SlowMist reveals details of Bybit hacker's crime

区块律动BlockBeats|Feb 21, 2025 16:52
BlockBeats news, on February 22nd, SlowMist revealed details of Bybit hacking:
·Malicious implementation contract deployed at UTC 2022-02-19 7:15:23 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516
·The attacker used three owners to sign a transaction 0x46deef0f52e3a983b67abf4714448a41dd7fffd6d32d32da69d62081c68ad7882 at UTC 2025-02-21 14:13:35, replacing the Safe implementation contract with a malicious contract
·Malicious upgrade logic is embedded in STORAGE [0x0] 0x96221423681A6d52E184D440a8eFCEbB105C7242 through DELEGATECALL
·The attacker used the backdoor functions sweetETH and sweetERC20 in the malicious contract to steal the hot wallet.
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink