Safe, the developer of the SafeWallet multisignature product utilized by Bybit, has launched a brief post-mortem replace explaining the foundation reason behind the current Bybit hack — a compromised developer machine. The announcement prompted a important response from Binance co-founder Changpeng “CZ” Zhao.
Based on Safe, the forensic review of the Bybit hack didn’t discover vulnerabilities within the Safe good contracts or the code of its entrance finish portal and providers accountable for the $1.4 billion cybersecurity incident.
Martin Köppelmann, the co-founder of the Gnosis blockchain community, which developed Safe, noted that the compromised machine was modified to focus on the Bybit Safe and divert the transactions to a unique {hardware} pockets.
“This replace from Safe isn’t that nice. It makes use of obscure language to brush over the problems,” Zhao wrote in a Feb. 26 X publish. Zhao additionally requested for clarification on the compromised developer machines, how the hackers tricked a number of signers into signing the transaction, how a developer machine accessed Bybit’s techniques, and why the hackers didn’t goal different addresses.
Supply: Changpeng Zhao
Köppelmann added that he may solely speculate about how the hackers pushed the fraudulent transactions previous a number of signers and theorized that the menace actors didn’t goal different addresses to forestall discovery and detection.
A forensic assessment performed by Sygnia and Verichains revealed on Feb. 26 that “the credentials of a Safe developer had been compromised […] which allowed the attacker to realize unauthorized entry to the Safe(Pockets) infrastructure and completely deceive signers into approving a malicious transaction.”
Supply: Martin Köppelmann
Associated: Bybit CEO declares ‘war against Lazarus’ after $1.4B hack
Lazarus Group launders funds stolen from Bybit hack
Onchain knowledge exhibits the Lazarus Group has transferred 45,900 Ether (ETH), valued at roughly $113 million over the last 24 hours.
This brings the total amount of funds laundered on the time of this writing to over 135,000 ETH, valued at roughly $335 million.
According to analyst EmberCN, the notorious hacking group will seemingly have “cleaned up” the funds inside 8-10 days.
Bybit and blockchain analytics agency Elliptic have tracked the stolen crypto to over 11,000 wallets managed by the Lazarus Group.
Elliptic additionally printed a knowledge feed of addresses related to the notorious hacker group to assist market individuals keep away from these pockets addresses and assist forestall cash laundering.
Journal: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis
Cointelegraph by Vince Quill Safe releases post-mortem replace, CZ criticizes response cointelegraph.com 2025-02-26 20:42:34
Source link