市值: $2.7751T -5.600%
體積(24小時): $152.7846B -20.100%
  • 市值: $2.7751T -5.600%
  • 體積(24小時): $152.7846B -20.100%
  • 恐懼與貪婪指數:
  • 市值: $2.7751T -5.600%
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
Top News
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
bitcoin
bitcoin

$88830.798037 USD

-2.64%

ethereum
ethereum

$2497.873910 USD

1.23%

tether
tether

$0.999258 USD

-0.08%

xrp
xrp

$2.298080 USD

2.28%

bnb
bnb

$622.330777 USD

3.09%

solana
solana

$142.049991 USD

2.75%

usd-coin
usd-coin

$1.000028 USD

0.01%

dogecoin
dogecoin

$0.211388 USD

1.36%

cardano
cardano

$0.685163 USD

1.78%

tron
tron

$0.229024 USD

-1.71%

chainlink
chainlink

$15.356018 USD

3.94%

sui
sui

$3.026185 USD

10.03%

avalanche
avalanche

$22.223067 USD

3.59%

stellar
stellar

$0.293999 USD

0.98%

litecoin
litecoin

$119.168857 USD

6.68%

加密貨幣新聞文章

受損的開發人員機器是Bybit Hack的根本原因

2025/02/27 04:19

Safe是Bybit使用的SafeWallet多符號產品的開發商,它發布了簡短的驗屍更新,該更新解釋了最近的Bybit Hack的根本原因 - 遭受折衷的開發人員機器。

受損的開發人員機器是Bybit Hack的根本原因

Safe, the developer of the SafeWallet multisignature product used by Bybit, has released a short post-mortem update explaining the root cause of the recent Bybit hack — a compromised developer machine. The announcement prompted a critical response from Binance co-founder Changpeng “CZ” Zhao.

Safe是Bybit使用的SafeWallet多符號產品的開發商,它發布了簡短的驗屍更新,該更新解釋了最近的Bybit Hack的根本原因 - 遭受折衷的開發人員機器。該公告促使Binance聯合創始人Changpeng“ CZ” Zhao做出了重要回應。

According to Safe, the forensic review of the Bybit hack did not find vulnerabilities in the Safe smart contracts or the code of its front end portal and services responsible for the $1.4 billion cybersecurity incident.

根據Safe的說法,對Bybit Hack的法醫審查並未發現安全智能合約或其前端門戶網站的守則和負責14億美元網絡安全事件的服務。

Martin Köppelmann, the co-founder of the Gnosis blockchain network, which developed Safe, noted that the compromised machine was modified to target the Bybit Safe and divert the transactions to a different hardware wallet.

Gnosis區塊鍊網絡的聯合創始人馬丁·科佩爾曼(MartinKöppelmann)開發了安全,他指出,妥協的機器已被修改以針對Bybit安全,並將交易轉移到其他硬件錢包中。

“This update from Safe is not that great. It uses vague language to brush over the issues,” Zhao wrote in a Feb. 26 X post. Zhao also asked for clarification on the compromised developer machines, how the hackers tricked multiple signers into signing the transaction, how a developer machine accessed Bybit's systems, and why the hackers did not target other addresses.

“ Safe的更新並不是那麼好。它使用模糊的語言來解決這些問題。”趙在2月26日x帖子中寫道。趙還要求澄清受損的開發人員機器,黑客如何欺騙多個簽名者簽署交易,開發人員如何訪問bybit的系統,以及為什麼黑客沒有針對其他地址。

Köppelmann added that he could only speculate about how the hackers pushed the fraudulent transactions past multiple signers and theorized that the threat actors did not target other addresses to prevent discovery and detection.A forensic review conducted by Sygnia and Verichains revealed on Feb. 26 that “the credentials of a Safe developer were compromised [...] which allowed the attacker to gain unauthorized access to the Safe(Wallet) infrastructure and totally deceive signers into approving a malicious transaction.”

Köppelmann補充說,他只能猜測黑客如何將欺詐性交易推向多個簽名者,並理論上,威脅行為者沒有針對其他地址來防止發現和檢測我簽署了批准惡意交易。”

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年02月27日 其他文章發表於