Advertisement · 728 × 90
#
Hashtag
#SafeWallet
Advertisement · 728 × 90
Preview
Tempo Integrates With Safe Wallet to Power Payments‑First Treasury Management - Crypto Economy Tempo announced its integration with Safe{Wallet} to offer payment infrastructure on smart multisig accounts over blockchain.

⚙️ Tempo strengthens crypto treasury with Safe Wallet

Tempo integrates with Safe Wallet to enhance payments-focused treasury management and improve operational control over digital assets.

#Crypto #Tempo #SafeWallet #DeFi #Payments

0 0 0 0
Preview
Smart Wallets: The Next Generation of Crypto Wallets Let’s be honest. The first time you set up a crypto wallet, you had a mini panic attack, right? You were told to write down 12 or 24 random words…

Smart Wallets: The Next Generation of Crypto Wallets #gaslesstransactions #Argentwallet #socialrecoverycrypto #accountabstraction #safewallet #CryptoSecurity #EOAvssmartwallet #ethereumsmartwallet #ERC4337 #web3userexperience

0 0 0 0
Preview
SafeWallet Overhauls Infrastructure in Wake of Bybit Security Breach - Crypto Economy Nine months after the $1.5 billion ETH theft from Bybit, the largest crypto hack in history, SafeWallet's restructuring is total. Rahul Rumalla, CEO of Safe,

🔧 SafeWallet upgrades infrastructure after Bybit breach

SafeWallet overhauls its platform infrastructure following Bybit’s security incident to enhance asset protection.

#SafeWallet #Bybit #Security #Crypto #Infrastructure

0 0 0 0

"The $1.5B Bybit Hack & How OSINT Led to Its Attribution" published by Netlas. #Bybit, #Lazarus, #SafeWallet, #DPRK, #CTI https://netlas.io/blog/bybit_hack/

0 0 0 0

"隐匿的黑手:14.6亿美元如何在无声中消逝" published by 网络侦查研究院. #Bybit, #SafeWallet, #Lazarus, #DPRK, #CTI https://mp.weixin.qq.com/s/4EnSsZu4Y4b426NzwjCGrA

0 0 0 0
Video

So exactly what was the chain of exploits that allows this hack to occur, were there issues with Safe, Bybit or both?! buff.ly/hZAgvci #Safewallet #crypto #web3security #podcast #web3podcast

0 0 0 0
Video

Yikes, those digital pickpockets are sneaky! Thanks for the heads-up. Double-checking URLs and not rushing approvals is key. #CryptoAware #SafeWallet

0 0 0 0

"Bit ByBit - emulation of the DPRK's largest cryptocurrency heist" published by Elastic. #Bybit, #SafeWallet, #TraderTraitor, #DPRK, #CTI https://www.elastic.co/security-labs/bit-bybit

0 0 0 0

"Bybit – What Do We Know So Far" published by Sygnia. #Bybit, #SafeWallet, #DPRK, #CTI www.sygnia.co/blog/sygnia-investigatio...

0 0 0 0

"How North Korean hackers executed history’s biggest $1.5 billion crypto heist" published by BBC. #Bybit, #SafeWallet, #Youtube, #News, #DPRK, #CTI https://www.youtube.com/watch?v=gpLYnKC3mGk

0 0 0 0

"Lazarus Group Bybit Heist: C2 forensics" published by Validin. #Bybit, #SafeWallet, #Lazarus, #DPRK, #CTI www.validin.com/blog/bybit_hack_infrastr...

1 0 0 0

"In-Depth Technical Analysis of the Bybit Hack" published by NCCGroup. #Bybit, #SafeWallet, #DPRK, #CTI www.nccgroup.com/us/research-blog/in-dept...

0 0 0 0

#SafeWallet published the results of an investigation into #NorthKorea's theft of $1.4 billion worth of ethereum from #Bybit.

https://x.com/safe/status/1897663514975649938

#infosec #mandiant #cybersecurity #crypto #DPRK #TraderTraitor #LazarusGroup

0 0 0 0

"Investigation Updates and Community Call to Action" published by Safe.eth. #Bybit, #SafeWallet, #UNC4899, #DPRK, #CTI https://archive.is/OxemM

0 0 0 0
Original post on securityweek.com

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist The $1.4 billio...

www.securityweek.com/how-social-engineering-s...

#Malware #& #Threats #Nation-State #Bybit […]

[Original post on securityweek.com]

0 0 0 0
Original post on universeodon.com

#NorthKorea has finished laundering all of the $1.4 billion worth of crypto it stole from #Bybit into other tokens almost entirely through #ThorChain who made $5.5 million in fees on the laundering effort 👏🏼👏👏🏾.

https://x.com/EmberCN/status/1896728373340303440

#LazarusGroup […]

1 3 0 0
Original post on universeodon.com

this interview w/one of the only #cybersecurity people in the crypto industry who has any idea what he's talking about goes through all the incredible failures at every level of both #Bybit & #SafeWallet (whose main product is #GnosisSafe, AKA "the most important smart contract in the […]

1 0 1 0
Preview
CZ critica análise pós-morte da Safe Wallet sobre hack da Bybit Explicação do ataque não satisfaz CZ, que levanta preocupações sobre máquinas de desenvolvedores comprometidas.

O ex-CEO da #Binance, #ChangpengZhao #CZ, criticou a atualização da #SafeWallet sobre o #hack da #Bybit e levantando dúvidas sobre como os invasores enganaram múltiplos signatários.

#bitcoin #criptomoedas #tecnologia #webitcoin
webitcoin.com.br/cz-critica-p...

1 0 0 0

"On hindsight and risk assessment" published by Privy. #Bybit, #SafeWallet, #DPRK, #CTI https://privy.io/blog/bybit-lookback

0 0 0 0

"Bybit’s $1.5 Billion Theft Unveiled: Safe{Wallet} Front-End Code Tampered" published by Slowmist. #Bybit, #SafeWallet, #DPRK, #CTI slowmist.medium.com/bybits-1-5-billion-theft...

0 0 0 0
Preview
Lazarus hacked Bybit via breached Safe{Wallet} developer machine ​Forensic investigators have found that North Korean Lazarus hackers stole $1.5 billion from Bybit after hacking a developer's device at the multisig wallet platform Safe{Wallet}.

ラザルスは侵入されたSafe{Wallet}開発マシンを介してBybitをハッキングした

Lazarus hacked Bybit via breached Safe{Wallet} developer machine #BleepingComputer (Feb 26)

#Lazarus #Bybit #SafeWallet #暗号通貨 #サイバー攻撃

0 0 0 0

"Dissecting the Bybit Cryptocurrency Exchange Malicious UI Spoofing Javascript" published by DanchoDanchev. #Bybit, #SafeWallet, #DPRK, #CTI ddanchev.blogspot.com/2025/02/dissecting-bybit...

3 0 0 1

"BYBIT Interim Investigation Report" published by Sygnia. #Bybit, #SafeWallet, #DPRK, #CTI https://docsend.com/view/s/rmdi832mpt8u93s7

1 0 0 1

"Bybit Incident Investigation Preliminary Report" published by Verichains. #Bybit, #SafeWallet, #DPRK, #CTI https://docsend.com/view/s/rmdi832mpt8u93s7/

1 0 0 0

"Safe{Wallet} Statement on Targeted Attack on Bybit" published by Safe.eth. #Bybit, #SafeWallet, #DPRK, #CTI https://archive.is/I3UEz

1 0 0 0
1.1
KEY FINDINGS
Thus far, the forensics investigation highlighted the following findings:
• Forensic investigation of all hosts used to initiate and sign the transaction revealed malicious JavaScript code injected to a resource served from Safe{Wallet}'s AWS S3 bucket.
• Resource modification time and publicly available web history archives suggest the injection of the malicious code was performed directly to Safe{Wallet}'s AWS S3 bucket.
• Initial analysis of the injected JavaScript code suggests it's primary objective is to manipulate transactions, effectively changing the content of the transaction during the signing process.
• Additionally, the analysis of the injected JavaScript code identified an activation condition designed to execute only when the transaction source matches one of two contract addresses: Bybit's contract address and a currently unidentified contract address, likely associated with a test contract controlled by the threat actor.
• Two minutes after the malicious transaction was executed and published, new versions of the JavaScript resources were uploaded to Safe{Wallet}'s AWS S3 bucket. These updated versions had the malicious code removed.
• The highlighted initial findings suggest the attack originated from Safe{Wallet}'s AWS infrastructure.
• Thus far, the forensics investigation did not identify any compromise of Bybit's infrastructure.

1.1 KEY FINDINGS Thus far, the forensics investigation highlighted the following findings: • Forensic investigation of all hosts used to initiate and sign the transaction revealed malicious JavaScript code injected to a resource served from Safe{Wallet}'s AWS S3 bucket. • Resource modification time and publicly available web history archives suggest the injection of the malicious code was performed directly to Safe{Wallet}'s AWS S3 bucket. • Initial analysis of the injected JavaScript code suggests it's primary objective is to manipulate transactions, effectively changing the content of the transaction during the signing process. • Additionally, the analysis of the injected JavaScript code identified an activation condition designed to execute only when the transaction source matches one of two contract addresses: Bybit's contract address and a currently unidentified contract address, likely associated with a test contract controlled by the threat actor. • Two minutes after the malicious transaction was executed and published, new versions of the JavaScript resources were uploaded to Safe{Wallet}'s AWS S3 bucket. These updated versions had the malicious code removed. • The highlighted initial findings suggest the attack originated from Safe{Wallet}'s AWS infrastructure. • Thus far, the forensics investigation did not identify any compromise of Bybit's infrastructure.

#Bybit released the conclusions of their investigation into how they got rekt for $1.4 billion by North Korea's #LazarusGroup.

Summary:

1. (background) Bybit were dumb enough to store billions of dollars in a single wallet contract using software from a […]

[Original post on universeodon.com]

1 1 0 0