SlowMist releases Bybit attacker's operation details
02-21 16:54

Odaily News SlowMist releases Bybit attacker operation details:
1) A malicious implementation contract was deployed at UTC 2025-02-19 7:15:23: https://etherscan.io/address/0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516
2) UTC 2025-02-21 14:13:35, the attacker used the three owners to sign a transaction to replace the implementation contract of Safe with a malicious contract: https://etherscan.io/tx/0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882
3) The attacker then used the backdoor functions “sweepETH” and “sweepERC20” in the malicious contract to steal the hot wallet.

最热快讯
资讯热榜
日榜
周榜
Satoshigallery: Satoshi Nakamoto sculpture found
Trump and Treasury Secretary Benson are actively searching for the next Federal Reserve chairman.
U.S. Trade Representative says tariff policy will remain largely unchanged
Hassett: Not eager to run Bureau of Labor Statistics
The Blue Origin spacecraft that Sun Yuchen took has been launched
Michael Saylor: Winter Won't Come Back