app could then access and use to reconstruct a cryptographic key. That\u2019s a potentially huge problem.<\/span><\/p>\n

Who\u2019s at risk?<\/h2>\n

If your Mac or iPad has an Apple M-series processor\u2014M1, M2, or M3\u2014then your device is potentially susceptible to this vulnerability. The M1 processor rolled out in late 2020 with the MacBook Air, MacBook Pro, and Mac Mini, and later was expanded to Mac desktops and even iPad tablets.<\/span><\/p>\n

The M2 processor and current M3 processor are also susceptible across computers and tablets, and the M2 chip is even used in the <\/span>Apple Vision Pro<\/span> headset. But with the M3 chip, the data memory-dependent prefetcher that\u2019s impacted by the vulnerability \u201chas a special bit that developers can invoke to disable the feature,\u201d <\/span>Ars Technica<\/span> reports, albeit with some level of performance hit as a result.<\/span><\/p>\n

What if I have an older Mac or iPad?<\/h2>\n

If you have an older Mac with an Intel processor, which Apple used for years and years before developing its own silicon, then you\u2019re fine. Intel chips aren\u2019t impacted.<\/span><\/p>\n

Similarly, if you have an iPad (old or new) that uses one of Apple\u2019s A-series chips, which also feature in the company\u2019s iPhones, then there doesn\u2019t appear to be a risk. Only the M1, M2, and M3 chips are vulnerable due to how they were designed. Apple\u2019s A14, A15, and A16 chips from recent iPhones and iPads are indeed variants of the M-series chips, but the research report and media reports do not cite them as being vulnerable as of this writing.<\/span><\/p>\n

What can I do about it?<\/h2>\n

What can <\/span>you<\/span> do to fix the issue? Nothing, unfortunately. This is a chip-level vulnerability that has to do with the unique architecture of Apple\u2019s chips. That means it\u2019s not something Apple can fix with a patch. What app developers can do is implement fixes to avoid the vulnerability, but there\u2019s apparently a performance trade-off as a result, so such apps could feel much more sluggish once updated.<\/span><\/p>\n

What you can do to remove your risk, of course, is to get any crypto wallets you have off of your vulnerable Apple devices. Migrate them to another device, whether it\u2019s a Windows PC, an iPhone, an Android phone, etc. Don\u2019t wait for catastrophe to strike.<\/span><\/p>\n

That\u2019s exactly what Errata Security CEO Robert Graham <\/span>told <\/span>Zero Day<\/span> writer Kim Zetter to share with readers: Get your crypto wallets off your devices, at least for now. \u201cThere are people right now hoping to do this [attack] and are working on it, I would assume,\u201d he told the blog.<\/span><\/p>\n

Can my crypto just be taken?<\/h2>\n

While devices with the M1-M3 chips are indeed vulnerable, it\u2019s not like hackers can just flip a switch and take your funds at any moment. You\u2019d typically need to install malware on your device, and then the attackers would need to use the exploited software to pull the private keys and access the associated wallet.<\/span><\/p>\n

Apple\u2019s macOS is also <\/span>fairly resilient to malware<\/span>, since you\u2019d have to manually allow for such an app to be installed on your device. Macs block unsigned, third-party software by default. Still, if you\u2019re the adventurous type and have installed apps from \u201cunidentified\u201d developers, you\u2019ll want to play it safe if you\u2019re using a potentially vulnerable M-chip device.<\/span><\/p>\n

This kind of attack can also be performed on a shared cloud server that holds your keys, so that\u2019s another potential attack vector, according to <\/span>Zero Day<\/span>. It also might be possible to pull off this kind of attack on a website via Javascript code, which would be far more effective at impacting the average user\u2014they wouldn\u2019t have to install anything. But that\u2019s theoretical for now.<\/span><\/p>\n

The vulnerability could also potentially be used to decrypt the contents of a web browser cookie, according to Zero Day, possibly letting attackers gain access to something like an email account\u2014which could let users log into sensitive accounts.<\/span><\/p>\n

What about hardware wallets?<\/h2>\n

Hardware wallets from the likes of Ledger and Trezor are apparently not at risk, based on current reporting around the vulnerability, since the private keys need to be on your Apple device with an M1-M3 chip to be impacted. That said, it\u2019s probably not a bad idea to avoid connecting hardware wallets to vulnerable devices, just in case.<\/span><\/p>\n

What about centralized exchanges?<\/h2>\n

Centralized exchanges like Coinbase hold onto your funds in custodial wallets, and since you don\u2019t have the private keys on your device, they\u2019re not directly at risk. However, if you keep your password to your Coinbase account in a cryptographically secure password manager on your vulnerable Apple device, then you may want to change your password and <\/span>not<\/span> update it within the manager. Better safe than sorry.<\/span><\/p>\n

And as mentioned, it\u2019s theoretically possible for an attacker to decrypt account passwords from browser cookies using this vulnerability.\u00a0<\/span><\/p>\n

How serious is this really?<\/h2>\n

It\u2019s a serious vulnerability, no doubt\u2014but the likelihood of it impacting the average crypto user appears to be pretty low. Depending on the type of encryption being cracked through this vulnerability, it could take as little as about an hour to gradually pull enough data from the cache to reconstruct a key\u2026 or as long as 10 hours.<\/span><\/p>\n

That doesn\u2019t mean it\u2019s impossible or that it can\u2019t happen to you, but this isn\u2019t a quick-hit, drive-by kind of attack. You should still take precautions to ensure that you\u2019re not at risk, but if the report is accurate, then it doesn\u2019t sound like this will be a widespread threat to the average user.<\/span><\/p>\n

Edited by Guillermo Jimenez<\/p>\n

\n
<\/p>\n

Stay on top of crypto news, get daily updates in your inbox.<\/h3>\n<\/div>\n<\/div>\n<\/div>\n


\n
Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Apple Mac computers and iPad tablets are potentially susceptible to a serious vulnerability that could…<\/p>\n","protected":false},"author":1,"featured_media":30672,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"yoast_head":"\nApple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket\" \/>\n<meta property=\"og:description\" content=\"Apple Mac computers and iPad tablets are potentially susceptible to a serious vulnerability that could...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"iCoinMarket\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-26T23:37:26+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CryptoExpert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CryptoExpert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\"},\"author\":{\"name\":\"CryptoExpert\",\"@id\":\"https:\/\/icoinmarket.com\/#\/schema\/person\/b833004b8442f2a803ee5ae3df2916b9\"},\"headline\":\"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know\",\"datePublished\":\"2024-03-26T23:37:26+00:00\",\"dateModified\":\"2024-03-26T23:37:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\"},\"wordCount\":1221,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/icoinmarket.com\/#organization\"},\"image\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png\",\"articleSection\":[\"Trending Cryptos\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\",\"url\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\",\"name\":\"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket\",\"isPartOf\":{\"@id\":\"https:\/\/icoinmarket.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png\",\"datePublished\":\"2024-03-26T23:37:26+00:00\",\"dateModified\":\"2024-03-26T23:37:26+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png\",\"contentUrl\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png\",\"width\":1024,\"height\":512,\"caption\":\"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/icoinmarket.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/icoinmarket.com\/#website\",\"url\":\"https:\/\/icoinmarket.com\/\",\"name\":\"iCoinMarket\",\"description\":\"Latest Bitcoin & Cryptocurrency News\",\"publisher\":{\"@id\":\"https:\/\/icoinmarket.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/icoinmarket.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/icoinmarket.com\/#organization\",\"name\":\"iCoinMarket\",\"url\":\"https:\/\/icoinmarket.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icoinmarket.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2021\/05\/logo.png\",\"contentUrl\":\"https:\/\/icoinmarket.com\/wp-content\/uploads\/2021\/05\/logo.png\",\"width\":537,\"height\":100,\"caption\":\"iCoinMarket\"},\"image\":{\"@id\":\"https:\/\/icoinmarket.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/icoinmarket.com\/#\/schema\/person\/b833004b8442f2a803ee5ae3df2916b9\",\"name\":\"CryptoExpert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icoinmarket.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/icoinmarket.com\/wp-content\/litespeed\/avatar\/947372d3ac00681cdd6575f652043b85.jpg?ver=1715957294\",\"contentUrl\":\"https:\/\/icoinmarket.com\/wp-content\/litespeed\/avatar\/947372d3ac00681cdd6575f652043b85.jpg?ver=1715957294\",\"caption\":\"CryptoExpert\"},\"sameAs\":[\"https:\/\/icoinmarket.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket","og_description":"Apple Mac computers and iPad tablets are potentially susceptible to a serious vulnerability that could...","og_url":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/","og_site_name":"iCoinMarket","article_published_time":"2024-03-26T23:37:26+00:00","og_image":[{"width":1024,"height":512,"url":"http:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png","type":"image\/png"}],"author":"CryptoExpert","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CryptoExpert","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#article","isPartOf":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/"},"author":{"name":"CryptoExpert","@id":"https:\/\/icoinmarket.com\/#\/schema\/person\/b833004b8442f2a803ee5ae3df2916b9"},"headline":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know","datePublished":"2024-03-26T23:37:26+00:00","dateModified":"2024-03-26T23:37:26+00:00","mainEntityOfPage":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/"},"wordCount":1221,"commentCount":0,"publisher":{"@id":"https:\/\/icoinmarket.com\/#organization"},"image":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png","articleSection":["Trending Cryptos"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/","url":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/","name":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know - iCoinMarket","isPartOf":{"@id":"https:\/\/icoinmarket.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage"},"image":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png","datePublished":"2024-03-26T23:37:26+00:00","dateModified":"2024-03-26T23:37:26+00:00","breadcrumb":{"@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#primaryimage","url":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png","contentUrl":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png","width":1024,"height":512,"caption":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know"},{"@type":"BreadcrumbList","@id":"http:\/\/icoinmarket.com\/apple-chip-exploit-that-steals-crypto-heres-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/icoinmarket.com\/"},{"@type":"ListItem","position":2,"name":"Apple Chip Exploit That Steals Crypto? Here\u2019s What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/icoinmarket.com\/#website","url":"https:\/\/icoinmarket.com\/","name":"iCoinMarket","description":"Latest Bitcoin & Cryptocurrency News","publisher":{"@id":"https:\/\/icoinmarket.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/icoinmarket.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/icoinmarket.com\/#organization","name":"iCoinMarket","url":"https:\/\/icoinmarket.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icoinmarket.com\/#\/schema\/logo\/image\/","url":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2021\/05\/logo.png","contentUrl":"https:\/\/icoinmarket.com\/wp-content\/uploads\/2021\/05\/logo.png","width":537,"height":100,"caption":"iCoinMarket"},"image":{"@id":"https:\/\/icoinmarket.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/icoinmarket.com\/#\/schema\/person\/b833004b8442f2a803ee5ae3df2916b9","name":"CryptoExpert","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icoinmarket.com\/#\/schema\/person\/image\/","url":"https:\/\/icoinmarket.com\/wp-content\/litespeed\/avatar\/947372d3ac00681cdd6575f652043b85.jpg?ver=1715957294","contentUrl":"https:\/\/icoinmarket.com\/wp-content\/litespeed\/avatar\/947372d3ac00681cdd6575f652043b85.jpg?ver=1715957294","caption":"CryptoExpert"},"sameAs":["https:\/\/icoinmarket.com"]}]}},"featured_image_urls":{"full":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png",1024,512,false],"thumbnail":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-150x150.png",150,150,true],"medium":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-300x150.png",300,150,true],"medium_large":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-768x384.png",640,320,true],"large":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png",640,320,false],"covernews-slider-full":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png",1024,512,false],"covernews-slider-center":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-800x500.png",800,500,true],"covernews-featured":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need.png",1024,512,false],"covernews-medium":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-540x340.png",540,340,true],"covernews-medium-square":["https:\/\/icoinmarket.com\/wp-content\/uploads\/2024\/03\/Apple-Chip-Exploit-That-Steals-Crypto-Heres-What-You-Need-400x250.png",400,250,true]},"author_info":{"display_name":"CryptoExpert","author_link":"https:\/\/icoinmarket.com\/author\/admin\/"},"category_info":"<a href=\"https:\/\/icoinmarket.com\/category\/trending-cryptos\/\" rel=\"category tag\">Trending Cryptos<\/a>","tag_info":"Trending Cryptos","comment_count":"0","_links":{"self":[{"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/posts\/30671"}],"collection":[{"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/comments?post=30671"}],"version-history":[{"count":0,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/posts\/30671\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/media\/30672"}],"wp:attachment":[{"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/media?parent=30671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/categories?post=30671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icoinmarket.com\/wp-json\/wp\/v2\/tags?post=30671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}