Cosine: Bybit attackers use three owners to sign a transaction that replaces the Safe implementation contract with a malicious contract

PANews|Feb 21, 2025 16:50
SlowMist Cosine has revealed some details of Bybit Safe's multi signature being hacked on the X platform: Malicious implementation contract deployed at UTC 2022-02-19 7:15:23 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516
The attacker used three owners to sign a transaction 0x46deef0f52e3a983b67abf4714448a41dd7fffd6d32d32da69d62081c68ad7882 at UTC 2025-02-21 14:13:35, replacing the Safe implementation contract with a malicious contract
Malicious upgrade logic embedded in STORAGE [0x0] 0x96221423681A6d52E184D440a8eFCEbB105C7242 through DELEGATECALL
Subsequently, the attacker used backdoor functions sweetETH and sweetERC20 in the malicious contract to extract assets from the hot wallet.
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink