Sort:  

Good comment but do you believe it would be harder to counterfeit or continue to attack like the most resent ones?

Because validated transactions are near impossible to undermine, the attackers are pursuing other methods, like man-in-the-middle attacks and private-key theft, to achieve their goals.