The stolen path and principle are clearly stated, but I don't know how it was implemented. They say the signing devices were compromised, but I don't believe that. So many signing devices could not have been hacked, and some might have been using mobile phones to sign; how could they all have been hacked? Hacking the server would be more than just that.
Even if the three signers were negligent and did not check the signature information, how could the normal operation signature information be replaced?
I feel like this is similar to the multi-signature theft cases I encountered before, and in the end, it turned out that the person constructing the transaction had issues.
In the case of Bybit being hacked, the problem likely lies in the initial construction of this on-chain action being incorrect; it could very well be an insider job, at least someone from the internal network.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。