⚙️ Tempo strengthens crypto treasury with Safe Wallet
Tempo integrates with Safe Wallet to enhance payments-focused treasury management and improve operational control over digital assets.
#Crypto #Tempo #SafeWallet #DeFi #Payments
Smart Wallets: The Next Generation of Crypto Wallets #gaslesstransactions #Argentwallet #socialrecoverycrypto #accountabstraction #safewallet #CryptoSecurity #EOAvssmartwallet #ethereumsmartwallet #ERC4337 #web3userexperience
🔧 SafeWallet upgrades infrastructure after Bybit breach
SafeWallet overhauls its platform infrastructure following Bybit’s security incident to enhance asset protection.
#SafeWallet #Bybit #Security #Crypto #Infrastructure
"The $1.5B Bybit Hack & How OSINT Led to Its Attribution" published by Netlas. #Bybit, #Lazarus, #SafeWallet, #DPRK, #CTI https://netlas.io/blog/bybit_hack/
"隐匿的黑手:14.6亿美元如何在无声中消逝" published by 网络侦查研究院. #Bybit, #SafeWallet, #Lazarus, #DPRK, #CTI https://mp.weixin.qq.com/s/4EnSsZu4Y4b426NzwjCGrA
So exactly what was the chain of exploits that allows this hack to occur, were there issues with Safe, Bybit or both?! buff.ly/hZAgvci #Safewallet #crypto #web3security #podcast #web3podcast
Yikes, those digital pickpockets are sneaky! Thanks for the heads-up. Double-checking URLs and not rushing approvals is key. #CryptoAware #SafeWallet
"Bit ByBit - emulation of the DPRK's largest cryptocurrency heist" published by Elastic. #Bybit, #SafeWallet, #TraderTraitor, #DPRK, #CTI https://www.elastic.co/security-labs/bit-bybit
"Bybit – What Do We Know So Far" published by Sygnia. #Bybit, #SafeWallet, #DPRK, #CTI www.sygnia.co/blog/sygnia-investigatio...
"How North Korean hackers executed history’s biggest $1.5 billion crypto heist" published by BBC. #Bybit, #SafeWallet, #Youtube, #News, #DPRK, #CTI https://www.youtube.com/watch?v=gpLYnKC3mGk
"Lazarus Group Bybit Heist: C2 forensics" published by Validin. #Bybit, #SafeWallet, #Lazarus, #DPRK, #CTI www.validin.com/blog/bybit_hack_infrastr...
"In-Depth Technical Analysis of the Bybit Hack" published by NCCGroup. #Bybit, #SafeWallet, #DPRK, #CTI www.nccgroup.com/us/research-blog/in-dept...
#SafeWallet published the results of an investigation into #NorthKorea's theft of $1.4 billion worth of ethereum from #Bybit.
https://x.com/safe/status/1897663514975649938
#infosec #mandiant #cybersecurity #crypto #DPRK #TraderTraitor #LazarusGroup
"Investigation Updates and Community Call to Action" published by Safe.eth. #Bybit, #SafeWallet, #UNC4899, #DPRK, #CTI https://archive.is/OxemM
How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist The $1.4 billio...
www.securityweek.com/how-social-engineering-s...
#Malware #& #Threats #Nation-State #Bybit […]
[Original post on securityweek.com]
#NorthKorea has finished laundering all of the $1.4 billion worth of crypto it stole from #Bybit into other tokens almost entirely through #ThorChain who made $5.5 million in fees on the laundering effort 👏🏼👏👏🏾.
https://x.com/EmberCN/status/1896728373340303440
#LazarusGroup […]
this interview w/one of the only #cybersecurity people in the crypto industry who has any idea what he's talking about goes through all the incredible failures at every level of both #Bybit & #SafeWallet (whose main product is #GnosisSafe, AKA "the most important smart contract in the […]
O ex-CEO da #Binance, #ChangpengZhao #CZ, criticou a atualização da #SafeWallet sobre o #hack da #Bybit e levantando dúvidas sobre como os invasores enganaram múltiplos signatários.
#bitcoin #criptomoedas #tecnologia #webitcoin
webitcoin.com.br/cz-critica-p...
"On hindsight and risk assessment" published by Privy. #Bybit, #SafeWallet, #DPRK, #CTI https://privy.io/blog/bybit-lookback
"Bybit’s $1.5 Billion Theft Unveiled: Safe{Wallet} Front-End Code Tampered" published by Slowmist. #Bybit, #SafeWallet, #DPRK, #CTI slowmist.medium.com/bybits-1-5-billion-theft...
ラザルスは侵入されたSafe{Wallet}開発マシンを介してBybitをハッキングした
Lazarus hacked Bybit via breached Safe{Wallet} developer machine #BleepingComputer (Feb 26)
#Lazarus #Bybit #SafeWallet #暗号通貨 #サイバー攻撃
"Dissecting the Bybit Cryptocurrency Exchange Malicious UI Spoofing Javascript" published by DanchoDanchev. #Bybit, #SafeWallet, #DPRK, #CTI ddanchev.blogspot.com/2025/02/dissecting-bybit...
"BYBIT Interim Investigation Report" published by Sygnia. #Bybit, #SafeWallet, #DPRK, #CTI https://docsend.com/view/s/rmdi832mpt8u93s7
"Bybit Incident Investigation Preliminary Report" published by Verichains. #Bybit, #SafeWallet, #DPRK, #CTI https://docsend.com/view/s/rmdi832mpt8u93s7/
"Safe{Wallet} Statement on Targeted Attack on Bybit" published by Safe.eth. #Bybit, #SafeWallet, #DPRK, #CTI https://archive.is/I3UEz
1.1 KEY FINDINGS Thus far, the forensics investigation highlighted the following findings: • Forensic investigation of all hosts used to initiate and sign the transaction revealed malicious JavaScript code injected to a resource served from Safe{Wallet}'s AWS S3 bucket. • Resource modification time and publicly available web history archives suggest the injection of the malicious code was performed directly to Safe{Wallet}'s AWS S3 bucket. • Initial analysis of the injected JavaScript code suggests it's primary objective is to manipulate transactions, effectively changing the content of the transaction during the signing process. • Additionally, the analysis of the injected JavaScript code identified an activation condition designed to execute only when the transaction source matches one of two contract addresses: Bybit's contract address and a currently unidentified contract address, likely associated with a test contract controlled by the threat actor. • Two minutes after the malicious transaction was executed and published, new versions of the JavaScript resources were uploaded to Safe{Wallet}'s AWS S3 bucket. These updated versions had the malicious code removed. • The highlighted initial findings suggest the attack originated from Safe{Wallet}'s AWS infrastructure. • Thus far, the forensics investigation did not identify any compromise of Bybit's infrastructure.
#Bybit released the conclusions of their investigation into how they got rekt for $1.4 billion by North Korea's #LazarusGroup.
Summary:
1. (background) Bybit were dumb enough to store billions of dollars in a single wallet contract using software from a […]
[Original post on universeodon.com]