Sort:  

Because validated transactions are near impossible to undermine, the attackers are pursuing other methods, like man-in-the-middle attacks and private-key theft, to achieve their goals.