吴说区块链
吴说区块链|Feb 22, 2025 16:26
Slow Mist: Hacking Techniques and Questions Behind Bybit's Nearly $1.5 Billion Theft "In this incident, the Safe contract was fine, but the problem lies in the non contract part, where the front-end was tampered with and forged to achieve a deceptive effect. This is not an isolated case. North Korean hackers attacked several platforms in this way last year. But questions include: may the attacker have obtained the operational information of Bybit's internal financial team in advance and mastered the timing of ETH multi signature cold wallet transfers? Inducing signers to sign malicious transactions on a forged interface through the Safe system? Has the front-end system of Safe been hacked and taken over? What the signer sees on the Safe interface is the correct address and URL, but the actual signed transaction data has been tampered with? The key question is: Who initiated the signature request first? How secure is its equipment? read the whole passage: http://(wublock123.com)/index.php? m=content&c=index&a=show&catid=47&id=38364
+4
Mentioned
Share To

Timeline

HotFlash

APP

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads