SlowMist releases Bybit attacker's operation details
02-21 16:54
<p>Odaily News SlowMist releases Bybit attacker operation details:<br/> 1) A malicious implementation contract was deployed at UTC 2025-02-19 7:15:23: <a href="https://etherscan.io/address/0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516…">https://etherscan.io/address/0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516</a><br/> 2) UTC 2025-02-21 14:13:35, the attacker used the three owners to sign a transaction to replace the implementation contract of Safe with a malicious contract: <a href="https://etherscan.io/tx/0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882">https://etherscan.io/tx/0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882</a><br/> 3) The attacker then used the backdoor functions “sweepETH” and “sweepERC20” in the malicious contract to steal the hot wallet.</p>
最热快讯
资讯热榜
日榜
周榜
Hyperliquid’s 50x leveraged BTC short position turned from loss to profit, with a floating profit of over $600,000
James Wynn wrote a long article about himself: He started playing with contracts in March, earned 8-digit profits from Meme coins, and lost 100 million in a week
BTC rebounded and broke through 102,000 USDT, and the 24-hour decline narrowed to 2.87%
SlowMist: Lazarus hackers are using a new stealing Trojan, OtterCookie, to target cryptographic practitioners
Abraxas Capital shorts mainstream currencies for hedging, with current floating profits exceeding $55 million
TRUMP wallet official website linked to account X for the second time