SlowMist reveals details of Bybit hacker's crime

区块律动BlockBeats
区块律动BlockBeats|Feb 21, 2025 16:52
BlockBeats news, on February 22nd, SlowMist revealed details of Bybit hacking: ·Malicious implementation contract deployed at UTC 2022-02-19 7:15:23 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516 ·The attacker used three owners to sign a transaction 0x46deef0f52e3a983b67abf4714448a41dd7fffd6d32d32da69d62081c68ad7882 at UTC 2025-02-21 14:13:35, replacing the Safe implementation contract with a malicious contract ·Malicious upgrade logic is embedded in STORAGE [0x0] 0x96221423681A6d52E184D440a8eFCEbB105C7242 through DELEGATECALL ·The attacker used the backdoor functions sweetETH and sweetERC20 in the malicious contract to steal the hot wallet.
+4
Mentioned
Share To

Timeline

HotFlash

APP

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads