February 27, 2025
11 11 11 AM
Latest Post
CoreWeave Eyes $4B IPO, Could File for U.S. Listing Within a Week: Bloomberg Stablecoins Take Center Stage at Senate’s First Digital Assets Subcommittee Hearing SEC Drops Probe Into Gemini, Cameron Winklevoss Demands Recompense Bybit and Safe Custody Are at Odds on Who’s to Blame for $1.5B Hack The Protocol: Ethereum’s Pectra Goes Live on Testnet Core Scientific Stock Surges After $1.2B Expansion of Data Center With CoreWeave Bitcoin Miners Drawing Power From Grids Will Face ‘Reckoning’ Post Next Halving, MARA Says SEC, Justin Sun, Tron Ask Court to Pause Fraud Case Over ‘Potential Resolution’ U.S. Appeals Court (Mostly) Affirms 2023 Ruling Tossing Out Uniswap Class Action Suit Gotbit Founder Aleksei Andriunin Extradied to U.S. on Fraud Charges

Bybit and Safe Custody Are at Odds on Who’s to Blame for $1.5B Hack

Cryptocurrency exchange Bybit has published a forensic review on last week’s $1.5 billion hack, revealing that its systems had not been infiltrated and that the issue seemed to have stemmed from compromised Safe wallet infrastructure.

Bybit concluded from the review that “the credentials of a Safe developer were compromised,” which allowed the Lazarus hacking group to gain unauthorized access to the Safe wallet and subsequently deceive Bybit staff into signing the malicious transaction.

However, a person familiar with the matter told CoinDesk that despite the wallet’s infrastructure being compromised by social engineering, the hack would not have been possible had Bybit not “blind signed” the transaction. The term refers to a mechanism where a smart contract transaction is approved without comprehensive knowledge of its contents.

Safe also issued a statement saying that “Safe smart contracts [were] unaffected, an attack was conducted by compromising a Safe {Wallet} developer machine which affected an account operated by Bybit.” It also pointed out that a “forensic review of external security researchers did NOT indicate any vulnerabilities in the Safe smart contracts or source code of the frontend and services.”

The apparent back and forth between both companies mirrors that of WazirX and Liminal Custody, which blamed each other following a $230 million exploit last July.

On-chain data analyzed by ZachXBT shows that Lazarus is attempting to launder the stolen funds, with 920 wallets currently being tainted with the ill-gotten gains. The funds, perhaps inadvertently, have been commingled with stolen funds from hacks targeting Phemex and Poloniex, linking Lazarus Group to all three.
Read more: Bybit Declares ‘War on Lazarus’ as It Crowdsources Effort to Freeze Stolen Funds

This post was originally published on this site