Monday, November 17, 2025
DIGESTWIRE
Contribute
CONTACT US
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
DIGESTWIRE
No Result
View All Result
Home Blockchain

Bybit exploit tied to Safe developer machine vulnerability

by DigestWire member
February 26, 2025
in Blockchain, Crypto Market, Cryptocurrency
0
Bybit exploit tied to Safe developer machine vulnerability
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Bybit revealed that the recent $1.4 billion hack did not compromise its infrastructure and was caused by a vulnerability in a Safe developer machine.

According to the exchange’s initial forensic report, the attack was executed through Safe’s AWS S3 bucket, allowing bad actors to manipulate the wallet front end.

Meanwhile, Safe said in a separate Feb. 26 report that the hackers used a compromised machine to submit a disguised malicious transaction proposal. This proposal injected harmful JavaScript into key resources, enabling the attackers to manipulate transactions.

The forensic investigation conducted by Bybit and blockchain security firms Sygnia and Verichains reached the same conclusion as Safe.

Attack execution and forensic findings

The Safe report highlighted that the attackers designed the injected code to modify transaction contents during the signing process, effectively altering the intended execution.

Publicly available web history archives and timestamp analysis indicate that the injection occurred directly into the S3 bucket — an Amazon Web Services (AWS) public cloud storage resource that stores data for objects in distinct units.

The malicious JavaScript code analysis revealed an activation condition tied to specific contract addresses, including Bybit’s contract address and an unidentified contract address suspected to be controlled by the threat actor. This suggests the hackers employed a targeted approach rather than a widespread attack.

Shortly after the malicious transaction was executed and published, Safe uploaded updated versions of the JavaScript resources to its AWS infrastructure. These versions removed the injected code, indicating an effort to erase traces of the compromise. 

Despite this, forensic investigators identified the attack vector and linked it to the broader tactics used by the North Korean hacker group Lazarus. The group is allegedly state-sponsored and notorious for leveraging social engineering and zero-day exploits to target developer credentials.

A small security detail

SlowMist founder Yu Xian said it’s still unclear how the hackers tampered with the front end. He added that, in theory, anyone who uses Safe’s multi-signature services could suffer the same exploit.

According to Xian:

“What is terrifying is that all other user-interactive services with front-ends, APIs, etc. may be at risk. This is also a classic supply chain attack. The security management model for huge/large assets needs a major upgrade.”

Additionally, he assessed that if the Safe front-end had performed basic subresource integrity (SRI) verification, the attack would not have been possible even if a malicious actor modified the JavaScript file, which is a “small security detail.”

SRI verification is a security feature that enables browsers to verify that the resources they fetch are not unexpectedly manipulated based on a cryptographic hash that the fetched resource must match.

Safe response and remediation measures

Safe said it had initiated a comprehensive investigation to assess the extent of the compromise. The forensic review found no vulnerabilities in its smart contracts, front-end source code, or back-end services.

Safe has fully rebuilt and reconfigured its infrastructure to mitigate future risks while rotating all credentials. The platform has been restored on the Ethereum mainnet with a phased rollout, incorporating enhanced security measures. 

While the Safe front-end remains operational, the report urged users to exercise heightened caution when signing transactions.

Additionally, Safe said it is committed to leading an industry-wide initiative to increase transaction verifiability. This initiative addresses an ecosystem-wide challenge, emphasizing security, transparency, and self-custody within DeFi applications.

Lessons from the incident

Despite Safe and Bybit’s reports concluding that the exchange was not compromised, Hasu, the strategy lead at Flashbots, believes they still need to be held accountable.

He said that Bybit infra was insufficient to catch “a pretty simple hack” and that there is no excuse for not verifying message integrity when moving over $1 billion of funds.

Hasu added:

“I’m afraid if we put the blame on SAFE instead of Bybit here, we are learning entirely the wrong lesson from this as a space. Frontends should _always_ be assumed compromised. If your signing process doesn’t accommodate that, you’re ultimately still at fault.”

Jameson Lopp, co-founder and chief security officer at Casa, pointed out that “a major lesson” from the Safe security incident is that no developer should have production keys on their machines. He recommended that production code deployments undergo peer review and involve multiple employees to enhance security.

Mudit Gupta, the chief information security officer at Polygon Labs, also criticized the fact that only one developer had the system authority to submit changes to Safe’s production website and questioned why changes in the objects were not monitored.

The post Bybit exploit tied to Safe developer machine vulnerability appeared first on CryptoSlate.

Read Entire Article
Tags: BlockchainCoin SurgesCryptoslate
Share30Tweet19
Next Post
Matthew Lawrence Claims Ryan Reynolds Caused A “Big Conflict” On Movie Set

Matthew Lawrence Claims Ryan Reynolds Caused A "Big Conflict" On Movie Set

Bitcoin Struggles Below $85K as ETFs Outflows Reach Record High

Bitcoin Struggles Below $85K as ETFs Outflows Reach Record High

SUI Uptick Sparks Hope, But Is This Fleeting Recovery?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

No Result
View All Result
Coins MarketCap Live Updates Coins MarketCap Live Updates Coins MarketCap Live Updates
ADVERTISEMENT

Highlights

The UK town where 6 out of 7 children grow up in poverty – and live in fear of homelessness

Order A Big Breakfast And We’ll Guess Your Favorite Sabrina Carpenter Song

These 13 Celebrities Are Still Making More Money After Death Than Most Of Us Right Now

XRP Price Continues Lower as Sellers Tighten Grip on Intraday Structure

All-round Sadaqat helps Pakistan A beat India A to seal semi-final berth

Farhan Akhtar’s ‘120 Bahadur’ Makes History With India Defense Theater Release (EXCLUSIVE)

Trending

Mitchell’s standout century puts New Zealand 1-0 up
Cricket

Mitchell’s standout century puts New Zealand 1-0 up

by DigestWire member
November 17, 2025
0

Mitchell battled fitness issues en route to a 118-ball 119 on a two-paced pitch, taking New Zealand...

AI Drama ‘Humans in the Loop’ Receives Film Independent’s Sloan Distribution Grant, Enters Oscar Race (EXCLUSIVE)

AI Drama ‘Humans in the Loop’ Receives Film Independent’s Sloan Distribution Grant, Enters Oscar Race (EXCLUSIVE)

November 17, 2025
Walmart Serves Walton Goggins as The Grinch To Warm Up Black Friday

Walmart Serves Walton Goggins as The Grinch To Warm Up Black Friday

November 17, 2025
The UK town where 6 out of 7 children grow up in poverty – and live in fear of homelessness

The UK town where 6 out of 7 children grow up in poverty – and live in fear of homelessness

November 17, 2025
Order A Big Breakfast And We’ll Guess Your Favorite Sabrina Carpenter Song

Order A Big Breakfast And We’ll Guess Your Favorite Sabrina Carpenter Song

November 17, 2025
DIGEST WIRE

DigestWire is an automated news feed that utilizes AI technology to gather information from sources with varying perspectives. This allows users to gain a comprehensive understanding of different arguments and make informed decisions. DigestWire is dedicated to serving the public interest and upholding democratic values.

Privacy Policy     Terms and Conditions

Recent News

  • Mitchell’s standout century puts New Zealand 1-0 up November 17, 2025
  • AI Drama ‘Humans in the Loop’ Receives Film Independent’s Sloan Distribution Grant, Enters Oscar Race (EXCLUSIVE) November 17, 2025
  • Walmart Serves Walton Goggins as The Grinch To Warm Up Black Friday November 17, 2025

Categories

  • Blockchain
  • Blog
  • Breaking News
  • Business
  • Cricket
  • Crypto Market
  • Cryptocurrency
  • Defense
  • Entertainment
  • Football
  • Founders
  • Health Care
  • Opinion
  • Politics
  • Sports
  • Strange
  • Technology
  • UK News
  • Uncategorized
  • US News
  • World

© 2020-23 Digest Wire. All rights belong to their respective owners.

No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Blockchain
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Strange
  • Blog
  • Founders
  • Contribute!

© 2024 Digest Wire - All right reserved.

Privacy Policy   Terms and Conditions

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.