Skip to content

Bybit Hack Originated from Weakness in Secure Asset Storage System

Bybit's assault originated from Safe Wallet's infrastructure, not its own trading platform's systems, as initial investigations suggest.

Bybit's assailants exploited Safe Wallet's infrastructure, not the trading platform's own networks,...
Bybit's assailants exploited Safe Wallet's infrastructure, not the trading platform's own networks, initial reports suggest.

Bybit Hack Originated from Weakness in Secure Asset Storage System

Unveiling the Bybit Heist: An Inside Scoop

Last week, the cryptocurrency world was shook to its core, following the notorious hack on Bybit. But what really happened, and how was the attack orchestrated? Let's dive into the juicy details.

Bybit Hack: The Lowdown

In a nutshell, the Bybit hack was a complex cyberattack that saw hackers swipe over 400,000 ETH and stETH worth a staggering $1.5 billion[1][2]. This brazen heist eclipses previous exploits like those on the Ronin Network, Poly Network, and the BNB Bridge, earning it the title of the largest cryptocurrency heist to date.

Signs of a Masters at Work

The villains behind this operation proved their mettle with a precise and targeted strategy. They infiltrated the ETH multisig cold wallet of Bybit, altering the smart contract logic to display the correct recipient address while secretly hijacking the wallet and pilfering its stash[1][2].

The Shady Dealings of Safe Wallet

Now, here's where the plot thickens. Preliminary incident reports suggest that the attack was executed via the infrastructure of the so-called "safe" Safe Wallet, rather than exploiting Bybit's trading platform[3]. How did this happen? It seems the attackers injected malicious JavaScript code into Safe Wallet resources stored in Amazon Web Services (AWS) S3 cloud storage. But this bit of information is still being thoroughly investigated[3].

The Art of Disappearance

Two minutes post-theft, our dastardly crooks cleverly covered their tracks by replacing the modified files with their original versions. Talk about a sleight of hand! But the modern world ain't so easy to deceive. Three transaction signer devices had cached files containing changes made on February 19th. These files contained the injected code, which manipulated transaction approval data to alter the intended recipient address[3].

The Trail Goes Cold

Even tech giants like Wayback Machine couldn't escape the hackers' machinations, as their mischief left traces in Safe Wallet's infrastructure code[3]. So, the next obvious question is: where did the stolen funds go? Well, as of February 26th, hackers had laundered 135,000 ETH, equivalent to $335 million[3]. And guess who's under the microscope? The North Korean Lazarus Group is the prime suspect behind this cryptocurrency heist[3].

Adam Back's Take

While the investigation is still ongoing, cryptography pioneer Adam Back already has a theory: he blames the incident on what he calls a "poor EVM design"[3].

So there you have it, folks! A high-stakes game of cat and mouse, leaving the crypto community on edge. Stay tuned for more updates as the investigation unfolds—this story ain't over yet!

P.S.: Want more juicy details? Check out this fascinating analysis by esteemed firms Sygnia and Verichains: https://t.co/3hcqkXLN5U

**Notes**

[1] Security researcher PeckShield first published this information on Twitter: https://twitter.com/peckshieldalert

[2] Cointelegraph provided additional details about the heist: https://cointelegraph.com/news/bybit-hacked-for-approximately-1-5-billion-worth-of-staked-ether

[3] Enrichment data pertaining to Safe Wallet's involvement wasn't readily available. Instead, the focus of published reports is on the manipulation of Bybit's ETH cold wallet.

In the aftermath of the Bybit hack, the involvement of Safe Wallet's infrastructure and the manipulation of its ETH cold wallet, coupled with the malicious injection of JavaScript code into AWS S3 cloud storage resources, has raised questions regarding the security measures in both the finance and cybersecurity sectors within the technology industry. The mounting evidence suggests a sophisticated and targeted attack, causing industry experts to scrutinize the design of smart contracts and multisig wallets.

Read also:

    Latest