Market Cap: $2.7751T -5.600%
Volume(24h): $152.7846B -20.100%
  • Market Cap: $2.7751T -5.600%
  • Volume(24h): $152.7846B -20.100%
  • Fear & Greed Index:
  • Market Cap: $2.7751T -5.600%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$88830.798037 USD

-2.64%

ethereum
ethereum

$2497.873910 USD

1.23%

tether
tether

$0.999258 USD

-0.08%

xrp
xrp

$2.298080 USD

2.28%

bnb
bnb

$622.330777 USD

3.09%

solana
solana

$142.049991 USD

2.75%

usd-coin
usd-coin

$1.000028 USD

0.01%

dogecoin
dogecoin

$0.211388 USD

1.36%

cardano
cardano

$0.685163 USD

1.78%

tron
tron

$0.229024 USD

-1.71%

chainlink
chainlink

$15.356018 USD

3.94%

sui
sui

$3.026185 USD

10.03%

avalanche
avalanche

$22.223067 USD

3.59%

stellar
stellar

$0.293999 USD

0.98%

litecoin
litecoin

$119.168857 USD

6.68%

Cryptocurrency News Articles

Compromised developer machine is the root cause of the Bybit hack

Feb 27, 2025 at 04:19 am

Safe, the developer of the SafeWallet multisignature product used by Bybit, has released a short post-mortem update explaining the root cause of the recent Bybit hack — a compromised developer machine.

Compromised developer machine is the root cause of the Bybit hack

Safe, the developer of the SafeWallet multisignature product used by Bybit, has released a short post-mortem update explaining the root cause of the recent Bybit hack — a compromised developer machine. The announcement prompted a critical response from Binance co-founder Changpeng “CZ” Zhao.

According to Safe, the forensic review of the Bybit hack did not find vulnerabilities in the Safe smart contracts or the code of its front end portal and services responsible for the $1.4 billion cybersecurity incident.

Martin Köppelmann, the co-founder of the Gnosis blockchain network, which developed Safe, noted that the compromised machine was modified to target the Bybit Safe and divert the transactions to a different hardware wallet.

“This update from Safe is not that great. It uses vague language to brush over the issues,” Zhao wrote in a Feb. 26 X post. Zhao also asked for clarification on the compromised developer machines, how the hackers tricked multiple signers into signing the transaction, how a developer machine accessed Bybit's systems, and why the hackers did not target other addresses.

Köppelmann added that he could only speculate about how the hackers pushed the fraudulent transactions past multiple signers and theorized that the threat actors did not target other addresses to prevent discovery and detection.A forensic review conducted by Sygnia and Verichains revealed on Feb. 26 that “the credentials of a Safe developer were compromised [...] which allowed the attacker to gain unauthorized access to the Safe(Wallet) infrastructure and totally deceive signers into approving a malicious transaction.”

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Feb 27, 2025