Security Community: The Bybit attack involved social engineering techniques that tricked auditors into mistaking contract changes for transfers
02-22 04:42
<p>Odaily News According to a post by the security community Dilation Effect on the X platform, &quot;Compared to previous similar incidents, in the Bybit incident, only one signer was needed to complete the attack, because the attacker used a &#39;social engineering&#39; technique. Analysis of on-chain transactions shows that the attacker executed a malicious contract&#39;s transfer function through delegatecall. The transfer code used the SSTORE instruction to modify the value of slot 0, thereby changing the implementation address of the Bybit cold wallet multi-signature contract to the attacker&#39;s address. The transfer here is very clever. It only requires the person/device that initiated the multi-signature transaction to be dealt with. When the subsequent auditors see this transfer, their vigilance will be greatly reduced. Because normal people see transfer and think it is a transfer, who knows that it is actually changing the contract. The attacker&#39;s tactics have been upgraded again.&quot;</p>
最热快讯
资讯热榜
日榜
周榜
Hyperliquid’s 50x leveraged BTC short position turned from loss to profit, with a floating profit of over $600,000
James Wynn wrote a long article about himself: He started playing with contracts in March, earned 8-digit profits from Meme coins, and lost 100 million in a week
BTC rebounded and broke through 102,000 USDT, and the 24-hour decline narrowed to 2.87%
SlowMist: Lazarus hackers are using a new stealing Trojan, OtterCookie, to target cryptographic practitioners
Abraxas Capital shorts mainstream currencies for hedging, with current floating profits exceeding $55 million
TRUMP wallet official website linked to account X for the second time