🎁 Airdrop Season 7 is LIVE - Answer Fun Questions to Earn $30K Prize Pool Rewards. JOIN NOW!

Bybit’s $1.4 Billion Hack Traced to Safe Developer’s Infected Laptop

Key Takeaways

  • ​Bybit’s $1.4 billion hack stemmed from a Safe developer’s compromised laptop, allowing attackers to infiltrate the system;
  • Hackers bypassed multi-factor authentication by hijacking AWS session tokens, later injecting malicious JavaScript into Safe’s site;
  • Safe has enhanced security and urges users to carefully verify transactions before signing to prevent future attacks.​

Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥

Bybit’s $1.4 Billion Hack Traced to Safe Developer’s Infected Laptop

Safe, a provider of multi-signature wallet services, revealed that the $1.4 billion Bybit $1.4B hack originated from a developer’s infected laptop, which allowed hackers to manipulate the system.

Initially, independent reports suggested that malicious code had been inserted into Safe’s infrastructure. Safe worked alongside cybersecurity firm Mandiant to investigate the issue.

They shared an update in a March 6 post on X, stating, "We present these findings in the spirit of transparency and to highlight key lessons learned, along with calls to action for the broader community to learn from this incident and strengthen defenses".

What is Yield Farming in Crypto? (Animated Explanation)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

Further investigation revealed that on February 4, a senior Safe developer unknowingly interacted with a harmful Docker project, which led to their workstation being compromised. This allowed hackers to access Safe’s Amazon Web Services (AWS) account, bypassing multi-factor authentication by hijacking active session tokens.

A timeline of events showed that two weeks after the initial breach, malicious JavaScript was inserted into Safe’s website. This code played a direct role in the February 21 attack that targeted Bybit.

In response, Safe has reset its entire infrastructure, improved its user interface for verifying transaction hashes, and enhanced its ability to detect suspicious transactions. However, the company acknowledges that more work remains and is urging users to be extra cautious when signing transactions.

To assist users, Safe has published a detailed guide on how to verify transactions before approving them. The company also plans to integrate additional security measures to make the process easier for users.

Bybit recently launched a bounty program, Lazarus Bounty, to recover stolen funds. What did CEO Ben Zhou say about it? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

$600 WELCOME BONUS

Earn Huge Exclusive Binance Learners Rewards
5.0 Rating