Hackers exploit security vulnerabilities in third-party wallets, cross-chain bridges, and hot wallets to steal millions of dollars worth of cryptos, as the attacks on Nomad and Ronin cross-chain bridges, the Trust and Slope wallets, and the ZB crypto exchange have shown.