You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Bybit attack / Safe Javascript compromised Feb 2025
154
156
157
+
The AWS account of a Safe developer was compromiser, the attacked uploaded malicious Javascript targeting a single wallet. The multisig signers signed a compromised transaction involving an [exploit contract](https://etherscan.io/address/0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516) called with DELEGATE_CALL. This resulted in a $1.5B (billion!) theft on the cold wallet of the Bybit crypto exchange.
155
158
159
+
Notes:
160
+
- This hack exploits a multisig cold wallet **without exploiting any smart contract vulnerability**.
161
+
- The attacker knew that the attacked would be discovered and remediated fast, so instead of targeting multiple small wallets, they target one of the largest ever,
162
+
- A few minutes after the attack, the attacked replaced the compromised JS file with the original one, in order to delete traces.
163
+
- The Bybit operator did blind signing. Better UX is needed, readable/interpretable transactions is high priority.
0 commit comments